Local File Inclusion (LFI) tutorial

January 28, 2010 0 Comments 0 tags

This tutorial will guide you into the process of exploiting a website through the LFI (Local File Inclusion). First lets take a look at a php code that is vulnerable

Blind SQL Injection

January 27, 2010 0 Comments 0 tags

Blind injection: you dont actually see anything, you just see how the server responds.Blind injection is a little more complicated/time consuming, but when your injection is multi-select and union isn’t

MSSQL – injection Tutorial

January 26, 2010 0 Comments 0 tags

MSSQL – injection ########################### 1.1 Introduction 1.2 How to ask Vulnerability page? 1.3 How to prove that the site of weakness? 1.4 How to find version / name of the

[FUD] Simple command-line binder

January 26, 2010 0 Comments 0 tags

First of all, why a command-line binder? Automation. Instead of sitting there binding individual, or even groups of files yourself, you can easily automate the binding process by using a

Download Execution with Java

January 25, 2010 0 Comments 0 tags

This tutorial will show you how to use java applets within your website which automatically download and execute your malware onto the visitor’s computer. Some people may of heard about

Infection via HTML

January 21, 2010 0 Comments 0 tags

Edit the code on what and how you need it, and yes this is detectable  in many cases, but you could insert a small FUD downloader to be  downloaded via

Hacking PHP 4.4

January 18, 2010 0 Comments 0 tags

This tut Shows how to hack Sites running: Php 4.4 Sites. Step 1 – Search for them Yep,make a Google dork to find sites running Apache and PHP 4.4 .