Sunday, 24 September 2023

SQL Injection in short

What is SQL Injection?

It is a process of injecting SQL commands to retrieve data from the database that are not normally able to retrieve, it basically consist of SQL query that are injected via the input data from the client to application. This might include data belonging to other users.  SQL injection can exploit sensitive data from database, modify and moreover can delete the database.

Detection

SQL Injection attack can be detected by many ways some of which are listed below:

To check if sites accept SQL - 
Condition: password is known.

Username: (your username)

Password: Your password' and 1=1#  

Condition: password is unknown.

Username: admin

Password: [any alphabet]' OR 1=1#

Input: 'UNION SELECT username, password FROM users--

Example: SELECT * FROM users WHERE username = 'aditya' and password = 'agarwal'

                                                                    Now subverting

SELECT * FROM users WHERE username = 'Administrator'--' AND password = ' '

Types of SQL Injection

1) In-Band SQL Injection

In this type of SQL Injection attack the attacker can both launch the attack and collect result through same channel.

  • Error Based: It obtain information about data structure from error messages issued by database servers.
  • Union-based: It use 'UNION' SQL operator to aggreate the result of two or more SELECT queries into single result.

2) Inferential SQL (Blind SQL)

In this type of attack attacker will not be able to see the result of attack he has performed.
  • Boolean Based Blind SQL: It basically tells 'TRUE' or 'False'. If error occurs then the site is vulnerable to SQL if not then site is safe from this vulnerability.
  • Time Based Blind SQL: In this type of attack the attacket sets the time bound, if in that particular time the response comes then it is vulnerable to SQL Injection.

3) Out-of band SQL Injection

It is not a common type of SQL Injection attack, it depends on features of web application's database server.

Remediation

1) Parse the user input and checks the data that user submits.
2) Adopt the latest technologies.
3) Use atrong passwords so that it is difficult to break.
4) Implement firewall.



Saturday, 23 September 2023

Clickjacking Attack

 

What is Clickjacking?

How does Clickjacking work?

Severity

How to demonstrate Clickjacking vulnerabilities

Impact of Clickjacking

Clickjacking Prevention

Wednesday, 31 May 2023

Complete Basic Course Of Android Hacking

   Complete Basic Course Of Android Hacking


Course Topic


    1) Introduction About Android
    2) Droidjack(WAN)
    3) Spynote
    4) Metasploit Binding App
    5) TheFatRat(WAN)
    6) HoverWatch (WAN)
    7) Hack Whatsapp Without Touching
    8) Hack Facebook Without Touching
    9) Trace Exact Location of any Number
    10) Hack Android Without WIFI Router
    11) Hack Android With WIFI Router
    12) Setup Port Forwarding Of Any Router

Bonus 10 RAT For Windows For Free

Requirements
  Windows Operating System
  Linux Any Distro
  2 GB RAM
 Core I3-5 Processor
  80 GB HD
 Size 1 GB Highly Compressed

Ultra HD Videos

Download Link-

Pass- @forever_knightss

Wednesday, 22 March 2023

Biggest Collection Of Cyber Security Courses.๐Ÿ”ฐ

Biggest Collection Of Cyber Security Courses.


๐Ÿชฌ Blackhat Ethical Hacking.

⭐️ Everything About VMware.

๐Ÿ›ก Build an Advanced Keylogger.

๐Ÿ”ฐ Complete Ethical Hacking Course.

๐Ÿ”ฐ Ethical Hacking Cloud Computing.

⭕️ Computer Forensics.

๐Ÿ”น Social Engineering.

▪️Reverse Engineering.

⭐️ Termux Complete Guide.

⭕️ Red Team Hacking Course.

๐Ÿ’ฃ Hacking And Penetesting.

๐Ÿงจ Hacking Wireless Networks.

๐Ÿฎ Hard Ware Security.

⚒ Practical Bug hunting.

๐Ÿ›ก Linux Complete Guide.

๐Ÿ’‰ SQL Injection Complete Guide. + 50 more Ethical Hacking Course.


Size - 625 GB+


Download Link-

https://mega.nz/folder/QtUBkSyI#pWhNWowJhOTamWY0PuODLA


♻️Share and Support US♻️

Friday, 17 March 2023

Biggest Collection of Cyber Security eBooks - 700+ eBooks ๐Ÿ“š

Biggest Collection of Cyber Security eBooks - 700+ eBooks ๐Ÿ“š


Categories : Antivirus, Malwares, Penetration Testing, Big Data, CEH, Exploits, Forensics, Hadoop, Javascript, Kali Tutorials, Metasploit, Python, Reverse Engineering, Social Engineering and many more...

Size : 4.31 GB




Friday, 10 March 2023

Top Class Premium Courses 2023

 

               Top Class Courses 2023

 

๐Ÿ—‚ASP.NET 

๐Ÿ”—Link :- https://mega.nz/folder/d9JmyB6S#AjTrdYxnv1LJ6aDaUckE0g


๐Ÿ—‚ ASP.NET  Core

๐Ÿ”—Link :- https://mega.nz/folder/1oICgRhK#GiDhoG1a3QvL8DCpZQwTtg


๐Ÿ—‚Backbone.js

๐Ÿ”—Link :- https://mega.nz/folder/Y8AgDLyJ#juH9e2dqelpzsreX34SE2A


๐Ÿ—‚ Hash

๐Ÿ”—Link :- https://mega.nz/folder/FhZwQDAC#EmyoqfbiMTxnW4eNaGVBDg


๐Ÿ—‚ Code Refactoring

๐Ÿ”—Link :- https://mega.nz/folder/V0YyUDQA#btTRtLAUbwIvpnyKFIcs3Q


๐Ÿ—‚Data Structures and Algorithms

๐Ÿ”—Link :- https://mega.nz/folder/tkAkRL5Q#sULqGN4z1YlGZp025vjTWA


๐Ÿ—‚ Design Patterns

๐Ÿ”—Link :- https://mega.nz/folder/0xZ0kb5R#k76Kkhh4fTzUR-CuqSEO3A


๐Ÿ—‚ dotNET

๐Ÿ”—Link :- https://mega.nz/folder/RsAgBZIY#nvqeIjMDux2btRC8yOCibQ


๐Ÿ—‚ Entity Framework

๐Ÿ”—Link :- https://mega.nz/folder/EgBWmRCI#UwEUlNtykPodkWaYrEw67w


๐Ÿ—‚ Ionic

๐Ÿ”—Link :- https://mega.nz/folder/V4IkTLyR#bWnfMlHDBgTLq9-_AoDnWA


▬▬▬▬▬▬▬▬▬▬▬▬▬▬


๐ŸŒŸ Part - 2


๐Ÿ—‚ Java

๐Ÿ”—Link :- https://mega.nz/folder/cgBQTDqS#WsCtPFZV9BBzs-mLKBGu9A


๐Ÿ—‚ JavaScript

๐Ÿ”—Link :- https://mega.nz/folder/ohRiELpY#wjvmJY3xKPLuFbbM6VxcQg


๐Ÿ—‚ Node.js

๐Ÿ”—Link :- https://mega.nz/folder/AtYWCZjK#hLOTRFl7d2WLWdSjVkO14A


๐Ÿ—‚ Python

๐Ÿ”—Link :- https://mega.nz/folder/MtZEkRqR#Ks5hp9s2bUdDtzCtCCjqpg


๐Ÿ—‚React

๐Ÿ”—Link :- https://mega.nz/folder/ptQimDjK#eZ69t5vpNXJe5rxKrw5wQA


๐Ÿ—‚ React Native

๐Ÿ”—Link :- https://mega.nz/folder/5pQSiZLC#qgH93xIvrQGDfsihmzmdBQ


๐Ÿ—‚ Redux

๐Ÿ”—Link :- https://mega.nz/folder/EkIEkRIS#z6UL4G2QckHBABR8p-xnxg


๐Ÿ—‚ SQL

๐Ÿ”—Link :- https://mega.nz/folder/ksYAXR5S#Oy9DapBfBrV2UyM_cksYhw


๐Ÿ—‚-Xamarin Forms

๐Ÿ”—Link :- https://mega.nz/folder/UpZgHTyL#2tjCxoieFkUglCTQQYBaJg


Wednesday, 8 March 2023

Graphic Designing Full Course 2023

           Graphic Designing Full Course 


01. Basics of Graphic design


02. Graphic Design Basics Core Principles for Visual Design


03. Color Theory Basics for Graphic Designers 


04. Getting Started with Adobe Illustrator learn Through Projects! 


05. Photoshop for Entrepreneurs - Design 11 Practical Projects


06. Logo design mastery- The Full Course


07. Graphic Design for Digital -A Social Media Campaign

 

08. Infographic Design- Create Compelling Graphics from Facts and Data  


09. Create A Food Package Design - A Graphic Design Project for Beginners


10. Layout Design Theory - Create Strong Designs 


11. Master Typography Basics Anatomy, Phrases, Paragraphs and Logos  


12. Natural Light Portrait Retouching in Photoshop - Start to Finish  


13. The Personal Branding Process for Creative Freelancers


14. Adobe Illustrator Crash Course


15. Adobe Photoshop CC for Beginners


16. Illustrator-CC-2020-MasterClass


๐Ÿ”— Mega Drive Download link-


https://mega.nz/folder/eoxnWRAS#ITKK9j9I5pLdHbFTzhHTgg

SQL Injection in short

What is SQL Injection? It is a process of injecting SQL commands to retrieve data from the database that are not normally able to retrieve, ...