TheChosenTrojan

Website hacking lesson #1 (template)

Jan 29th, 2015
390
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.03 KB | None | 0 0
  1. <><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!>
  2. Warning: All information obtained by my website hacking lessons are for securing your website only, I do not condone illegal hacking whatsoever. Stay ethical or stay away!
  3. <><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!><><><!>
  4.  
  5. Almost every website is vulnerable someway or another, finding a vulnerability can be a hassle when you have no idea what you're doing and you're likely a newbie whose being dependent solely upon vulnerability scanners to detect them because you do not possess the necessary skills to evaluate a website yourself. All vulnerability scanners are useful to a certain extent, but will eventually fail you at some point during the scan -IncursioSubter
  6.  
  7. Let's jump straight into the common vulnerabilities, understanding them is important before you start exploiting them.
  8.  
  9. SQL injection: is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. (credits to the internet)
  10.  
  11. Cross site scripting: is a security exploit in which the attacker inserts malicious coding into a link that appears to be from a trustworthy source. When someone clicks on the link, the embedded programming is submitted as part of the client's Web request and can execute on the user's computer, typically allowing the attacker to steal information. (credits o the internet)
  12.  
  13. Information leakage: This is when a website displays sensitive information that an attacker can use to penetrate their website.
  14.  
  15. +more coming soon
  16.  
  17. ===================================================================================================================================
  18. Testing for SQL injection, exploiting SQL injection vulnerability and finding SQL injection vulnerabilities in open source software.
  19.  
  20. *This tutorial will be finished in February.
Add Comment
Please, Sign In to add comment