Thursday , 2 July 2020
Home / IT Security / Black Hat (page 12)

Black Hat

The Robots.txt File

The Robots.txt File One way to begin understanding what’s running on a web server is to view the server’s robots.txt file. The robots.txt file is a listing of the directories and files on a web server that the owner wants web crawlers to omit from the indexing process. A web crawler is a piece of software that is used to …

Read More »

JTR: KING OF THE PASSWORD CRACKERS

JTR: KING OF THE PASSWORD CRACKERS: It is hard to imagine discussing a topic like the basics of hacking without discussing passwords and password cracking. No matter what we do or how far we advance, it appears that passwords remain the most popular way to protect data and allow access to systems. With this in mind, let us take a …

Read More »

Password Cracking Techniques

Password-Cracking Techniques Popular culture would have us believe that cracking password is a simple as running some software and tapping a few buttons. The reality is that special techniques are needed to recover passwords. For the most part, we can break these techniques into categories; let’s take a high-level look at them now. Dictionary Attacks An attack of this type …

Read More »

Hunting Cross-Site Scripting (XSS)

Hunting Cross-Site Scripting (XSS) If you are not familiar with XSS attacks, make sure you read the OWASP article “Cross Site Scripting (XSS)” at http://tinyurl.com/3hl5rxt. Here are the main points you need to know about XSS: XSS is a client-side attack executed in the browser. JavaScript and VBScript are the main languages used on this attack. XSS is prevented by …

Read More »

HTTRACK: WEBSITE COPIER

HTTRACK: WEBSITE COPIER Typically, we begin Step 1 by closely reviewing target’s website. In some cases, it may be helpful to use a tool called HTTRACK to make a page-by-page copy of the website. HTTRACK is a free utility that creates an identical, offline copy of the target website. The copied website will include all the pages, links, pictures, and …

Read More »

Locating Database on the Network

A tool that is effective at locating rogue or unknown database installation in SQL Ping 3.0, as described on the vendor’s website; see http://www.vulnerabilityassessment.co.uk/: SQL Ping 3.0 performs both active and passive scans of your network in order to identify all of the SQL Server/MSDE installation in your enterprise. Due to the proliferation of personal firewalls, inconsistent network library configuration, …

Read More »

Introducing SQL Injection, SQL Attacks in Action And Results of SQL Injection

Introducing SQL Injection, SQL Attacks in Action And Results of SQL Injection

Introducing SQL Injection, SQL Attacks in Action And Results of SQL Injection The acronym SQL(pronounced sequel) stands for Structured Query Language, a language for specifying database queries. SQL was developed in the early 1970s by personnel working for IBM. In the late 1970s the company that later became Oracle developed the language for one of their own products. Soon after, …

Read More »

How To Find Serial Key Of Any Software

Let’s Find  Out The Serial Key of Any Software? The key 94FBR is a part of  Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you’re …

Read More »

Download Ethical Password Hacking & Protecting Course

Ethical Password Hacking & Protecting In this course you will learn Hacking Passwords and how really is it possible to hack someone password & then you will get into the safety process that how can you actually protect your password being stolen or hacked by any malicious guys. Content On Course Keylogger Guessing Brute Force Phishing Social Engineering   Click …

Read More »