Posts

Showing posts from June, 2012

Computer Cookie - Working, Vulnerability and Security

Image
Computer cookies are small piece of information in text format that’s sent to an web browser by an web server. This information can be accessed either by the web server or by the client computer. Cookie information can be used for authentication, identification of a user session, user's preferences, shopping cart contents, or anything else that can be accomplished through storing text data. What are the types of Cookie? Session cookie Persistent cookie Secure cookie HttpOnly cookie First-Party Cookie Third-Party Cookie Super cookie Zombie cookie Unsatisfactory Cookie Role of Cookie in Internet Session Management Session management is the process of keeping track of a user's activity across sessions of interaction with the computer system. Personalization Cookies may be used to remember the information about the user who has visited a website in order to show relevant content in the future. For example a web server may send a cookie containing the

SQL Injection Using Havij Tools

Image
SQL injection is a code injection technique that exploits a security vulnerability in a website's software . It is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside these parameters. The result is that the attacker can execute arbitrary SQL queries and/or commands on the backend database server through the Web application. Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL

Google Dork For "Remote File Inclusion"

Image
Google dork s are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking. Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. List Of Google Dork For Remote File Inclusion: inurl:rte/my_documents/my_files inurl:/my_documents/my_files/ inurl:/shoutbox/expanded.php?conf= inurl:/main.php?x= inurl:/myPHPCalendar/admin.php?cal_dir= inurl:/index.php/main.php?x= inurl:/index.php?include= inurl:/index.php?x= inurl:/index.php?open= inurl:/index.php?visualizar= inurl:/template.php?pagina= inurl:/index.php?pagina= inurl:/index.php?inc= inurl:"index.php?page=contact.php" inurl:"template.php?goto=" inurl:"video.php?content=" inurl:"pages.php?p

List of F1-F9 Key for cmd prompt

List of F1-F9 Key Commands for the Command Prompt F1 / right arrow: Repeats the letters of the last command line, one by one. F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line F3: Repeats the last command line F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line F5: Goes back one command line F6: Enters the traditional CTRL+Z (^z) F7: Displays a menu with the command line history F8: Cycles back through previous command lines (beginning with most recent) F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered. Alt+Enter: toggle full Screen mode. up/down: scroll thru/repeat previous entries Esc: delete line Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence. Helpful accessibility keyboard shortcuts Switch FilterKeys on and off. Right SHIFT for eight seconds