Site menu |
|
 |
Our poll |
|
 |
Statistics |
Total online: 1 Guests: 1 Users: 0 |
 |
Login form |
|
 |
|
Main » 2011 » November » 10
MSSQL - injection, method of attack!
###########################
1.1 Introduction
1.2 How to ask Vulnerability page?
1.3 How to prove that the site of weakness?
1.4 How to find version / name of the DB?
1.5 How to discover the names table (table_name)?
1.6 How to discover the names of column (column_name)?
1.7 How to get data from tables that interest us (eg name, pass, email, etc.)?
1.8 Conclusion?
[1.1 Introduction]
############
This lesson will try to explain that you already know the different techniques, MSSQL-injection.
Who will have the opportunity to learn how this method is used as a
favorite act to obtain information (name, password and login) or various
other information through this technique.
MSSQL-injection, can be used for products that are created by well-known company Microsoft.
This type of injection, then deal with those sites that are coded in ASP / Aspks etc.
There are sev
...
Read more »
Views:
1268
|
Added by:
shakira15
|
Date:
11.10.2011
|
|
Hacking with CMD :D
HOw to hack someone with ther IP 
Introduction
1. Welcome to the basic NETBIOS document created by aCId_rAIn. This
document will teach you some simple things about NETBIOS, what it does,
how to use it, how to hack with it, and some other simple DOS commands
that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ
ONLY!!! If you are NOT a newbie then don't go any farther reading this
because if you're smart enough you probably already know it all. So
don't waste yourt time reading something that you already know.
1. Hardware and Firmware
1a. The BIOS
The BIOS, short for Basic Input/Output Services, is the control pro
...
Read more »
Views:
22211
|
Added by:
shakira15
|
Date:
11.10.2011
|
| |
|
|
Search |
|
 |
Calendar |
|
 |
Entries archive |
|
 |
|