By Amit GhoshFeb 240
BUFFER OVERFLOW, COOKIE MANUPULATION , ZIP & HASH CRACKING I don’t have too much time for writing up tutorials .I will try to come back to improve this article...
By Amit GhoshFeb 241
Sql Injection & Cgl Vulnerablity Step 1: Find an admin account Find pages To find an access, we try many injections in the form fields (GET method is easier)....
By Amit GhoshFeb 240
Sql Injection & Hash Decrypting (Advanced) Step 0: Collecting Information Directory structure First of all we try to get as much information as we can,...
By Amit GhoshFeb 240
Perl Script Injection Collecting Information Global structure The first thing we have to do is to get as much information as we can about this portal. We...
By Amit GhoshFeb 240
User-Agent Spoofing, Sql Manupulation,Cookie Injection & Cookie Stealing (Advanced) Step 0: Get as much information as possible It is rather too harder than the...
By Amit GhoshFeb 232
User-Agent Spoofing & Cookie Injection There are a lot of things going on with this mission and if you have been following my other tutorials you should be all...
By Amit GhoshFeb 232
Xss (Cross-Site Scripting) And Http Header Tampering Click on “Private Message” from the menu and fill the form as follows, using following XSS as...
By Amit GhoshFeb 230
Cookie Injection,Java Script Injection & Sql Injection Method Information From the navigation and source code of pages, we gather following...
By Amit GhoshFeb 231
Unrestricted Server Feeds & Decrypting Hash Function Method While scrubbing through the site you should come across the image directory. When you browse to this...
By Amit GhoshFeb 231
Directory Transversal Method Reading the source code to a page is probably the first thing you should do just to get an idea of what the page is made of. After...