SQL Injection Tutorial

There are many types  of  sql injection  but in this tutorial I will  explain how you can extract  columns  ,tables containing useful data such as passwords ,user id , emails , admin pass and id ..  etc



How To Find Vulnerable  Site ?

There are many was to find vulnerable web sites finding vulnerabilities manually or using a web scanners For more you can refer  my post on  How to Find Vulnerable sites

Different Types of Hashes and Salts

What Is a Hash?
Ok, firstly alot of you still believe that hashes can be "decrypted", this is a common misconception because hashes are generated by One Way Cryptographic Hash Algorithms these means the algorithm that created them CAN NOT be reversed to determine the plain text password.



These one way functions are used by computers to prevent storing passwords in plain text in memory, instead when a password is entered (for example at a log in screen) a one way hash algorithm is applied to the supplied password and then the hashed output is compared to the hash for that user, stored in memory. If the two hashes match, the passwords are the same and the user is authenticated, if the two hashes are not the same the passwords do not match and the user is denied access.


Binder software to disable Antivirus detection


© 101hacker | Design by Mukund edited by John
Powered by Blogger