Wednesday, March 21, 2012

List of Webs Hacking Techniques

This list below fits in category Parameter manipulation

အဒီထဲကတေကာင္ေကာင္ကို Googling လိုက္ေနာ္

Arbitary File Deletion
Code Execution
Cookie Manipulation ( meta http-equiv & crlf injection )
CRLF Injection ( HTTP response splitting )
Cross Frame Scripting ( XFS )
Cross-Site Scripting ( XSS )
Directory traversal
Email Injection
File inclusion
Full path disclosure
LDAP Injection
PHP code injection
PHP curl_exec() url is controlled by user
PHP invalid data type error message
PHP preg_replace used on user input
PHP unserialize() used on user input
Remote XSL inclusion
Script source code disclosure
Server-Side Includes (SSI) Injection
SQL injection
URL redirection
XPath Injection vulnerability

This list below fits in category MultiRequest parameter manipulation

Blind SQL injection (timing)
Blind SQL/XPath injection (many types)

This list below fits in category File checks

8.3 DOS filename source code disclosure
Search for Backup files
Cross Site Scripting in URI
PHP super-globals-overwrite
Script errors ( such as the Microsoft IIS Cookie Variable Information Disclosure )

This list below fits in category Directory checks

Cross Site Scripting in path
Cross Site Scripting in Referer
Directory permissions ( mostly for IIS )
HTTP Verb Tampering ( HTTP Verb POST & HTTP Verb WVS )
Possible sensitive files
Possible sensitive files
Session fixation ( jsessionid & PHPSESSID session fixation )
Vulnerabilities ( e.g. Apache Tomcat Directory Traversal, ASP.NET error message etc )
WebDAV ( very vulnerable component of IIS servers )

This list below fits in category Text Search Disclosure

Application error message
Check for common files
Directory Listing
Email address found
Local path disclosure
Possible sensitive files
Microsoft Office possible sensitive information
Possible internal IP address disclosure
Possible server path disclosure ( Unix and Windows )
Possible username or password disclosure
Sensitive data not encrypted
Source code disclosure
Trojan shell ( r57,c99,crystal shell etc )
( IF ANY )Wordpress database credentials disclosure

This list below fits in category File Uploads

Unrestricted File Upload

This list below fits in category Authentication

Microsoft IIS WebDAV Authentication Bypass
SQL injection in the authentication header
Weak Password
GHDB - Google hacking database ( using dorks to find what google crawlers have found like passwords etc )

This list below fits in category Web Services - Parameter manipulation & with multirequest

Application Error Message ( testing with empty, NULL, negative, big hex etc )
Code Execution
SQL Injection
XPath Injection
Blind SQL/XPath injection ( test for numeric,string,number inputs etc )
Stored Cross-Site Scripting ( XSS )
Cross-Site Request Forgery ( CSRF )

က်ေနာ္သိသေလာက္ေလးပါခင္ဗ်..တျခားရွိေသးရင္မွ်က်ပါဦး...က်ေနာ့္ အရင္က Webs hacking Technique ေယာင္လည္လည္ျဖစ္ခဲ့လို႔..ေနာင္လာေနာက္သားေတြမျဖစ္ေအာင္ဆိုပီး ဟီးးးးးးးးးးးးး(နာေတာင္န္ည္းနည္းလဲပဲသိေသးတယ္..ခိခိ)

post By dr.c0mpl3x
copy from 






Android (3) autorun (3) Backtrack (8) batch file (19) blogger (10) Botnet (2) browser (5) Brute Force (6) cafezee (2) cmd (5) Cookies (2) crack (12) Cracking (2) crypter (7) DDos (20) deepfreeze (4) defacing (1) defence (16) domain (4) Dos (9) downloader (4) ebomb (2) ebook (48) Exploit (26) firewall (3) game (2) gmail (11) google hack (16) Hacking Show (3) Hash (4) hosting (1) icon changer (1) ip adress (6) Keygen (1) keylogger (8) knowledge (67) locker (1) maintainence (8) network (17) news (31) other (35) passwoard viewer (7) password (12) Philosophy (6) Phishing (8) premium account (2) proxy (7) RAT (10) run commands (4) script (27) Shell code (10) shortcut Key (2) SMTP ports (1) social engineering (7) spammer (1) SQL Injection (30) Stealer.crack (5) tools (125) Tools Pack (4) tutorial (107) USB (3) virus (32) website (84) WiFi (4) word list (2)

Blogger templates

Blogger news


Powered by Blogger.


About Me

My Photo
Hacking= intelligent+techonology+psychology