A screenshot from the SQLmap official websiteIn the previous tutorial, we hacked a website using nothing but a simple browser on a Windows machine. It was a pretty clumsy method to say the least. However, knowing the basics is necessary before we move on to the advanced tools. In this tutorial, we'll...
Monday, 31 March 2014
Sunday, 16 March 2014
Speeding Up WEP Hacking In Kali

Now if you have followed the basic WEP hacking tutorial, and have also read the basic troubleshooting guide, then you are ready to proceed to the stage where you follow an intermediate level hacking tutorial. In this tutorial, we will look at the intricate details of what is happening and approach...
Saturday, 15 March 2014
Hacking Websites Using SQL Injection Manually

Sql Injection - Hacking WebsitesIn this post we will hack a website and obtain its data using SQL injection attack. We will not use any tools. This is one of the few tuts on this blog for which you don't need Kali Linux. You can easily carry it out from Windows machine on any normal browser. If you...
Thursday, 13 March 2014
SQL Injection : How It Works

IntroductionLets get started at an apparently unrelated point. Lets assume we create a table in SQL. Now there are three main parts of a database management system, like SQL. They are -Creating structure of tableEntering dataMaking queries (and getting meaningful results from data)Now, when SQL is...
Wednesday, 5 March 2014
Denial Of Service Attacks : Explained for Beginners and Dummies

Just like most other things associated with hacking, a denial of service attack is not everyone's cup of tea. It, however, can be understood if explained properly. In this tutorial, I'll try to give you a big picture of denial of service attacks, before I start using geeky terms like packets and all...