How Easily A Website Can Be Hacked.

How Easily Can A Website Be HackedHow easily website can be hacked


What is the fundamental stuff you should know before website hacking or getting full access to a site?

Since I am beginning this process from scratch, all of these are optional. However, you should have at least a basic understanding of the following things:
1. Basics of HTML, PHP ,SQL.
2. Basic understanding of Javascript.
3. Basic knowledge of how servers function.
4. And most importantly, expertise in removing traces, otherwise, you will certainly suffer outcomes that will be terrible for you.


The first two things on this list can be memorized from a very famous website; for the basics of website design, along with HTML, SQL, PHP, and Javascript.
METHODS OF HACKING/Manipulating WEBSITE:

⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️
CAUTION: This information is only for Educational purposes, I am not responsible for any actions you will do to others.
⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️

1. SQL INJECTION.
2. CROSS SITE SCRIPTING.
3. REMOTE FILE INCLUSION.
4. LOCAL FILE INCLUSION.
5. DDOS ATTACK.
6. EXPLOITING VULNERABILITY.


SQL INJECTION

First of all, what is SQL injection? SQL injection is a type of security exploit or loophole in which an attacker/defacer “injects” SQL code through a web form or manipulates the URLs based on SQL parameters. It exploits the web applications that still use client-supplied SQL queries.
The major form of SQL injection consists of code being directly inserted or injected into user-input variables that are attached with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are thereafter concatenated into a dynamic SQL command then the malicious code is executed. And then the site reads the SQL commands and runs as it programmed.

CROSS SITE SCRIPTING

Cross-site scripting  (XSS) happens when a user inputs malicious data into a website, which results in the application to do something it wasn’t aimed to do. XSS attacks are very famous and some of the biggest websites have been influenced by them, comprising the FBI, CNN, eBay, Microsoft, Apple and AOL.
Some website features that are  commonly vulnerable to XSS attacks are:
• Search Engines.
• Login Forms.
• Comment Fields.
Cross-site scripting gaps are web application vulnerabilities that enable the attackers to avoid client-side security mechanisms normally shown on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.
To learn more about XXL  stay connected.

REMOTE  FILE INCLUSION

Remote file inclusion is the vulnerability most frequently found on websites.
Remote File Inclusion (RFI) occurs when a remote file, usually a shell (a pictorial interface for browsing remote files and running your own code on a server), is included on a website which allows the hacker to execute server-side commands as the currently logged-on user, and have access to files on the server. With this power, the hacker can continue on to use local
exploits to Gain his privileges and take over the whole system (it sound like GOD)  :-D
RFI can lead to the following significant things on the website:
Code execution on the webserver
Code execution on the client-side, such as Javascript, which can lead to other attacks such as cross site scripting (XSS)
Denial of Service (DoS)
Data Theft/Manipulation

LOCAL FILES INCLUSION

Local File Inclusion (LFI) is when you have the ability to search through the server data by just getting the location of the directory. One of the most common uses of LFI is to discover the( /etc/passwd) file. This file contains the user information or data of a Linux system. Hackers find websites vulnerable to "LFI" the similar way I discussed for RFIs.
Let’s say a hacker found a vulnerable site, like "www.target-site.com/index.php?p=about", by means of directory transversal he would then try to browse these lines below
(http://example.com/?file=../../../../etc/passwd)
This search can give vital information about the victim site.

DDOS ATTACK

This is simply called a Distributed denial-of-service attack. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an experiment to make a computer data unavailable to its loved users. In DDOS attacks we consume the bandwidth and resources of any website and make them unavailable to its legitimate users.
In simple words, DDOS  can cause the website to get shut down for a particular time. If a person visits it, the website will show an error ⚠️
To perform DDOS with android stay connected or add your comments.

EXPLOITING VULNERABILITY

This is the thing that requires a little brain as you need time to find some loopholes in the site and you have to give time to to make the hole bigger to enter into it. By the way, there are many ways to find the vulnerability of a site as there are so many sites with different vulnerability so you have to try different-different methods to crack it.

Conclusion

So for hacking a website you generally need a basic concept of Coding. It will help you a lot. For more informative content say connected to this blog. Further, I will teach you How XXL, SQL, LFI etc.etc works.
This is the method that you can apply to open or gain the Admin privileged of a website but it is strictly punishable act please don't do it for a bad purpose.

No comments:

Post a Comment

COMMENT BOX IS FOR YOU,NOT FOR ME !!!SO USE IT AS MUCH AS POSSIBLE!!!

MUST WATCH😉

Contact Form

Name

Email *

Message *