Live Ddos View

Live DDoS Attack Map | Apakau

Live DDoS Attack Map

This map is the fruit of collaboration between Google Ideas and Arbor Networks in an effort to raise awareness about distributed denial of service attacks in the world everyday.

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:

  • Use the histogram at the bottom of the map to explore historical data.
  • Select a country to view DDoS activity to or from that country.
  • Use the color option to view attacks by class, duration, or source/destination port.
  • Use the news section to find online reports of attack activity from a specified time.
  • View the gallery to explore some examples of days with notable DDoS attacks.

Sign Up

Monday, August 31, 2015

Bypassing Login Panel with SQL Queries


In This Tutorial you Will  Learn How to Bypass Login Panel with SQL Injection Queries.
So Actually we give our SQL evil Queries in Admin Panel And Then The Server Filter Our Command  and give us Access To the Admin Panel without using any username or Password.

Before start Injecting in Admin Panel we need Hackbar or Live HTTP Headers Addon installed in Browser.
We will Give our SQL Queries to the Server with POST Method so we need these Addons for Execution our POST Parameters Injection.
i've put a Site for our This tutorial.
Here is the Target site

http://trentglobal.com/admin

We can use Live HTTP Headers or Hackbar for Post Parameters Injection so i will Use Hackbar For this Process.
Now Lets Insert Some Text in username and password boxes.After Inserting Text Click on LOGIN Button.Then Enable Post Data in Hackbar for the Execution of Our Post Parameters.
Bypassing Login Panel with SQL Queries
Now Click on LOAD URL Button in Hackbar to get POST Parameters in POST DATA box in Hackbar Addon.There we will give our SQL injection Queries.
Bypassing Login Panel with SQL Queries
It gives us Invalid Username and Password but you can See the Post Data in Hackbar Addon.
Here is Our Post Parameter uname=raijee&pwd=123456&log_submit=Login
let's Add Single Quote after uname=raijee' to check The SQLi vulnerability.And Then Execute the Query.
Bypassing Login Panel with SQL Queries

It is Vulnerable to SQL Injection.Next we will execute STRING Based SQL Query for Further Injecting.
Now Let's Count how Many Columns are there.
So We will Give our Command For counting Columns in Post Parameters with Hackbar.
uname=raijee' order by 2%23
No Error !!

uname=raijee' order by 3%23
No Error !!

uname=raijee' order by 4%23
No Error !!

uname=raijee' order by 5%23

Bypassing Login Panel with SQL Queries

We Got Error !!  Unknown column '5' in 'order clause'
it Means There are 4 Total number of Columns.
Hmmm Now Let's Execute our UNION SELECT command with 4 number of Columns.
Bypassing Login Panel with SQL Queries
BinGOOOO!! Admin Panel Bypassed .we have got Access to the Admin Panel Without using Username or Password of the Admin user.

~Xrystyg Keinourq


Sunday, August 30, 2015

Create Socks Proxy Through SSH Tunnel in Kali Linux

Log in to using the following command ssh

Code: [Select]
ssh -D 8099 root@192.168.1.56
Setup ProxyChains configuration

Code: [Select]
nano /etc/proxychains.conf
Add the following line
socks4 127.0.0.1 8099

Now you can use proxychains. Examples:

Code: [Select]
proxychains rdesktop 192.168.56.5
Code: [Select]
proxychains msfconsole

~Phr3ak

Thursday, August 6, 2015

SQL Injection Bypassing handbook


Content writers :-

Chapter I:::
 

  • SQL Injection: What is it?
  • SQL Injection: An In-depth Explanation
  • Why is it possible to pass SQL queries directly to a database that is hidden behind a firewall and any other security mechanism?
  • Is my database at risk to SQL Injection?
  • What is the impact of SQL Injection?
  • Example of a SQLInjection Attack

WebApplication Firewalls::


  • Detecting A WAF
  • Prompt Message
  • Dotdefender
  • Observing HTTP Response

Chapter II

Advanced evasion techniques for defeating SQL injection Input validation mechanisms
Web applications are becoming more and more technically complex. Web applications, their

  • Whitespace
  • Null Bytes
  • SQL Comments
  • URL Encoding
  • Changing Cases
  • Encode to Hex Forbidden
  • Replacing keywords technique
  • WAF Bypassing – using characters
  • HTTP Parameter Pollution (HPP)
  • CRLF WAF Bypass technique
  • Buffer Overflow bypassing
Chapter III

Let's see the matter in an orderly fashion from the beginning

  • See If Site vulnerability Or Not
  • Get Column Number
  • Bypassing union select
  • Get Version
  • Group & Concat
  • Bypass with Information_schema.tables
  • Requested Baypassing
Chapter IV

Other issues related to the subject

  • Null Parameter
  • FIND VULNERABLE COLUMNS
  • Count(*)
  • unhex()
  • Get database
Download : MediaFire

PHP Security Training Video


Topics Of the Course !!!

what is the threat ? 

  • How can you Analyze the threat ?
  • what Types of threats Are out there?
  • How bad is it ?
  • what Threats Are Specific to PHP?
  • what are some resources to find out more ??


what are the Consequences when a website is not protected Against Attack?

  • Financial loss
  • Loss of Service
  • identity Theft
  • website infection


what are most common forms of aTTack?


  • Cross site Scripting(xss)
  • Remote Code injection 
  • session hijacking, fixaion, and request forgery Sql injection

what Are the  Most  Common  Vulnerabilities aTTackers can Exploit?


  • unplanned information disclosure
  • predictable resource location
  • insufficient authorization
  • improper accesss controls
  • PHP misconfiguration
  • Mishandling file uploads

Download: Medaiafire