SQL Injection with Havij Tutorial #Basic
First you should read text tutorial is better you will understand and below have Video make you understand more !!!
I hope you enjoy with text first because alot of people or newbie need to know about basic you should read it !!!
First need Havij Tool : HereGoogle dork : Here
I hope you enjoy with text first because alot of people or newbie need to know about basic you should read it !!!
HashTags: #Anonymous, #opNewBlood, #opNewBlood2013, #Hacking, #SQLi, #Combing
[ Web Exploitation ] -> [ SQL Injection ] -> [ URL/Combing, Automated/Time-Based SQL Injection ]
============================================
+ Building a Strong Foundation For Hacking +
============================================
*** This is the fourth video tutorial of a series I am making for the New-Blood ***
After completing this video, you will be a computer hacker. What you choose to do with this information is up to you.
It usually takes a couple of hacks to determine if you're a black-hat hacker, grey-hat hacker or white-hat hacker, there are other types
of hackers also.
*** It's very important that you learn HTML and PHP so you can familiarize yourself with web forms/functions and variables ***
- SQL Injectable URL Combers/Dorks and Automated, Time-Based SQL ( Structured Query Language ) Injection Methods using Havij and SQLMap -
---------------------------------------------------------------------------------------
Intro, SQL Structure, Dorks
(01): - Now that you have your Operating System completely Secured with Stealth Ports, ToR, a VPN,-
Encrypted Partition(s)/Disks you can begin Combing and Exploiting-
vessels across the open waters of the Internet. Before we begin, you will-
need to know a little about the different types of SQL Engines and SQL Structure-
all together.
SQL is an acronym which stands for Structured Query Language, many people mispronounce SQL-
and say "sequel", however, this is hugely incorrect. Since SQL-
is an acronym it is simply stated/pronounced "ES, QU, EL". There-
are different SQL engines such as MySQL, PostGRESQL, mSQL or miniSQL, Microsoft SQL Server.
These are all relational database systems. Their structures are quite similar,-
but each have different sets of functions/function names-
which are proprietary to their engines. The most popular and widely used SQL engine as of 2012 is MySQL.
The structure of the SQL databases are like this:
Database NAME ( SQL_Database ) -> Table NAME ( Table_Name ) -> Column NAME ( Column_Name ) -> DATA
For Instance:
NSA_Database -> Administrator_Login -> Admin_Name, Admin_Pass -> Keith_Alexander, NSADawg
So if I were to go and attempt to login to the NSA_Database using some form/function embedded-
in an application or web page that calls upon the database-
above I would login using the username: Keith_Alexander with a password of: NSADawg
What is a Dork? A Dork is a keyword to search for such as index.php?pageid= which is just 1 Dork. You can put that dork into the Google search
engine and it will pull up websites that have that URL in their site structure. There are simple and advanced dorks. There are dorks which will
land you a wealth of juicy information. Using Google Search to Dork is called Google Dorking, using Yahoo Search to Dork is called Yahoo Dorking.
There are many scripts available which use multiple search engines simultaneously to comb for thousands of dorks and return thousands of injectable
URLs.
---------------------------------------------------------------------------------------
Combing For Injectable URLs
(02): - You need some kind of program or script to comb for injectable URLs and list them neatly into a text file for automated injection,
Lucky for you I have modified a version of SmartDorker for you.
If you're running Windows Operating System you need to download Python 2.7.3 From:
( http://www.python.org/download/releases/2.7.3/ )
Install Python 2.7.3
Then you need to grab the modified SmartDorker which I renamed to Conviction From:
( http://www.anonpaste.me/anonpaste2/index.php?d9c085373a41f7fb#PKHEdfTWLKkvjB8LB3dcLMFsbuWv1OFC2YtKCQ6CBNY= )
Highlight all of the text, copy and paste it into a notepad, save the file as "Conviction.py" and put it somewhere on your Hard Disk.
Open a CLI/Command Prompt and locate "Conviction.py" by typing:
Command Prompt: cd path/to/Conviction.py <-- you will need to locate Conviction.py e.g. cd C:\Conviction.py <-- Case sensitive.
You will be greeted by the intro message of the script, then type the domain extension you want to comb, e.g. GOV, COM, NET, ORG. INFO
Command Prompt: SE <-- Sweden/Swedish Domain Name Extension
Command Prompt: # of Dorks to use <-- this is where you specify the amount of dorks to use when scanning, if you have a lot of bandwidth and
a high speed connection you can set this to 500 and above.
Command Prompt: # of Threads to use <-- this is where you specify the amount of threads to use when scanning, if you have high CPU power you can
set this to a high value such as 400.
Command Prompt: # of pages to fetch <-- this is where you specify the number of pages to search and collect and test for vulnerabilities. If you
have a high speed connection you can set this to 1000+
When the scan has completed set your options for scanning/testing for vulnerabilities and move on to Havij and SQLMap.
---------------------------------------------------------------------------------------
Using Havij and SQLMap to Exploit Vulnerable URLs
(03): - You need to download Havij From:
( http://www.itsecteam.com/products/havij-v116-advanced-sql-injection/index.html )
And also download SQLMap python script From:
( http://sqlmap.org/ )
Unzip SQLMap and put it somewhere on your Hard Disk.
Open a Command Prompt/CLI and locate SQLMap.py and type SQLMap.py
Run Havij as an Administrator.
For SQLMap you simply need to type SQLMap.py -u ( PUT URL HERE ) --dbs and SQLMap will test the URL for a vulnerability and exploit it.
SQLMap has many switch functions that you can specify for more detailed injections.
For Havij you simply need to paste the URL into the Target field and press Start, you can adjust the settings in Havij for different URLs.
---------------------------------------------------------------------------------------
Cracking Hashed Passwords
(04): - There are many places on the web with whole databases with millions of entries of cracked hashes from different hash algorithms.
In other words many people have dedicated their computers to hashing millions of random passwords into hashes and lining them up with their
non-hashed versions and put them into a query-able database that you can search. If you come across a hashed password you will need to identify
the algorithm by downloading a HASH ID script. You can download one From:
( http://www.anonpaste.me/anonpaste2/index.php?e88e8a2ec978fd3f#32bDnPJgdqMXITMyOibwSN0hEYZj0fCmF9XqyrsO3RA= )
Highlight all of the text, copy and paste into a notepad, save the file as HashID.py.
Open a Command Prompt/CLI and locate the HashID.py and type HashID.py
Say for instance you come across one of these hashed password in some database you have exploited. Copy the hash string and paste it into HashID.py
The script will tell you which hash algorithm the password is encoded in. In this instance I have come across an MD5 hashed password. MD5 is the name
of the hash algorithm. Now we need to crack that hash string. You will be able to crack hashes about 66% of the time by using the web. The other 33%
you will need to use your own CPU/GPU or CPU+GPU power to crack the hash using HashCat64 GUI+CLI. Search the web for "MD5 Decrypter" to use the web to
crack the hash you have found. You will need to watch the video on using HashCat64 GUI+CLI to learn how to crack hashes using that program.
---------------------------------------------------------------------------------------
I Got In! Now What?!
(05): - If you made it this far you're almost a hacker. Now that you have access to the database I'm sure you're wondering, what do I do with it?
Well this all depends on what kind of information is in the database, if it's juicy government information I wouldn't go sharing it with anyone
quite yet. You should analyze the information and see what that information might implicate or where it could lead to. I cannot begin to tell you
how many government domains I've gotten access to which contain enlightening information on how they operate, communicate and do things. I have
also used that information to get access to their emails, credit card information, location, mortgages, travel info, education, family relations, etc
etc. If there really isn't anything great about the information or if it doesn't lead anywhere else then you can always just do a deface of the site
and put up a picture of Anonymous/AntiSec and force a redirect to some other site to spread the word, or, what I like to do is upload my own
personal shell that I wrote so I can have full control of the server. I then use the server and its bandwidth in DoS attacks, laundering credit card
funds, logging traffic and activity on the server, etc. I am not a black-hat hacker, I am a good person and my actions are good. I use DoS attacks
for the greater good of the Internet by firing upon anti-freedom government sects, anti-freedom corporate sects, MPAA, RIAA, etc. I launder credit
card funds so I can make sizable donations to good organizations, order pizza and survive off the funds. It's okay because the only one that loses
out are the banks/credit card companies and they're evil and wealthy entities so it doesn't matter.
So do what you think is the correct action with the database you have acquired.
---------------------------------------------------------------------------------------
So, You're A Hacker?!
(06): - What does it feel like? What will you do with the information I have given you? The majority of Anonymous are Egalitarianistic Libertarians and are
genuinely interested in the wellbeing, growth of intelligence and freedom of people worldwide. There are factions within Anonymous that are not
like this however, I have seen factions that operate PsyOps ( Psychological Operations ) campaigns on other factions within Anonymous. These groups
are spreading disinformation either for lulz or because they don't want newbies acquiring skill in our community. We do what we do because we care
about freedom in real life and freedom on the Internet. Make us proud Anon, Welcome to Anonymous.
Check out: ( https://whyweprotest.net/ )
---------------------------------------------------------------------------------------
:: Hackers Anonymous Motto ::
We are Anonymous
We Are Legion
We Do Not Forgive
We Do Not Forget, Because None of Us Are As Cruel As All of Us
United As One
Divided By Zero
EXPECT US
So when you read it i think you are understand and now let's follow step of video is better if you read it you can understand and 3 videos will make you understand and better for Learn Basic Havij SQL Injection
Video Tutorial Part 1,2,3 Step by step of SQL Injection with Havij
let's start with Video Tutorial GO GO ===>
Part 1
Part 2
Part 3
I hope you agree my english skilll !!
Content us : Here
Note : ( For Education Only )