Protect against SQL Injection Unknown 5:48 AM 0 comments There are more ways.. 1 of them is- with blocking the SQL commands function mysqlesc($input) { $input = str_ireplace('\'...
Common Methods for Hacking Unknown 1:19 PM 1 comments Common Methods for Hacking : This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. foll...
How to get a list of emails every day! with METASPLOIT Unknown 12:54 PM 0 comments How to get a list of emails every day! with METASPLOIT 1 - First of all open your Metasploit console 2 - search gather 3 - use...
Defence against SQL injection Unknown 4:30 AM 0 comments GPC, 3 ways of authentication. G- GET, P – POST and C – Cookie. Hackers, often use GET method to inject their “union+select+” queries o...
What is sql injection – Basic Unknown 4:08 AM 0 comments What is SQL Injection? Google dorks? Is my site vulnerable? ORDER BY ?-- UNION SELECT VERSION() Table_Name Column_...