Skip to main content


Showing posts with the label Website Hacking

Simplest way to Hack IBM BladeCenter Management Devices

Hi Everyone, Today I will show you the simplest way to hack IBM BladeCenter devices whose password has not been changed i.e. using the default credentials. Before beginning this tutorial you should know the default credentials used by most IBM BladeCenter devices : Username : USERID ; Password : PASSW0RD (it’s Zero not O) So lets begin, Step 1 : Click on the Link to open Shodan website -> About Shodan , Shodan is a very powerful tool which helps to find different vulnerable network devices and helps us to gather ample amount of information about a network. Step 2 : Once the Url is loaded, type /private/main.php in the search box which will basically help you to get multiple IBM Management console list available publically . See the image below for reference. Step 3 : It will list lots and lots of Vulnerable devices,now just try out your luck . Some or more devices might be using the default credentials. I got one!! Step 4 : Once you g

How to hack VP-ASP Shopping websites and get all the Database details

Hello Friends, Today we are going to learn how to hack VP-ASP cart of a Shopping website and download all their Database details like Customer details, Credit card details, Product details etc. So some basic idea before starting the Tutorial,  What we are going to do here? Firstly we will hack a shopadmin website then we will download the database file which will be in the form of *.mdb. This database file contains all the client details like credit card information and also login name and passwords. How to do this ? Note : This tutorial is tested on "VP-ASP Shopping Cart Version:5.00" Step 1 : First thing to do is to find VP-ASP 5.00 Sites, to do this -> Go to -> Type "VP-ASP Shopping Cart 5.00"[ Without Quotes ] . See the image for reference  Step 2 : In this tutorial, we are going to target  You can also select your website which is having "shopdisplaycategories.asp","sho

How to hack websites using Manual SQL injection

Hello Friends, Today we are going to learn how to hack a website using Manual SQL injection. The website which we will be using in this demo is : So, here is the Vulnerable link :'100 So lets begin : Step 1 : First we have to find the number of columns present in the database. So to do that we have to implement the "order by" command in the vulnerable site. Example:  order by 7 (any no. u have to guess it, i m using 13 ) *Remember if u get error in "order by 7" that means site has less than 7 columns,if we get the same page then the no. of columns is more than 7.. In my case the number of columns are 13. Step 2 : After getting the columns, its time to get the vulnerable column by using "UNION SELECT" no. of all columns 1 after another separated by commas(,). See the example for more clarification : Example : 

Acunetix Web Vulnerability Scanner Version 8 with Patch

The first question which arises on our mind is , what is Acunetix web vulnerability scanner and whats its purpose??? so here your's answer : Acunetix is used for : An automatic client script analyzer allowing for security testing of Ajax and Web 2.0 applications  Industries' most advanced and in-depth SQL injection and Cross site scripting testing  Advanced penetration testing tools, such as the HTTP Editor and the HTTP Fuzzer  Visual macro recorder makes testing web forms and password protected areas easy  Support for pages with CAPTHCA, single sign-on and Two Factor authentication mechanisms  Extensive reporting facilities including VISA PCI compliance reports  Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease  Intelligent crawler detects web server type and application language  Acunetix crawls and analyzes websites including flash content, SOAP and AJAX  Port scans a web server and runs security checks against net

IMCE Mkdir remote deface,upload & exploits

What is IMCE Mkdir ? IMCE Mkdir is a remote file upload vulnerability on drupal platform, normally you can upload .txt, .png , .jpg and .gif extensions on websites but some sites allows you to upload .html files , if you want to upload shell on website then try in .phtml extension . Google Dork inurl:"/imce?dir=" intitle:"File Browser" Exploit Shell Access* ----or-----* * Change the website name with your vulnerable website and abc with directory Step 1 : First of all find a vulnerable website using google dork stated above . Step 2: After opening site go to and find upload option there . Example : Step 3 : Now Upload your file which must be in either of the format : .jpg , .gif , .png , .html , .phtml , .pdf etc. Step 4 : To access your shell/defa