Author Topic: Different methods of hacking websites and/or getting access to other computers?  (Read 1178 times)

0 Members and 1 Guest are viewing this topic.

Offline Titanisking

  • NULL
  • Posts: 2
  • Cookies: 0
  • None of us are as cruel as all of us expect us all
    • View Profile
I know for websites there is SQL injection, DDoS/DoS, and XSS but are there anymore website hacking techniques? I know for getting control of other computers one would use either a botnet or RAT, are there any other things someone could use? besides viruses/worms? Thanks
Learn what you can, share what you know, teach what you've mastered

Offline d4rkcat

  • Knight
  • **
  • Posts: 287
  • Cookies: 115
  • He who controls the past controls the future. He who controls the present controls the past.
    • View Profile
    • Scripts
Check out http://www.exploit-db.com/ and read about the myriad of different ways things get hacked.

Also hack this webapp.

Good Luck!
Jabber (OTR required): thed4rkcat@einfachjabber.de    Email (PGP required): thed4rkcat@yandex.com    PGP Key: here and here     Blog

<sofldan> not asking for anyone to hold my hand uber space shuttle door gunner guy.


Offline vezzy

  • Royal Highness
  • ****
  • Posts: 771
  • Cookies: 172
    • View Profile
Quote from: Dippy hippy
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet

Offline Pussy

  • NULL
  • Posts: 3
  • Cookies: 0
  • Content Blocked!
    • View Profile
You can use metasploit. If you want to learn I will recommend you to setup windowsXP virtual machine and try exploits on it. Using netapi exploit with some payloads will get computer access. though I am also learning metasploit these days and its really Interesting.


GL
--------

Offline voodoo

  • Serf
  • *
  • Posts: 42
  • Cookies: 4
  • Try Harder
    • View Profile
    • Security Voodoo
There are many many methods one may use to approach breaking into a web application.  It all depends on what mistakes the web-devs make.  For example, lets say you were poking around a website and found that the file types for uploads are not being checked.  This could allow you to upload a simple php script to the server and run it by requesting it through your browser.  This is unfortunately something that you will come across more often than not.

If you want to learn more and practice some web exploitation there are a few sources out there that you can use for practice like the DVWA (Damn Vulnerable Web Application)

I would also suggest checking out www.vulnhub.com.  Specifically the DE-ICE iso's.
keep it simple