<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Techno Master's H@ck3r'$ Blog</title><description>For ALL you hacking needs</description><managingEditor>noreply@blogger.com (Techno Master)</managingEditor><pubDate>Sat, 5 Oct 2024 04:05:03 +0200</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">11</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://technomasterhacking.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>No information may be copied or redistributed without prior consent with the owner</copyright><itunes:subtitle>For ALL you hacking needs</itunes:subtitle><itunes:author>Lemuel Botha</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>Lemuel Botha</itunes:name></itunes:owner><item><title>WEBINAR</title><link>http://technomasterhacking.blogspot.com/2012/02/webinar.html</link><category>assistance</category><category>Hacking</category><category>Seminar</category><category>teach</category><category>Tutorial</category><category>Video</category><category>Webinar</category><pubDate>Fri, 10 Feb 2012 10:24:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-6244294067088894270</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;I will be hosting a&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: x-large;"&gt;WEBINAR!!!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;span style="font-size: small;"&gt;During the webinar we will be discussing a variety of hacking techniques and methods as well as answering your questions.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;span style="font-size: small;"&gt;Dates will be available soon.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;span style="font-size: small;"&gt;Please comment if you will be able to attend the webinar.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;span style="font-size: small;"&gt;(For those of you who do not know, a webinar is an online seminar, basically, you join in with your comuter and have the ability to ask questions and interact)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;span style="font-size: small;"&gt;See you soon.&lt;/span&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>A Double Tutorial - CSRF &amp; SQL Column Truncation</title><link>http://technomasterhacking.blogspot.com/2012/01/double-tutorial-csrf-sql-column.html</link><category>Attacks</category><category>Cross Site Request Forgery</category><category>CSRF</category><category>Hacking</category><category>LFI</category><category>Security</category><category>SQL</category><category>SQL Column Truncation</category><category>Truncation</category><category>Tutorial</category><pubDate>Mon, 30 Jan 2012 22:28:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-177340069818369820</guid><description>&lt;div style="text-align: center;"&gt;So today we have a double tutorial...&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;We will be looking at 2 new hacking methods:&lt;/div&gt;&lt;div style="text-align: center;"&gt;CSRF (Cross Site Request Forgery)&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;amp;&lt;/div&gt;&lt;div style="text-align: center;"&gt;SQL Column Truncation&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;To begin we will look at CSRF, now CSRF is basically a hybrid between XSS (Cross Site Scripting) and LFI (Local File Inclusion)&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: black; text-align: center;"&gt;&lt;span style="background-color: yellow;"&gt;&lt;span style="background-color: red;"&gt;Side  Note: We will be looking at those 2 vulnerabilities at a later stage, this technique is very simple and straight forward, so a tutorial on XSS prior to this is not really necessary.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="color: black; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: black; text-align: center;"&gt;In CSRF, the victim is basically sent to a different page without his knowledge.&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;Say we have a website with a form that allows us to edit our profile, normally comprising of:&lt;/div&gt;&lt;ul style="text-align: center;"&gt;&lt;li&gt;&lt;div style="text-align: left;"&gt;&lt;span style="background-color: yellow;"&gt;&lt;span style="background-color: red;"&gt;&lt;span style="background-color: white;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Avatar&lt;/div&gt;&lt;/li&gt;
&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;"&gt;Password&lt;/div&gt;&lt;/li&gt;
&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;"&gt;Email Address&lt;/div&gt;&lt;/li&gt;
&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;"&gt;Interests&lt;/div&gt;&lt;/li&gt;
&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;li&gt;&lt;div style="text-align: left;"&gt;etc&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: black; text-align: center;"&gt;&lt;span style="background-color: lime;"&gt;Remember, an image stored on a website is always stored on a server and the image is retrieved every time that image loads...&lt;span style="background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;Now  say our form is set up with a text box as to where you must insert your  server address for your new avatar, you need to instead of giving a  server address, insert a script that will allow you to alter details of  your profile.&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;So  the first thing you will need to do, after logging in and navigating to  the edit profile page, is to view the source code of the edit page.&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;You will notice that the form action has something similar to &lt;code&gt;&amp;nbsp;&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;.edit/profile.php &lt;/code&gt;&lt;br /&gt;
or something to that effect&lt;br /&gt;
So to begin with insert that line(the form action) into the avatar text  box, next you insert a ?, so the text in the text box will be:&lt;br /&gt;
&lt;code&gt;.edit/profile.php?&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
The  question mark is always followed by a parameter and&amp;nbsp;the parameter&amp;nbsp;is whatever we want to edit on the profile, so next you need to  view the source code again, and look for the line that allows you to  change your password and see what it's name is, remember that as that is  our parameter:&lt;br /&gt;
&lt;code&gt;.edit/profile.php?password&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
Now finally, add an "=" afterwards directly followed by what you would like the password to be, for example:&lt;br /&gt;
&lt;code&gt;.edit/profile.php?password=hacked&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
Now, lets imagine that a&amp;nbsp;victim,&amp;nbsp;for example Admin,&amp;nbsp;goes to view your password for some reason,  when the victim's browser goes to retrieve the image (the edit page we  set) it will execute the edit profile page as the victim which would  change whatever information we set it to change as, in this case, the  password.&lt;br /&gt;
&lt;br /&gt;
This will edit any user who views your image's information.&lt;br /&gt;
Typically,  the password access you will gain will be that of a robot or spider,  but with that access, you have a very good chance that gaining admin  rights will now be relatively easy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next up is....&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***SQL COLUMN TRUNCATION***&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SQL Column Truncation is also a very simple and effective technique that can be used to hack websites.&lt;br /&gt;
Basically,  SQL Column Truncation gives you the ability to duplicate usernames in  an SQL database and therefore giving you access to that user account.&lt;br /&gt;
&lt;br /&gt;
To  begin, let us imagine that you have discovered that the admin's  username is Admin, now, regardless of the password, you will be able to  log in as Admin and also make use of administrative rights, to do this  you need to understand a few things first.&lt;br /&gt;
&lt;br /&gt;
An  SQL database does not recognize spaces, that is why on many website  registrations, your username and password may not contain a space, in  SQL, a space is completely ignored, for example:&lt;br /&gt;
&lt;br /&gt;
Hacking is awesome&lt;br /&gt;
will be stored as&lt;br /&gt;
Hackingisawesome&lt;br /&gt;
&lt;br /&gt;
Also,  the database table will have rules set that will determine how many  characters may be stored in a cell, if that number is exceeded, the  additional characters will be dropped and only the allowed number of  characters will be stored, for example:&lt;br /&gt;
&lt;br /&gt;
If  the database only allows for 10 characters in the cell, and a user  attempts to insert 15 characters, the first 10 will be stored and the  last 5 numbers will be dropped, for example:&lt;br /&gt;
&lt;br /&gt;
CookieMonster&lt;br /&gt;
&lt;br /&gt;
will be stored as&lt;br /&gt;
&lt;br /&gt;
CookieMons&lt;br /&gt;
&lt;br /&gt;
"ter" has been dropped as they have exceeded the maximum amount of characters allowed to be stored.&lt;br /&gt;
&lt;br /&gt;
Now,  go to register a new account, next you need to view the source of the  page, as there is a character limit added onto the SQL database, the web  master would have added in HTML code to the username text box a maximum  number limit, say you have discovered this to be 10.&lt;br /&gt;
&lt;br /&gt;
In  the textbox, insert Admin followed by 5 spaces, as Admin is 5  characters long and adding another 5 spaces will make the username 10  characters in total, the text box will restrict you from adding in any  more characters.&lt;br /&gt;
&lt;br /&gt;
Please  Note: For the next step I will be using Tamper Data (a firefox add-on),  if you would like information on how to do this without using Tamper  Data, comment below.&lt;br /&gt;
&lt;br /&gt;
Open  Tamper Data and start the tamper, tamper the&amp;nbsp;request that will submit  your registration form and then add an x to the end of your "Admin &amp;nbsp; &amp;nbsp; "  string, therefore, you will now have this:&lt;br /&gt;
Admin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x&lt;br /&gt;
&lt;br /&gt;
(The  x is there because if it wasn't there, the username would never be  passed to the SQL database, because the moment the spaces were removed  it would notice the duplicate data - The x can be any other character)&lt;br /&gt;
&lt;br /&gt;
Now  when that username is submitted, the entire username will be added to  the cell (because of the x it is not equal to admin), but because it is  11 characters, which is too large for the database to handle, according  to the rules set by the admin, the database will drop the additional  characters, in this case, x.&lt;br /&gt;
&lt;br /&gt;
After  the character has been dropped, the database will now remove the spaces  and store "Admin" as the final string, but because it is actually  "Admin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x", the database does not recognize it as Admin.&lt;br /&gt;
&lt;br /&gt;
Finally,  log in as Admin with the password you just set at registration and  you will find that you are logged in with administrative rights.&lt;br /&gt;
&lt;br /&gt;
--- Final Summary ---&lt;br /&gt;
&lt;br /&gt;
Both  these methods will get you admin access, the first thing that you  should do after gaining access, should be to go and clear your logs.&lt;br /&gt;
&lt;br /&gt;
Also  remember, that when&amp;nbsp;using the CSRF method that the victim WILL discover the  password change the next time he attempts to log in, so you will have to  log in immediately and attempt to grant yourself admin rights (There  are multiple ways to achieve this)&lt;br /&gt;
&lt;br /&gt;
Now,  using the SQL column Truncation method, on the other hand, is a lot  less likely to be discovered, but still is a possibility, you should  also try and grant another one of your accounts admin rights and use  your Admin account sparingly, also, you would have a better chance of  remaining undiscovered if you clear the logs every time you log in as  Admin.&lt;br /&gt;
&lt;br /&gt;
Although, if the administrator were to check or clean the database, your database account may be discovered.&lt;br /&gt;
&lt;br /&gt;
Well I hope you enjoyed this tutorial and please feel free to comment.&lt;br /&gt;
Peace Out!!!&lt;br /&gt;
&lt;br /&gt;
Techno Master&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">11</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>Calling ALL Hackers</title><link>http://technomasterhacking.blogspot.com/2011/12/calling-all-hackers.html</link><category>Competition</category><category>Hacking</category><category>Legal</category><pubDate>Wed, 28 Dec 2011 18:48:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-2999155830519159928</guid><description>So, I know its been a really long time since my last post, but I have been really busy with exams and travelling and my website and starting my business etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyway, I am thinking about having a LEGAL hacking competition, all those who are interested please let me know by commenting on this post, details will follow according to the interest levels&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Post again soon guys</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>JavaScript Injections</title><link>http://technomasterhacking.blogspot.com/2011/11/javascript-injections.html</link><category>Injection</category><category>JavaScript</category><category>Poisonous Cookies</category><category>SQL</category><pubDate>Mon, 7 Nov 2011 22:34:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-7127618378554917330</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;JavaScript Injections&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt; &lt;/div&gt;&lt;br /&gt;
Ok, sorry it took so long to post this guys, but it's really difficult to balance college, work, running a blog, etc. Anyway, today we will discuss JavaScript injections and then also poisonous cookies.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;u&gt;Injection Basics &lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
JavaScript injections are run from the URL bar of the page you are visiting. To use them you must first completely empty the URL from the URL bar. That means no http:// or whatever.&lt;br /&gt;
&lt;br /&gt;
JavaScript is run from the URL bar using the javascript: protocol. I will only be showing you the basics of this, but if you already know javascript, you can expand on this using plain old javascript.&lt;br /&gt;
&lt;br /&gt;
The two commands covered in this blog post are the alert(); and the void(); commands. These are pretty much all you will need in most situations. For your first JavaScript, you will make a simple window appear, first go to any website and then type the following into your URL bar:&lt;br /&gt;
&lt;i&gt;javascript:alert('Hello, World');&lt;/i&gt;&lt;br /&gt;
You should get a little diagram box that says "Hello, World". This will be altered later to have more practical uses.&lt;br /&gt;
&lt;br /&gt;
You can also have more than one command run at the same time:&lt;br /&gt;
&lt;i&gt;javascript:alert('Hello'); alert('World');&lt;/i&gt;&lt;br /&gt;
This would pop up a box that said "Hello" and then another that says "World".&lt;br /&gt;
&lt;i&gt; &lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;u&gt;&lt;b&gt;Cookie Editing&lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
First off, check to see if the site you are visiting has set any cookies by using this script:&lt;br /&gt;
&lt;i&gt;javascript:alert(document.cookie);&lt;/i&gt;&lt;br /&gt;
This will pop up any information stored in the site's cookies. To edit any information, we make use of the void(); command:&lt;br /&gt;
&lt;i&gt; javascript:void(document.cookie="Field = myValue");&lt;/i&gt;&lt;br /&gt;
This command can either alter existing information or create entirely new values. Replace "Field" with either an existing field found using the alert(document.cookie); command, or insert your very own value. Then replace&lt;i&gt; &lt;/i&gt;"myValue" with whatever you want the field to be. For example:&lt;br /&gt;
&lt;i&gt;javascript:void(document.cookie="Authorized=yes");&lt;/i&gt;&lt;br /&gt;
Would either make the field "Authorized" or edit it to say "yes"... now whether or not this does anything of value depends on the site you are injecting it into.&lt;br /&gt;
&lt;i&gt; &lt;/i&gt;&lt;br /&gt;
&lt;i&gt; &lt;/i&gt;&lt;br /&gt;
&lt;i&gt; &lt;/i&gt;&lt;br /&gt;
&lt;i&gt; &lt;/i&gt;Now its time for some...&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Cookie Poisoning&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;A poisonous cookie is a user - edited cookie poisoned to perform a malicious attack. You can poison cookies with various different methods, e.g,&amp;nbsp; scripts, SQL injections &lt;/span&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;Here I will show you an example using SQL injections:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;&lt;i&gt;javascript:void(document.cookie="pass=' or 1=1--");&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;This will bypass login and you will either see a list of usernames or log in.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;&lt;i&gt;Thanks&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;&lt;i&gt;Hope you enjoyed this article&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;Techno Master&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>Combining Files</title><link>http://technomasterhacking.blogspot.com/2011/10/combining-files.html</link><pubDate>Tue, 25 Oct 2011 22:00:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-6150240931233026769</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;Combining Files&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;Today I will show you how to combine files together using the Command Prompt, this can be very useful for hacking sites that are vulnerable to LFI(Local File Intrusion).&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Firstly we will need to create documents to combine together:&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;(Note: These files are just example files, the files can be anything you want)&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Firstly I will create an image file named: picture.jpg&lt;/div&gt;&lt;div style="text-align: left;"&gt;Secondly, I will create a text file named: test.txt&lt;/div&gt;&lt;div style="text-align: left;"&gt;Lastly, I will create a rar file named: combination.rar&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Ok, next, create a folder and store all files to be combined in this folder&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;C:\Combine&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Next step is to open Command Prompt&lt;/div&gt;&lt;div style="text-align: left;"&gt;(Click Start, Run, type 'cmd' or 'command' - without the quotes', click enter)&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Once in command prompt, go to the file where your files are stored&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;cd C:\Combine&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;You will now see the directory on display&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;C:\Combine&amp;gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Next, type copy /b&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;(The /b ensures the files are copied as binary files)&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Type in, without the quotes, the following:&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;copy /b picture.jpg + test.txt + combination.rar&amp;nbsp; newfile.jpg&lt;/div&gt;&lt;div style="text-align: left;"&gt;press enter&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;The last file name is the name of the new file with combined files, you can chose this name&lt;/div&gt;&lt;div style="text-align: left;"&gt;If you view this file normally, you will see a standard image, using the open with command to view the file using the appropriate program will reveal the hidden files.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Hope you enjoyed this&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Peace Out&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Techno Master&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>SQL Injection Attack - A Step-by-step video tutorial</title><link>http://technomasterhacking.blogspot.com/2011/10/sql-attack-step-by-step-video-tutorial.html</link><category>Attacks</category><category>CrashOverron.Hacks. Common Vulnerability.Vulnerability</category><category>Hacking</category><category>SQL</category><category>Step - by - step</category><category>Video</category><pubDate>Sat, 22 Oct 2011 12:17:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-1813963703069498423</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/7H358PrFagc?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;/div&gt;Ok guys, continuing off of yesterday's blog of the SQL attack, we now have a step-by-step video tutorial, we are using the same methods and site as in the previous, this will just give you a better understanding of what is happening. Enjoy and don't forget to comment.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;u&gt;&lt;b&gt;Important Sites:&lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;u&gt;&lt;b&gt; &lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;br /&gt;
Download vulnerable web environment:&lt;br /&gt;
&amp;nbsp;&lt;a href="http://www.securityoverride.com/infusions/pro_download_panel/download.php?did=33%20"&gt;http://www.securityoverride.com/infusions/pro_download_panel/download.php?did=33 &lt;/a&gt;</description><enclosure length="0" type="Video" url="http://www.youtube.com/watch?feature=player_embedded&amp;v=7H358PrFagc"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Lemuel Botha)</author><itunes:explicit>no</itunes:explicit><itunes:subtitle>Ok guys, continuing off of yesterday's blog of the SQL attack, we now have a step-by-step video tutorial, we are using the same methods and site as in the previous, this will just give you a better understanding of what is happening. Enjoy and don't forget to comment. Important Sites: Download vulnerable web environment: &amp;nbsp;http://www.securityoverride.com/infusions/pro_download_panel/download.php?did=33</itunes:subtitle><itunes:author>Lemuel Botha</itunes:author><itunes:summary>Ok guys, continuing off of yesterday's blog of the SQL attack, we now have a step-by-step video tutorial, we are using the same methods and site as in the previous, this will just give you a better understanding of what is happening. Enjoy and don't forget to comment. Important Sites: Download vulnerable web environment: &amp;nbsp;http://www.securityoverride.com/infusions/pro_download_panel/download.php?did=33</itunes:summary><itunes:keywords>Attacks, CrashOverron.Hacks. Common Vulnerability.Vulnerability, Hacking, SQL, Step - by - step, Video</itunes:keywords></item><item><title>SQL Attack</title><link>http://technomasterhacking.blogspot.com/2011/10/sql-attack.html</link><category>CrashOverron.Hacks. Common Vulnerability.Vulnerability</category><category>SQL</category><category>Step - by - step</category><category>Tutorial</category><pubDate>Fri, 21 Oct 2011 00:02:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-7051117755566307327</guid><description>&lt;div style="text-align: center;"&gt;*Only sites which users have the rights to or have been given special permission may be hacked, I accept no responsibility and can not be accountable for any illegal acts that take place in conjunction with the information on this blog* &lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
So as I said, today's blog will be about SQL Attacks - I will be using a site created by CrashOverron setup on my localhost, to download the files to use the site, visit:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://securityoverride.com/infusions/pro_download_panel/download.php?did=33"&gt;http://securityoverride.com/infusions/pro_download_panel/download.php?did=33&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Ok, so I will be giving a step-by-step guide with screen shots(video will be uploaded tomorrow)&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 1: Discover a website that utilize an SQL database&lt;/u&gt;&lt;br /&gt;
&lt;u&gt; &lt;/u&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT5S9VZ0O-Ij2mjcfTq0IpmsBcZQL6UUhI4HIzsMT35VwO5RESp9qv84255AvBkLQ8WH-cI-jdKwQI98JSgNzBu0xNu_toFh17dj3d5_pvpkHtxZ0jIi5wGgkmo4o_6McbU6F3bvPlpzk/s1600/Step+1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT5S9VZ0O-Ij2mjcfTq0IpmsBcZQL6UUhI4HIzsMT35VwO5RESp9qv84255AvBkLQ8WH-cI-jdKwQI98JSgNzBu0xNu_toFh17dj3d5_pvpkHtxZ0jIi5wGgkmo4o_6McbU6F3bvPlpzk/s320/Step+1.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;u&gt; &lt;/u&gt;&lt;br /&gt;
Here is a site with an SQL database&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 2: Test the site for vulnerabilities&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
You start by typing in a logical statement at the end of the URL:&lt;br /&gt;
http://localhost/fake/index.php?page=products&amp;amp;id=1%20and%201=1--&lt;br /&gt;
&lt;br /&gt;
As you will see in the screenshot below, the page has not changed compared to the original screen&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLfb3eglCTCAW23W-bg33xRaNKiA3vkEXhEZ_pEFwoVj6xiOITV1yI1-bCI6ojqm5CKqn9h5Cr22kgef4dJ-ElJbvLV7TOIA3kbgfO011OAw_PXnbSgbwoND80Xq2O_pGXrhI9wc0TPZw/s1600/Step+2a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLfb3eglCTCAW23W-bg33xRaNKiA3vkEXhEZ_pEFwoVj6xiOITV1yI1-bCI6ojqm5CKqn9h5Cr22kgef4dJ-ElJbvLV7TOIA3kbgfO011OAw_PXnbSgbwoND80Xq2O_pGXrhI9wc0TPZw/s320/Step+2a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, we will type an illogical statement at the end of the URL:&lt;br /&gt;
http://localhost/fake/index.php?page=products&amp;amp;id=1%20and%201=0--&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_cT434LE0HutaKCRIBYgxhdoxCVgiJXKA3JNiP2_97z9KEtZMSvcpeOW3wty2O2zStiMy2DGMY5Ol8cpOUmY54yV3OUJEc7Q89YVCrM1YPx0YSJlo4dCUu8lpIBB0ReJ_EInuj-8Y1VM/s1600/Step+2b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_cT434LE0HutaKCRIBYgxhdoxCVgiJXKA3JNiP2_97z9KEtZMSvcpeOW3wty2O2zStiMy2DGMY5Ol8cpOUmY54yV3OUJEc7Q89YVCrM1YPx0YSJlo4dCUu8lpIBB0ReJ_EInuj-8Y1VM/s320/Step+2b.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;As you will now see, there has been quite a drastic change to the page. This confirms that there is definitely a SQL vulnerability on this website.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 3: Find total number of columns&lt;/u&gt;&lt;br /&gt;
&lt;u&gt; &lt;/u&gt;&lt;br /&gt;
&lt;u&gt; &lt;/u&gt;Next, we need to discover how many columns the SQL table has. To determine this, we use the ORDER BY command, by adding ORDER BY n (where n represents a number) we can determine how many columns there are&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZvLeV7dpjEJ3x1G18Azj0JwJaIO17RCyPTaqVpPLnhZ4gGwM9EdnsXzLuPhan5MH-obT-emBXN5m9LkQWiYAz2j1QuBWnenRgGsVDjewRIfqcsdAhoOWqr5kXcNVDTuecMWJLv_wJhl4/s1600/Step+3a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZvLeV7dpjEJ3x1G18Azj0JwJaIO17RCyPTaqVpPLnhZ4gGwM9EdnsXzLuPhan5MH-obT-emBXN5m9LkQWiYAz2j1QuBWnenRgGsVDjewRIfqcsdAhoOWqr5kXcNVDTuecMWJLv_wJhl4/s320/Step+3a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
If there is no error then increase n by 1, continue to do so until you receive an error&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg25D4JmIk01mck9FQqXv65DkeECZ1SURpQ6hw7zW6L19Xr76OgP3zV1mgLC4AIFfi_rjswEKfK0FJuVc6bG3DVSBOFVLguIbu9-hjrLxv8jGsKb2wjwdM6q8em1DWXW4LnPhmpX9jp78g/s1600/Step+3b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg25D4JmIk01mck9FQqXv65DkeECZ1SURpQ6hw7zW6L19Xr76OgP3zV1mgLC4AIFfi_rjswEKfK0FJuVc6bG3DVSBOFVLguIbu9-hjrLxv8jGsKb2wjwdM6q8em1DWXW4LnPhmpX9jp78g/s320/Step+3b.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Once you have received an error, take n - 1 = x&lt;br /&gt;
&lt;br /&gt;
x = number of columns in the SQL table&lt;br /&gt;
&lt;br /&gt;
(There is a possibility that there may be many many columns, if that is the case change your increment from 1 to 10, for example, until you can determine the exact number of columns)&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 4: Display table names&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
You&amp;nbsp; will now need to display all the table names so you can choose which table to use, firstly change 'id=1' to 'id=-1', we do this because there is no data in the array position, then add this to the URL:&lt;br /&gt;
union select 1,2,3,4 from information_schema.tables--&lt;br /&gt;
&lt;br /&gt;
Union is basically the command that alerts the SQL tables it is needed&lt;br /&gt;
Select is the command to select certain information&lt;br /&gt;
1,2,3,4 is the amount of columns we have (all numbers &lt;u&gt;&lt;b&gt;MUST&lt;/b&gt;&lt;/u&gt; be entered)&lt;br /&gt;
from is telling the SQL database where to collect information from&lt;br /&gt;
information_schema is the MySQL master tool&lt;br /&gt;
.tables tells the information_schema that we are going to be interacting with tables&lt;br /&gt;
-- all SQL commands will need to end with double dash&lt;br /&gt;
&lt;br /&gt;
so, no that we have that, you should see something similar to:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5RoGlqeIdP22x2T2xIL9IAVnSNvQXD4BKJ-lGXcvMzTHv234jvEp6ro4KVSW1nAdpxfcUzaY1iKcL4Kwxs_eawz7uMqZV2wWB4NL46QqrrgsKTUoqgNRHrbj4yieORQQu1TR28HArZ28/s1600/Step+4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5RoGlqeIdP22x2T2xIL9IAVnSNvQXD4BKJ-lGXcvMzTHv234jvEp6ro4KVSW1nAdpxfcUzaY1iKcL4Kwxs_eawz7uMqZV2wWB4NL46QqrrgsKTUoqgNRHrbj4yieORQQu1TR28HArZ28/s320/Step+4.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Now the numbers on screen are the only numbers you may edit, chose one and stick with it, in our case we will chose 2.&lt;br /&gt;
&lt;br /&gt;
Now, substitute the number you chose for 'table_name' (without the quotes)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
union select 1,table_name,3,4 from information_schema.tables--&lt;br /&gt;
&lt;br /&gt;
you should now see a list of table names, scroll down until you see the tables you are dealing with(you should be able to work out which are human created tables):&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWdEqhby_cQsLXUxR3Xm3h6EfA28GBy29b0PdYdN6ib9e7ycmRtKlZfLSEHGcegP7SaJumSd2y8lf96Vvoe6YpI1WOELq-GfgMxsmTFxiE9Nz6E4_StY1LI-sk0RZd1W5oXIMZXbgx0xc/s1600/Step+5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWdEqhby_cQsLXUxR3Xm3h6EfA28GBy29b0PdYdN6ib9e7ycmRtKlZfLSEHGcegP7SaJumSd2y8lf96Vvoe6YpI1WOELq-GfgMxsmTFxiE9Nz6E4_StY1LI-sk0RZd1W5oXIMZXbgx0xc/s320/Step+5.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
So now we have two table names: &lt;br /&gt;
&lt;ol&gt;&lt;li&gt;users&lt;/li&gt;
&lt;li&gt;products&lt;/li&gt;
&lt;/ol&gt;We will now be using the users table as this will obviously have user information in and more than likely passwords&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 5: Display column names&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Now that we know what table_name we want, we can start working on column name, column names are just as easily retrieved, just add&lt;br /&gt;
union select 1,column_name,3,4 from information_schema.columns--&lt;br /&gt;
after the 'id=-1'&lt;br /&gt;
&lt;br /&gt;
Here we have substituted our chosen number, in our case 2, with column_name and changed information_schema.tables to information_schema.columns. &lt;br /&gt;
&lt;br /&gt;
Now you will see a list of column names, unfortunately, it is for the wrong table&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8RADpA5jaTLVVSCvOQMjOWvfos2gskqcuixC857nV730nFMY-L0nYXwSzK23OWvbSO06hn6ivygPD08xfTcBKxRdtnFt223aeadTLbAG85uqfRQLNEYLmE4-2YTnIjdh6QyVzIKU8awU/s1600/Step+6a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8RADpA5jaTLVVSCvOQMjOWvfos2gskqcuixC857nV730nFMY-L0nYXwSzK23OWvbSO06hn6ivygPD08xfTcBKxRdtnFt223aeadTLbAG85uqfRQLNEYLmE4-2YTnIjdh6QyVzIKU8awU/s320/Step+6a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Not to worry, just add in the WHERE clause, the WHERE clause tells the SQL database which source to take data from&lt;br /&gt;
&lt;br /&gt;
union select 1,column_name,3,4 from information_schema.columns where table_name='users'--&lt;br /&gt;
&lt;br /&gt;
we add 'where table_name='users'--' to the URL, this tell the query to pull data from the table with the table_name users&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;and we should get something similar to :&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrtmUrvp0fGYS1IwgRWpnQxSix_BFBFvI1o43ZaS7_L0qrywQt5mgdTKBO2zuVRiUKZ-bOWGxxHbnSWEtRrNm_FmPg3GrhExE7Y5gL48NimsDiV32MlSbvSCRsbWNzDWNBXZTC-dqzqmk/s1600/Step+6b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrtmUrvp0fGYS1IwgRWpnQxSix_BFBFvI1o43ZaS7_L0qrywQt5mgdTKBO2zuVRiUKZ-bOWGxxHbnSWEtRrNm_FmPg3GrhExE7Y5gL48NimsDiV32MlSbvSCRsbWNzDWNBXZTC-dqzqmk/s320/Step+6b.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Some sites have magic quotes set up, in that case adding "table_name='users'--" will not work because the site will not allow the addition of quotes, in those cases we use the char() command, in the char() command just put the ASCII value of the table name as CSV(Comma Separated Values) between the brackets - this will be discussed more in the video -&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 6: Reaping your rewards&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Now it is finally time for you to be rewarded for all your hard work, there are two ways to do this next step, the quick way and the long way, first I will show you the long way as to ensure you understand what we are actually doing...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Substitute a column name with column_name, for example,&lt;br /&gt;
&lt;br /&gt;
union select 1,user,3,4 from users--&lt;br /&gt;
&lt;br /&gt;
you no longer need the information_schema command as the query is already running from the users table, we will now see a list of users&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghSJwB7Hii4ekt87mWbTGW-pFp42eG4GdsbZb7VxXG43gchf_biixSE-We_VU6KGNDcT1mFeire5OGv_-gMc2wMDUousBRUgSp3W6GguMV8YaeTTlm-_t9xEoOlG_WFk2ZSkPlnZ6zxzs/s1600/Step+7a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghSJwB7Hii4ekt87mWbTGW-pFp42eG4GdsbZb7VxXG43gchf_biixSE-We_VU6KGNDcT1mFeire5OGv_-gMc2wMDUousBRUgSp3W6GguMV8YaeTTlm-_t9xEoOlG_WFk2ZSkPlnZ6zxzs/s320/Step+7a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Now do the same for passwords, but substitute column_name with 'pass'&lt;br /&gt;
&lt;br /&gt;
union select 1,pass,3,4 from users--&lt;br /&gt;
&lt;br /&gt;
You will now see a list of passwords,&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6C_Hya_4tuPKiIOD3VbN6YpcSCkNH-MiHz4X6SzuXHVHo5oSEZXTtAJZaefVveIOF_vSfb1mitydbKaYMjCmRW6MYXn4XnG85JKc_JEtBU5n1hqv8L2MXU91WQg-Ijr_ccuOUuHDAwf8/s1600/Step+7b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6C_Hya_4tuPKiIOD3VbN6YpcSCkNH-MiHz4X6SzuXHVHo5oSEZXTtAJZaefVveIOF_vSfb1mitydbKaYMjCmRW6MYXn4XnG85JKc_JEtBU5n1hqv8L2MXU91WQg-Ijr_ccuOUuHDAwf8/s320/Step+7b.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Use the user name from the first request, along with the password from the second request to log in.&lt;br /&gt;
&lt;br /&gt;
The short method is to use the concat() command, in the concat() command, you request more than one column at a time - more details in video -&lt;br /&gt;
&lt;br /&gt;
union select 1,concat(user,0x3A,pass),3,4 from users--&lt;br /&gt;
&lt;br /&gt;
You can keep adding as much information as you need either by concatenating or by asking for each individually &lt;br /&gt;
&lt;br /&gt;
(0x3A is the hex value for a colon :)&lt;br /&gt;
&lt;br /&gt;
this will display as:&lt;br /&gt;
user: password&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN1eTWqonxqq9kOLZbx-BPiN-iBqmvA21YrR66j4KZzu8SXUCMcGjr2sI7DZPbyNfCS1ABmpjU8QT-JwkR2xm6L6sKpWhiKg1ZJkjY-bFklZA8O9C2t63j56nDO5m4z4lmME_MEfqP5gE/s1600/Step+7alt.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN1eTWqonxqq9kOLZbx-BPiN-iBqmvA21YrR66j4KZzu8SXUCMcGjr2sI7DZPbyNfCS1ABmpjU8QT-JwkR2xm6L6sKpWhiKg1ZJkjY-bFklZA8O9C2t63j56nDO5m4z4lmME_MEfqP5gE/s320/Step+7alt.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Remember the user name and passwords and proceed to login screen.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Step 8: Logging in&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Ok, so I have shown you how to collect usernames and password and other information, now you need to log in,&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_OHi6ASUEovv1Fod2AYzYkGC03xv4OTtkdEag8WaZO6omhTCghzH-SYrg2u3_IBtBL1FypmqGGGFJdeLrXsxFkV8jWbsdJT9gG-0oSGoD68GVfiwcn3L9f1ZWV771COg8oy9EdL22Y0Q/s1600/Step+8a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_OHi6ASUEovv1Fod2AYzYkGC03xv4OTtkdEag8WaZO6omhTCghzH-SYrg2u3_IBtBL1FypmqGGGFJdeLrXsxFkV8jWbsdJT9gG-0oSGoD68GVfiwcn3L9f1ZWV771COg8oy9EdL22Y0Q/s320/Step+8a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Take note of a username and password and proceed to login screen&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8kX9eNI5-LNQVBW4AdgFZslaCeGwviDZfvUdyZqOlZDoYn8oDUhRKf7OV8YC9RDNcSFb-Vdyfalkv60DXe3R2C6o9Pu4E2N1JsNxgpk6z2581NPdxBJ1eu_ArliEDsgApymysxWbhgDI/s1600/Step+8b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8kX9eNI5-LNQVBW4AdgFZslaCeGwviDZfvUdyZqOlZDoYn8oDUhRKf7OV8YC9RDNcSFb-Vdyfalkv60DXe3R2C6o9Pu4E2N1JsNxgpk6z2581NPdxBJ1eu_ArliEDsgApymysxWbhgDI/s320/Step+8b.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
You will now be logged in as that user having full access to this account as if you were the account owner&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9tUVzyJznnpapI9DHd_PBs-HX_xt0vGDmUgB2Y8w-ibOxFeg-DCvfCJLmlfobziKsM58xfTCeSGXJFoBDPUHAUdcrn21En7aciTGuFHO1ECcsGyoBER24ADSzV0DZ45PjkMYKcTzG6O0/s1600/Logged+In.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9tUVzyJznnpapI9DHd_PBs-HX_xt0vGDmUgB2Y8w-ibOxFeg-DCvfCJLmlfobziKsM58xfTCeSGXJFoBDPUHAUdcrn21En7aciTGuFHO1ECcsGyoBER24ADSzV0DZ45PjkMYKcTzG6O0/s320/Logged+In.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Hope my tutorial was well understood, if you have any question or other input please comment.&lt;br /&gt;
&lt;br /&gt;
A video of the SQL attackhas been created and will be uploaded as soon as the editing has been completed.&lt;br /&gt;
&lt;br /&gt;
Thanks for checking out my blog and thanks again to CrashOverron for the website&lt;br /&gt;
&lt;br /&gt;
See ya&lt;br /&gt;
&lt;br /&gt;
Techno Master</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT5S9VZ0O-Ij2mjcfTq0IpmsBcZQL6UUhI4HIzsMT35VwO5RESp9qv84255AvBkLQ8WH-cI-jdKwQI98JSgNzBu0xNu_toFh17dj3d5_pvpkHtxZ0jIi5wGgkmo4o_6McbU6F3bvPlpzk/s72-c/Step+1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>The Hacker Manifesto and some hack related jokes</title><link>http://technomasterhacking.blogspot.com/2011/10/hacker-manifesto-and-some-hack-related.html</link><category>Fun</category><category>Funny</category><category>HAcker Manifesto</category><category>Jokes</category><category>Light</category><pubDate>Tue, 18 Oct 2011 20:40:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-570794682336534861</guid><description>&lt;div style="text-align: center;"&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;The Hacker Manifesto&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;i&gt;by&lt;br /&gt;
+++The Mentor+++&lt;br /&gt;
Written January 8, 1986&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...&lt;br /&gt;
&lt;br /&gt;
Damn kids. They're all alike.&lt;br /&gt;
&lt;br /&gt;
But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?&lt;br /&gt;
&lt;br /&gt;
I am a hacker, enter my world...&lt;br /&gt;
&lt;br /&gt;
Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...&lt;br /&gt;
&lt;br /&gt;
Damn underachiever. They're all alike.&lt;br /&gt;
&lt;br /&gt;
I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."&lt;br /&gt;
&lt;br /&gt;
Damn kid. Probably copied it. They're all alike.&lt;br /&gt;
&lt;br /&gt;
I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't be here...&lt;br /&gt;
&lt;br /&gt;
Damn kid. All he does is play games. They're all alike.&lt;br /&gt;
&lt;br /&gt;
And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all...&lt;br /&gt;
&lt;br /&gt;
Damn kid. Tying up the phone line again. They're all alike...&lt;br /&gt;
&lt;br /&gt;
You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.&lt;br /&gt;
&lt;br /&gt;
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.&lt;br /&gt;
&lt;br /&gt;
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.&lt;br /&gt;
&lt;br /&gt;
I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Now some hacking jokes:&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Q:  How many hackers does it take to screw in a light bulb?  &lt;br /&gt;
A:  Zero.  Nobody knew they were there.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
Q:  Why do computer scientists make such lousy lovers?  &lt;br /&gt;
A:  Cause they always want to do the job faster than before.  And  when they do, they say the performance has improved.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
If only software dealers were as fastidious as restaurants.  &lt;br /&gt;
A restaurant will give me the food for free if I find one bug in it.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
&lt;pre&gt;PROGRAMMER'S DRINKING SONG 

                 100 little bugs in the code, 
                 100 bugs in the code, 

fix one bug, compile it again, 
                 101 little bugs in the code. 

101 little bugs in the code..... 

Repeat until BUGS = 0&lt;/pre&gt;&lt;pre&gt;&amp;nbsp;&lt;/pre&gt;&lt;pre&gt;&lt;/pre&gt;&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;If architects had to work like programmers&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/center&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dear Mr. Architect:&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;div&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;Please design and build me a house. I am not quite sure of what I need, so  you should use your discretion.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;My house should have between two and forty-five bedrooms. Just make sure  the plans are such that the bedrooms can be easily added or deleted.  When you bring the blueprints to me, I will make the final decision of  what I want. Also, bring me the cost breakdown for each configuration so  that I can arbitrarily pick one.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;Keep in mind that the house I ultimately choose must cost less than the  one I am currently living in. Make sure, however, that you correct all  the deficiencies that exist in my current house (the floor of my kitchen  vibrates when I walk across it, and the walls don't have nearly enough  insulation in them).  &lt;/div&gt;&lt;div style="text-align: left;"&gt;As you design, also keep in mind that I want to keep yearly maintenance  costs as low as possible. This should mean the incorporation of extra-cost  features like aluminum, vinyl, or composite siding. (If you choose not  to specify aluminum, be prepared to explain your decision in detail.)  &lt;/div&gt;&lt;div style="text-align: left;"&gt;Please take care that modern design practices and the latest materials are  used in construction of the house, as I want it to be a showplace for the  most up-to-date ideas and methods. Be alerted, however, that kitchen should  be designed to accommodate, among other things, my 1952 Gibson refrigerator.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;To insure that you are building the correct house for our entire family,  make certain that you contact each of our children, and also our in-laws. My  mother-in-law will have very strong feelings about how the house should be  designed, since she visits us at least once a year. Make sure that you weigh  all of thses options carefully and come to the right decision. I, however,  retain the right to overrule any choices that you make.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;Please don't bother me with small details right now. Your job is to  develop the overall plans for the house: get the big picture. At this time,  for example, it is not appropriate to be choosing the color of the carpet.  However, keep in mind that my wife likes blue.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;Also, do not worry at this time about acquiring the resources to build the  house itself. Your first priority is to develop detailed plans and  specifications. Once I approve these plans, however, I would expect the  house to be under roof within 48 hours.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;While you are designing this house specifically for me, keep in mind that  sooner or later I will have to sell it to someone else. It therefore should  have appeal to a wide variety of potential buyers. Please make sure before  you finalize the plans that there is a consensus of the population in my  area that they like the features this house has.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;I advise you to run up and look at my neighbor's house he constructed last  year. We like it a great deal. It has many features that we would also like  in our new home, particularily the 75-foot swimming pool. With careful  engineering, I believe that you can design this into our new house without  impacting the final cost.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;Please prepare a complete set of blueprints. It is not necessary at this  time to do the real design, since they will be used only for construction  bids. Be advised, however, that you will be held accountable for any  increase of construction costs as a result of later design changes.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;You must be thrilled to be working on as an interesting project as this!  To be able to use the latest techniques and materials and to be given such  freedom in your designs is something that can't happen very often. Contact  me as soon as possible with your complete ideas and plans.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;PS:  My wife has just told me that she disagrees with many of the  instructions I've given you in this letter. As architect, it is your  responsibility to resolve these differences. I have tried in the past  and have been unable to accomplish this. If you can't handle this  responsibility, I will have to find another architect.  &lt;/div&gt;&lt;div style="text-align: left;"&gt;PPS: Perhaps what I need is not a house at all, but a travel trailer. Please  advise me as soon as possible if this is the case.  &lt;/div&gt;&lt;pre&gt;&lt;/pre&gt;&lt;br /&gt;
&lt;hr /&gt;&lt;span style="font-family: times new roman,helvetica;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;&lt;h2&gt;&lt;span style="font-family: times new roman,helvetica;"&gt;The top ten signs that your co-worker is a computer hacker&lt;/span&gt;&lt;/h2&gt;&lt;/center&gt;&lt;span style="font-family: times new roman,helvetica;"&gt; 10. You ticked him off once and your next phone bill was $20,000.&lt;br /&gt;
&lt;br /&gt;
9. He's won the Publisher's Clearing House sweepstakes three years running.&lt;br /&gt;
&lt;br /&gt;
8. When asked for his phone number, he gives it in hex.&lt;br /&gt;
&lt;br /&gt;
7. Seems strangely calm whenever the office LAN goes down.&lt;br /&gt;
&lt;br /&gt;
6. Somehow he/she gets HBO on his PC at work.&lt;br /&gt;
&lt;br /&gt;
5. Mumbled, "Oh, puh-leeez" 95 times during the movie "The Net"&lt;br /&gt;
&lt;br /&gt;
4. Massive RRSP contribution made in half-cent increments.&lt;br /&gt;
&lt;br /&gt;
3. Video dating profile lists "public-key encryption" among turn-ons&lt;br /&gt;
&lt;br /&gt;
2. When his computer starts up, you hear, "Good Morning, Mr. President."&lt;br /&gt;
&lt;br /&gt;
1. You hear him murmur, "Let's see you use that Visa card now, jerk."&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;NEW VIRUSES:&lt;/b&gt;  &lt;br /&gt;
&lt;b&gt;GOVERNMENT ECONOMIST VIRUS:&lt;/b&gt;  Nothing works, but all your diagnostic  software says everything is fine.  &lt;br /&gt;
&lt;b&gt;NEW WORLD ORDER VIRUS:&lt;/b&gt;  Probably harmless, but it makes a lot of people  mad just thinking about it.  &lt;br /&gt;
&lt;b&gt;FEDERAL BUREAUCRAT VIRUS:&lt;/b&gt;  Divides your hard drive into hundreds of  little units, each of which do practically nothing, but all of which  claim to be the most important part of the computer.  &lt;br /&gt;
&lt;b&gt;PAUL REVERE VIRUS:&lt;/b&gt;  This revolutionary virus does not horse around.  It  &lt;b&gt;warns you of impending hard disk attack---once by LAN.  Twice if by C:&lt;/b&gt;.  &lt;br /&gt;
&lt;b&gt;POLITICALLY CORRECT VIRUS:&lt;/b&gt;  Never calls itself a "virus," but instead  refers to itself as an "electronic microorganism."  &lt;br /&gt;
&lt;b&gt;RIGHT TO LIFE VIRUS:&lt;/b&gt;  Won't allow you to delete a file, regardless of  how old it is.  If you attempt to erase a file, it requires you to first  see a counselor about possible alternatives.  &lt;br /&gt;
&lt;b&gt;ROSS PEROT VIRUS:&lt;/b&gt;  Activates every component in your system, just before  the whole thing quits.  &lt;br /&gt;
&lt;b&gt;MARIO CUOMO VIRUS:&lt;/b&gt;  It would be a great virus, but it refuses to run.  &lt;br /&gt;
&lt;b&gt;OPRAH WINFREY VIRUS:&lt;/b&gt;  Your 200MB hard drive suddenly shrinks to 80MB,  and then slowly expands back to 200MB.  &lt;br /&gt;
&lt;b&gt;AT&amp;amp;T VIRUS:&lt;/b&gt;  Every three minutes it tells you what great service you  are getting.  &lt;br /&gt;
&lt;b&gt;THE MCI VIRUS:&lt;/b&gt;  Every three minutes it reminds you that you are paying  too much for the AT&amp;amp;T virus.  &lt;br /&gt;
&lt;b&gt;TED TURNER VIRUS:&lt;/b&gt;  Colorizes your monochrome monitor.  &lt;br /&gt;
&lt;b&gt;ARNOLD SCHWARZENNEGGER VIRUS:&lt;/b&gt;  Terminates and stays resident.  It'll be  back.  &lt;br /&gt;
&lt;b&gt;DAN QUAYLE VIRUS:&lt;/b&gt;  Prevents you system from spawning and child processes  without joining into a binary network.  &lt;br /&gt;
&lt;b&gt;GALLUP VIRUS:&lt;/b&gt;  Sixy percent of the PCs infected will lose 38 percent of  their data 14 percent of the time (plus or minus a 3.5 percent margin of  error).=&amp;lt;&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;span style="font-family: times new roman,helvetica;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;&lt;h2&gt;&lt;span style="font-family: times new roman,helvetica;"&gt;Car break trouble&lt;/span&gt;&lt;/h2&gt;&lt;/center&gt;&lt;span style="font-family: times new roman,helvetica;"&gt; A Software Engineer, a Hardware Engineer and a Branch Manager were on  their way to a meeting. They were driving down a steep mountain road  when suddenly the brakes on their car failed. The car careened almost  out of control down the road, bouncing off the crash barriers, until it  miraculously ground to a halt scraping along the mountainside. The car's  occupants, shaken but unhurt, now had a problem: they were stuck  halfway down a mountain in a car with no brakes. What were they to do?&lt;br /&gt;
&lt;br /&gt;
"I know," said the Branch Manager, "Let's have a meeting, propose a  Vision, formulate a Mission Statement, define some Goals, and by a  process of Continuous Improvement find a solution to the Critical  Problems, and we can be on our way."&lt;br /&gt;
&lt;br /&gt;
"No, no," said the Hardware Engineer, "That will take far too long, and  besides, that method has never worked before. I've got my Swiss Army  knife with me, and in no time at all I can strip down the car's braking  system, isolate the fault, fix it, and we can be on our way."&lt;br /&gt;
&lt;br /&gt;
"Well," said the Software Engineer, "Before we do anything, I think we  should push the car back up the road and see if it happens again."&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: times new roman,helvetica;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;&lt;h2&gt;&lt;span style="font-family: times new roman,helvetica;"&gt;I have a Microsoft waiter&lt;/span&gt;&lt;/h2&gt;&lt;/center&gt;&lt;span style="font-family: times new roman,helvetica;"&gt; &lt;b&gt;Patron:&lt;/b&gt; Waiter!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Hi, my name is Bill, and I'll be your Support Waiter. What seems to be the problem?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; There's a fly in my soup!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Try again, maybe the fly won't be there this time.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; No, it's still there.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Maybe it's the way you're using the soup; try eating it with a fork instead.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; Even when I use the fork, the fly is still there.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Maybe the soup is incompatible with the bowl; what kind of bowl are you using?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; A SOUP bowl!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Hmmm, that should work. Maybe it's a configuration problem; how was the bowl set up?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; You brought it to me on a saucer; what has that to do with the fly in my soup?!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Can you remember everything you did before you noticed the fly in your soup?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; I sat down and ordered the Soup of the Day!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Have you considered upgrading to the latest Soup of the Day?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; You have more than one Soup of the Day each day?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Yes, the Soup of the Day is changed every hour.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; Well, what is the Soup of the Day now?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; The current Soup of the Day is tomato.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; Fine. Bring me the tomato soup, and the check. I'm running late now.&lt;br /&gt;
&lt;br /&gt;
[Waiter leaves and returns with another bowl of soup and the check]&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Here you are, Sir. The soup and your check.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; This is potato soup.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Waiter:&lt;/b&gt; Yes, the tomato soup wasn't ready yet.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; Well, I'm so hungry now, I'll eat anything.&lt;br /&gt;
&lt;br /&gt;
[The waiter leaves.]&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Patron:&lt;/b&gt; Waiter! There's a gnat in my soup!&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;The check: 
Soup of the Day . . . . . . . . . . $5.00 
Upgrade to newer Soup of the Day. . $2.50 
Access to support . . . . . . . . . $1.00 
&lt;/pre&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
&lt;br /&gt;
Ok so thats it for today's blog guys, hope you enjoyed this less serious blog --&amp;nbsp; Coming up SQL Attacks&lt;br /&gt;
&lt;br /&gt;
Check You L8r&lt;br /&gt;
&lt;br /&gt;
Techno Master&lt;br /&gt;
&lt;br /&gt;
Feel free to comment...</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>Questions people have always wanted to ask, but didn't know who to ask</title><link>http://technomasterhacking.blogspot.com/2011/10/question-people-have-always-wanted-to.html</link><category>Black Hat</category><category>Cracker</category><category>Famous Hackers</category><category>Grey Hat</category><category>Hacker</category><category>Questions</category><category>White Hat</category><pubDate>Mon, 17 Oct 2011 23:13:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-4106124749733677225</guid><description>&lt;div style="text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHPxqIiR4zwr58iiSR0kLuoBJ-ArYl_iA9-H1WvohtA_h3QNgny-uQV8J374z3rP4CyWUIwjIdyoJj5lMtTQdskLwVhFoW6iPZNi5CY2MxMxAJ_9grgxq2CSBYJTxj9EBGnIRuzvueYrA/s1600/Computer+question+mark.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHPxqIiR4zwr58iiSR0kLuoBJ-ArYl_iA9-H1WvohtA_h3QNgny-uQV8J374z3rP4CyWUIwjIdyoJj5lMtTQdskLwVhFoW6iPZNi5CY2MxMxAJ_9grgxq2CSBYJTxj9EBGnIRuzvueYrA/s200/Computer+question+mark.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;The answer to the age-old question: What is the difference between a hacker and a cracker? &lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
A &lt;i&gt;&lt;font id="Hacker"&gt;hacker&lt;/font&gt;&lt;/i&gt; is a person intensely interested in the arcane and recondite  workings of any computer operating system. Most often, hackers are programmers. As  such, hackers obtain advanced knowledge of operating systems and programming languages.  They may know of holes within systems and the reasons for such holes. Hackers constantly  seek further knowledge, freely share what they have discovered, and never, ever intentionally  damage data.&lt;br /&gt;
&lt;br /&gt;
A &lt;i&gt;&lt;font id="Cracker"&gt;cracker&lt;/font&gt;&lt;/i&gt; is a person who breaks into or otherwise violates the system  integrity of remote machines, with malicious intent. Crackers, having gained unauthorized  access, destroy vital data, deny legitimate users service, or basically cause problems  for their targets. Crackers can easily be identified because their actions are malicious.&lt;br /&gt;
(Special thanks to http://newdata.box.sk/bx/hacker/ch03/ch03.htm for the definitions)&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Different types of hackers:&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;span style="font-size: small;"&gt;&lt;font id="Black Hat"&gt;Black Hat:&lt;/font&gt;&lt;/span&gt;&lt;/u&gt;&lt;span style="font-size: small;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;Black hat is used to describe a &lt;a href="#Hacker"&gt;hacker&lt;/a&gt; (or, if you prefer, &lt;a href="#Cracker"&gt;cracker&lt;/a&gt;) who breaks into a computer system or network with malicious intent.  Unlike a &lt;a href="#White Hat"&gt;white hat&lt;/a&gt;  hacker, the black hat hacker takes advantage of the break-in, perhaps  destroying files or stealing data for some future purpose.  The black  hat hacker may also make the exploit known to other hackers and/or the  public without notifying the victim. This gives others the opportunity  to exploit the vulnerability before the organization is able to secure  it. &lt;br /&gt;
The term comes from old Western movies, where heroes often wore white hats and the "bad guys" wore black hats.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;font id="White Hat"&gt;White Hat:&lt;/font&gt;&lt;/u&gt; &lt;br /&gt;
White hat describes a &lt;a href="#Hacker"&gt;hacker&lt;/a&gt; (or, if you prefer, &lt;a href=#Cracker"&gt;cracker&lt;/a&gt;)  who identifies a security weakness in a computer system or network but,  instead of taking malicious advantage of it, exposes the weakness in a  way that will allow the system's owners to fix the breach before it can  be taken advantage by others (such as &lt;a href="#Black Hat"&gt;black hat&lt;/a&gt;  hackers.)  Methods of telling the owners about it range from a simple  phone call through sending an e-mail note to a Webmaster or  administrator all the way to leaving an electronic "calling card" in the  system that makes it obvious that security has been breached. &lt;br /&gt;
While white hat hacking is a hobby for some, others provide their  services for a fee. Thus, a white hat hacker may work as a consultant or  be a permanent employee on a company's payroll.  A good many white hat  hackers are former black hat hackers. &lt;br /&gt;
The term comes from old Western movies, where heros often wore white hats and the "bad guys" wore black hats.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;font id="Grey Hat"&gt;Grey Hat:&lt;/font&gt; &lt;/u&gt;&lt;br /&gt;
Gray hat describes a &lt;a href="#Cracker"&gt;cracker&lt;/a&gt; (or, if you prefer, &lt;a href="#Hacker"&gt;hacker&lt;/a&gt;) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners. Unlike a &lt;a href="#Black Hat"&gt;black hat&lt;/a&gt;, a gray hat acts without malicious intent. The goal of a gray hat is to improve system and network security. However, by publicizing a vulnerability, the gray hat may give other crackers the opportunity to exploit it. This differs from the &lt;a href="#White Hat"&gt;white hat&lt;/a&gt; who alerts system owners and vendors of a vulnerability without actually exploiting it in public.&lt;br /&gt;
(Special thanks to http://www.whatis.com )&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Famous Hackers: &lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: small;"&gt;Black Hats:&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Jonathan James&lt;span style="font-size: small;"&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Adrian Lamo&lt;/li&gt;
&lt;li&gt;Kevin Mitnick &lt;/li&gt;
&lt;li&gt;Kevin Poulsen&lt;/li&gt;
&lt;li&gt;Robert Tappan Morris&lt;/li&gt;
&lt;li&gt; Vladimir Levin&lt;/li&gt;
&lt;li&gt;Donald Lloyd&lt;/li&gt;
&lt;li&gt;David Smith&lt;/li&gt;
&lt;li&gt;&lt;span class="st"&gt;Michael Calce&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Mark Abene &lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;span style="font-size: small;"&gt;White Hats:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b style="font-weight: normal;"&gt;Stephen Wozniak&lt;/b&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-size: small;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Tim Berners-Lee&lt;/li&gt;
&lt;li&gt;Linus Torvalds&lt;/li&gt;
&lt;li&gt;Richard Stallman&lt;/li&gt;
&lt;li&gt;Tsutomu Shimomura&lt;/li&gt;
&lt;/ul&gt;That's all for now&lt;br /&gt;
&lt;br /&gt;
Hope you enjoyed today's blog&lt;br /&gt;
&lt;br /&gt;
Techno Master&lt;br /&gt;
&lt;ul&gt;&lt;/ul&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHPxqIiR4zwr58iiSR0kLuoBJ-ArYl_iA9-H1WvohtA_h3QNgny-uQV8J374z3rP4CyWUIwjIdyoJj5lMtTQdskLwVhFoW6iPZNi5CY2MxMxAJ_9grgxq2CSBYJTxj9EBGnIRuzvueYrA/s72-c/Computer+question+mark.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>A brief overview of hacking - Part 2</title><link>http://technomasterhacking.blogspot.com/2011/10/brief-overview-of-hacking-part-2.html</link><category>Attacks</category><category>Black Hat</category><category>Brute Force</category><category>Dictionary</category><category>Grey Hat</category><category>Hacking</category><category>LFI</category><category>Methods</category><category>Rainbow Cracking</category><category>RFI</category><category>Social Engineering</category><category>SQL</category><category>White Hat</category><pubDate>Sun, 16 Oct 2011 15:28:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-5966612629779822601</guid><description>Ok, so let's begin the second part of our hacking overview. There are many different methods of hacking, many different people who hack and many different reasons for the hacks. We are firstly going to look at common methods of hacking.&lt;br /&gt;
&lt;br /&gt;
First, there are many different ways to hack and get access to secure information, some may be simpler than others, but generally, they can all be just as successful and useful as all the others, about 99.999999999% of the time you will HAVE to combine more than one of these methods during a hacking session to successfully complete the hack.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;SQL Attacks&lt;/li&gt;
&lt;/ul&gt;An SQL attack is the method where a hacker will breach the login form by accessing the data in the SQL database of the website, and searching through row and column names, will eventually discover a user password, preferably an Admin password. This method is more commonly used with the Information_Schema command, but it all depends how the webmaster has the set up his login site.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;LFI / RFI&lt;/li&gt;
&lt;/ul&gt;An LFI or RFI (Local File Intrusion / Remote File Intrusion) is when a hacker locally or remotely adds a dangerous script into a server, website, etc and therefore gains control to login info, sensitive info, access to all files, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Social Engineering&lt;/li&gt;
&lt;/ul&gt;Social Engineering is all about making other people give you the information you need, normally, a hacker will phone in posing as a employee who has forgotten his login details or needing confidential information&amp;nbsp; immediately, he then gets the other person to give him the information, allowing the hacker access on to the system. Social engineering has become increasingly popular as it saves time and resources.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Brute-Force&lt;/li&gt;
&lt;/ul&gt;Brute force is a method of password cracking, when a hacker does a brute force attack, he runs a program that tests multiple passwords and encryption types until the password has been cracked. The problem with brute force is the amount of combinations available and the amount of time it can potentially require to crack the encryption.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Rainbow Cracking&lt;/li&gt;
&lt;/ul&gt;Rainbow cracking uses rainbow tables to crack passwords, rainbow tables are lists of code with every available combination of a certain encryption, rainbow cracking is much quicker and effective, although creating your own tables is very time consuming and rainbow table files are very large files. You can purchase rainbow tables online as well. &lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Dictionary Crack&lt;/li&gt;
&lt;/ul&gt;Dictionary crack is used when the hacker at least knows that the password is an actual existing word, the hacker then runs a program which tests a whole list of words in reference to the password, if the password is an actual word, this is a very quick and effective method.&lt;br /&gt;
&lt;br /&gt;
There are many many more methods and I will go into most of them in more detail in later blogs, but here are a few common methods.&lt;br /&gt;
&lt;br /&gt;
Another quick add-in before I end off today's post is anonymity, anonymity is making sure nobody knows who you are, this is very important in the hacking world as hacking is illegal, if you are an expert, you can build scripts to delete the log files, but there are multiple problems to this approach, the best method is to not even be logged on the site, to stay anonymous, you can hack through a proxy server, hiding your actual IP, this method works great if you understand which proxy servers you should be using. The next best thing is to use the TOR web browser, TOR is an anonymous web browser, which disguises your true IP address and also does not allow sites to store cookies or other personal information.&lt;br /&gt;
&lt;br /&gt;
To get TOR visit:&lt;br /&gt;
https://www.torproject.org/download/download-easy.html.en&lt;br /&gt;
&lt;br /&gt;
Thanks.&lt;br /&gt;
&lt;br /&gt;
Techno Master</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Lemuel Botha)</author></item><item><title>A brief overview of hacking - Part 1</title><link>http://technomasterhacking.blogspot.com/2011/06/brief-overview-of-hacking-part-1.html</link><category>Black Hat</category><category>Hacking</category><category>Overveiw</category><category>Security</category><category>White Hat</category><pubDate>Mon, 27 Jun 2011 20:10:00 +0200</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2330876791373218268.post-1233853829428712951</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRJPpAlMTFb2LT1vQwmeaEMTz5z_SqR-xoXp8nK4vC1nW2zEi5LuSa-_REgcanqLGi6mkuzA03ettSu1-1E_f2UmtbXoSp0151vXwlBkf5ajR85c2QozYG0UiAmq6WQ-PM7nNW08thYddT/s1600/Hackers+ahead.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRJPpAlMTFb2LT1vQwmeaEMTz5z_SqR-xoXp8nK4vC1nW2zEi5LuSa-_REgcanqLGi6mkuzA03ettSu1-1E_f2UmtbXoSp0151vXwlBkf5ajR85c2QozYG0UiAmq6WQ-PM7nNW08thYddT/s1600/Hackers+ahead.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;So to start off I will start by giving an overview of what hacking is, the oxford dictionary defines a hacker as: ' &lt;span class="definition"&gt;a person who uses computers to gain unauthorized access to data&lt;/span&gt;. &lt;em class="languageGroup"&gt;informal - &lt;/em&gt;&lt;span class="definition"&gt;an enthusiastic and skillful computer programmer or user&lt;/span&gt;.'&amp;nbsp; The rest of the world probably has a total different thought about the subject, but do people actually realise all the good hackers do for the rest of humanity...No, the world just looks at the 'evils' of hackers, although most hackers have never done a single malicious hack. A hacker is just a person who has found a world where he/she can just be themselves, hackers respect each other irrespective of race, gender, status, nationality, etc. we are all equals, and will all help one another when we are struggling.&lt;br /&gt;&lt;br /&gt;Lets look at all the good hackers have done for the rest of humankind:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Hackers debug software before other internet users download it, therefore creating a more stable computing environment&lt;/li&gt;&lt;li&gt; Hackers delete companies' spam lists, stopping even more spam swamping your inbox&lt;/li&gt;&lt;li&gt;Hackers also help stop viruses from swarming the internet&lt;/li&gt;&lt;li&gt;Hackers also help debug most of your favourite websites&lt;/li&gt;&lt;/ul&gt;Infact most of the sites you visit daily were created by a hacker or a group of hackers, Facebook was developed by a very talented hacker named Mark Zuckerberg, Google was created by 2 hackers named Sergey Brin and Larry Page, there are many more - you can go and research them if you would like.&lt;br /&gt;&lt;br /&gt;So there is the end of part 1, part 2 soon to follow.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Peace Out&lt;br /&gt;&lt;br /&gt;Techno Master</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRJPpAlMTFb2LT1vQwmeaEMTz5z_SqR-xoXp8nK4vC1nW2zEi5LuSa-_REgcanqLGi6mkuzA03ettSu1-1E_f2UmtbXoSp0151vXwlBkf5ajR85c2QozYG0UiAmq6WQ-PM7nNW08thYddT/s72-c/Hackers+ahead.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">-33.9, 18.633333300000004</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">-33.9 18.633333300000004</georss:point><author>noreply@blogger.com (Lemuel Botha)</author></item></channel></rss>