Page 4 of 6 FirstFirst ... 23456 LastLast
Results 31 to 40 of 54

Thread: sql injection basis tutorial

  1. #31
    zarraza
    Guest

    Default

    is it still consider a crime if i get, let say admin's hash by usin sql injection, i crack hash and i login as admin but i change nothin, and at the end i email admin and tell him that his site isn't secure? Honestly im doin it just for the curiosity and NOT doing harm. Its just that drive inside to see "successful connection", it makes me warm and fuzzy inside hahaha

  2. #32
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Look guys. We are NOT Black Hat "hunters". We are however, THE BT SUPPORT FORUM. Even though what anathema said could be misconstrued...he DIDN'T say that he was breaking into any website that he didn't have permission to hack into. He did however, say that, as streaked pointed out in red...

    But why aim at normal live sites when you can set up your own and test out differing methods.

    There is nothing wrong with him saying that and NOTHING ILLEGAL about it. He said set up YOUR OWN and test it out.

    C'mon guys ..lay off the witch hunting. Else we'll end up like every other crappy wanna be security forums.


    If they don't come out and admit their doing illegal activity.....treat it as such.

    You have the right to not answer or to not even reply if you chose not to believe the OP's post. I don't want to see this type of baiting and phishing anymore. WERE A SUPPORT FORUM!!! We're NOT the INS or the CIA or FBI or even the IRA. WERE http://forums.remote-exploit.org

    If you want to go hunting down "Blackhats" go do it at the netstumbler forums. http://www.netstumbler.org/
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #33
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by zarraza View Post
    is it still consider a crime if i get, let say admin's hash by usin sql injection, i crack hash and i login as admin but i change nothin, and at the end i email admin and tell him that his site isn't secure? Honestly im doin it just for the curiosity and NOT doing harm. Its just that drive inside to see "successful connection", it makes me warm and fuzzy inside hahaha

    Yes. It would be considered 100% illegal. Why? Because you don't have his permission to test (hack) his site!!

    Get permission first (preferably written) and then you can test the hell out of it till your hearts content.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #34
    zarraza
    Guest

    Default

    anathema thanks for firefox extensions... it is very handy

    xploitz but i have a permission to go on the site rite, but cant look around (in broad way)?
    Some laws are stupid, and i know it is possible to go around. What they gonna convict me for? I dont even know what hack means lol. I downloaded some kind of strange extensions/programs or whatever and was pressing random buttons. lol.

  5. #35
    Jenkem Addict imported_wyze's Avatar
    Join Date
    Jul 2007
    Posts
    1,543

    Default

    To quickly put it to rest, read rule #1 and #7:

    We do not condone any illegal activity at all.

    Do not post about breaking into networks that do not belong to you and for which you have no permissions.
    dd if=/dev/swc666 of=/dev/wyze

  6. #36
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    I know its hard to understand. But think of it like this.


    You own your house. You love your house. You lock up your house while your gone to work. You come back and notice the windows open.

    Nothing damaged...nothing stolen...but it just doesn't seem right. Its still breaking and entering isn't it??

    SAME principal applies to sql injecting sites at random or targeted. You can do what you want. But I won't help and neither will anybody else here. WE ARE WATCHED BY GOVERNMENT LAW ENFORCEMENT AGENCIES. ESPECIALLY since that whole Starbucks MITM article got published and pointed directly at us when that ass got busted for trying to hack into em. They blamed us.

    You can look around all you want...just keep it legal. Get permission to "look" further.

    Do I have your permission to go into your house when your not there and "look" around?? Maybe drink a brewski or 2?? Not steal anything...just "look"???

    Get it???

    I hope so.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #37
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    But did you understand what I said about breaking in but not stealing nothing is the same thing as sql injecting a site without permission?? DO you see the correlation in the two at all??
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #38
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Right ! That is enough.

    Behave like adults or I will step in and put a stop to it.

    Enough of all this crap, once and for good.

    Behaviour like this will not be tolerated on this forum.

  9. #39
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Angry Learn some RESPECT!!!

    Ok, thats it!!!

    Balding_parrot told you all to knock it the f|_|ck off, and none of you listened.


    The following members have been verbally warned....

    thorin, and zarraza, swc666


    Knock it off else I will give ALL
    of you guys a 3 day ban!

    When a moderator tells you to knock it off,....you WILL knock it off, or you WILL BE BANNED.

    End of discussion.


    Now, stick to the topic or shut your pie holes.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  10. #40
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    I am deleting all the rubbish you all posted! Its pointless to argue about someones language or typing skills. Who cares???? I've seen MUCH WORSE from other members. As far as I'm concerned, zarraza speaks enough English that we can figure out what hes saying without much effort.

    Quit flaming and retaliating against each other!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 4 of 6 FirstFirst ... 23456 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •