Skip to main content

Posts

Showing posts from January, 2018

Hacking MySQL Online Databases with Sqlmap

In this tutorial, we will follow up on a previous tutorial on  MySQL . In that tutorial, I showed you the basics of running a MySQL server on BackTrack. In addition, you might want to take a look at my tutorial on the basics of  databases , if you are not familiar with databases and DataBase Management Systems (DBMS). Since MySQL is SO important in so many web applications, I will be doing more MySQL tutorials in the future. The more you know about MySQL, the better you can hack MySQL! Generally, MySQL is teamed up with PHP and an Apache web server (often referred to as LAMPP or XAMPP) to build dynamic, database driven web sites. Such development packages as Drupal, Joomla, Wordpress, Ruby on Rails and others all use MySQL as their default database. Millions of websites have MySQL backends and very often they are "homegrown" websites, without much attention on security. In this tutorial, we will looking to extract information about an online MySQL database before we

What Is a Keylogger and Key Logging Software?

A  keylogger  is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. Use Cases for a Keylogger Keyloggers are used in  Information Technology (IT)  organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge; they are sometimes used as part of home parental controls. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information. What Information a Keylogger Can Collect The capabilities of keyloggers vary, but when installed on a device they can generally do the following: capture any passwords entered by users on the device take screen captures of the device at periodic intervals record the  URLs  that were visited via Web browsers, and possibly also take screen captures of th