Hacking websites with html

How to Hack a Website: Hacking Database Site Online

More people have access to the internet than ever before. This has prompted many organizations to develop web-based applications that users can use online to interact with the organization. Poorly written code for web applications can be exploited to gain unauthorized access to sensitive data and web servers.

In this tutorial you will learn how to hack websites, and we will introduce you to web application hacking techniques and the counter measures you can put in place to protect against such attacks.

How to Hack a Website

In this website hacking practical scenario, we are going to hijack the user session of the web application located at www.techpanda.org. We will use cross site scripting to read the cookie session id then use it to impersonate a legitimate user session.

The assumption made is that the attacker has access to the web application and he would like to hijack the sessions of other users that use the same application. The goal of this attack could be to gain admin access to the web application assuming the attacker’s access account is a limited one.

For practice purposes, it is strongly recommended to gain access using SQL Injection. Refer to this article for more information on how to do that.

Читайте также:  Конвертация в число php

Step 2) Enter Login Details.

The login email is admin@google.com, the password is Password2010.

Step 3) Check dashboard.

If you have logged in successfully, then you will get the following dashboard

How to hack a Website

Step 4) Enter New Content.

Click on Add New Contact and Enter the following as the first name

Step 5) Add Javascript.

The above code uses JavaScript. It adds a hyperlink with an onclick event. When the unsuspecting user clicks the link, the event retrieves the PHP cookie session ID and sends it to the snatch_sess_id.php page together with the session id in the URL

How to hack a Website

Step 6) Add Details.

Enter the remaining details as shown below and Click on Save Changes

How to hack a Website

Step 7) Check dashboard.

Your dashboard will now look like the following screen

How to hack a Website

Step 8) Check session id.

How to hack a Website

Note: the script could be sending the value to some remote server where the PHPSESSID is stored then the user redirected back to the website as if nothing happened.

Note: the value you get may be different from the one in this webpage hacking tutorial, but the concept is the same

Session Impersonation using Firefox and Tamper Data add-on

The flowchart below shows the steps that you must take to complete this exercise.

How to hack a Website

  • You will need Firefox web browser for this section and Tamper Data add-on
  • Open Firefox and install the add as shown in the diagrams below

How to hack a Website

How to hack a Website

How to hack a Website

How to hack a Website

How to hack a Website

  • Click on Restart now when the installation completes
  • Enable the menu bar in Firefox if it is not shown

How to hack a Website

How to hack a Website

How to hack a Website

  • Click on Start Tamper menu
  • Switch back to Firefox web browser, type http://www.techpanda.org/dashboard.php then press the enter key to load the page
  • You will get the following pop up from Tamper Data

How to hack a Website

  • The pop-up window has three (3) options. The Tamper option allows you to modify the HTTP header information before it is submitted to the server.
  • Click on it
  • You will get the following window

How to hack a Website

  • Copy the PHP session ID you copied from the attack URL and paste it after the equal sign. Your value should now look like this

How to hack a Website

  • Uncheck the checkbox that asks Continue Tampering?
  • Click on submit button when done
  • You should be able to see the dashboard as shown below

How to hack a Website

Note: we did not login, we impersonated a login session using the PHPSESSID value we retrieved using cross site scripting

What is a web application? What are Web Threats?

A web application (aka website) is an application based on the client-server model. The server provides the database access and the business logic. It is hosted on a web server. The client application runs on the client web browser. Web applications are usually written in languages such as Java, C#, and VB.Net, PHP, ColdFusion Markup Language, etc. the database engines used in web applications include MySQL, MS SQL Server, PostgreSQL, SQLite, etc.

Most web applications are hosted on public servers accessible via the Internet. This makes them vulnerable to attacks due to easy accessibility. The following are common web application threats.

  • SQL Injection – the goal of this threat could be to bypass login algorithms, sabotage the data, etc.
  • Denial of Service Attacks– the goal of this threat could be to deny legitimate users access to the resource
  • Cross Site Scripting XSS– the goal of this threat could be to inject code that can be executed on the client side browser.
  • Cookie/Session Poisoning– the goal of this threat is to modify cookies/session data by an attacker to gain unauthorized access.
  • Form Tampering – the goal of this threat is to modify form data such as prices in e-commerce applications so that the attacker can get items at reduced prices.
  • Code Injection – the goal of this threat is to inject code such as PHP, Python, etc. that can be executed on the server. The code can install backdoors, reveal sensitive information, etc.
  • Defacement– the goal of this threat is to modify the page been displayed on a website and redirecting all page requests to a single page that contains the attacker’s message.

How to protect your Website against hacks?

An organization can adopt the following policy to protect itself against web server attacks.

  • SQL Injection– sanitizing and validating user parameters before submitting them to the database for processing can help reduce the chances of been attacked via SQL Injection. Database engines such as MS SQL Server, MySQL, etc. support parameters, and prepared statements. They are much safer than traditional SQL statements
  • Denial of Service Attacks – firewalls can be used to drop traffic from suspicious IP address if the attack is a simple DoS. Proper configuration of networks and Intrusion Detection System can also help reduce the chances of a DoS attack been successful.
  • Cross Site Scripting – validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values can help reduce XSS attacks.
  • Cookie/Session Poisoning– this can be prevented by encrypting the contents of the cookies, timing out the cookies after some time, associating the cookies with the client IP address that was used to create them.
  • Form tempering – this can be prevented by validating and verifying the user input before processing it.
  • Code Injection – this can be prevented by treating all parameters as data rather than executable code. Sanitization and Validation can be used to implement this.
  • Defacement – a good web application development security policy should ensure that it seals the commonly used vulnerabilities to access the web server. This can be a proper configuration of the operating system, web server software, and best security practices when developing web applications.

Summary

  • A web application is based on the server-client model. The client side uses the web browser to access the resources on the server.
  • Web applications are usually accessible over the internet. This makes them vulnerable to attacks.
  • Web application threats include SQL Injection, Code Injection, XSS, Defacement, Cookie poisoning, etc.
  • A good security policy when developing web applications can help make them secure.

Invicti, the developers of Proof Based Scanning technology, have sponsored the Guru99 project to help raise web application security awareness and allow more developers to learn about writing secure code

Источник

Website Hacking Using Html Coding

1

Note:- This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.

Step 1:-Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ‘ or 1=1 –)An error will occur saying wrong username-password. Now be prepared your experiment starts from here

2

Step 2:-Right click anywhere on that error page =>> go to view source.

3

Step 3:There you can see the HTML coding with JavaScript.• There you find somewhat like this….• Before this login information copy the URL of the site in which you are. (e.g. :”< _form……….action=http://www.targetwebsite.com/login…….>”)

4

Step 4:-Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)

5

step 5:Then take a close look for “”[without quotes] -> replace “” with “”. See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )

6

Step 6:- Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)

7

Step 7:- Reopen your target web page by double clicking ‘chan.html’ file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don’t worry.

8

Step 8:-Provide any username [e.g.: hacker] and password [e.g.:’ or 1=1 –] You have successfully cracked the above website and entered into the account of List user saved in the server’s database

  • Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.

Thanks For Reading, Education purpose only.

Источник

Оцените статью