Gazzaly Hacking Tricks | |
- Uploaded.to Won't Available for US Visitors After MegaUpload.com Shutdown
- How to Do XPath Injection Tutorial to Hack Websites Database
- New Fresh Premium Account Filesonic | Oron | Uploaded | Filefactory | Fileape | Uploading | Fileserve | Videozer | Filemashine | Netflix | 4Shared | Sharecash | Real-Debrid | Rapidshare | Wupload | Hotfile | Megaupload 23/1/2012
- New Fresh Premium Account Filesonic | Oron | Uploaded | Filefactory | Fileape | Uploading | Fileserve | Videozer | Filemashine | Netflix | 4Shared | Sharecash | Real-Debrid | Rapidshare | Wupload | Hotfile | Megaupload 23/1/2012
- New Fresh Premium Account Filesonic.com | Fileserve.com | Wupload.com | Hotfile.com | Oron.com 22/1/2012
| Uploaded.to Won't Available for US Visitors After MegaUpload.com Shutdown Posted: 22 Jan 2012 04:12 AM PST
Uploaded.to, one of the most popular file-hosting sites in the Internet, has closed its doors to US visitors. The move is most likely a response to the FBI crackdown on MegaUpload two days ago. US visitors of Uploaded.to currently get the following message. "Not Available: Our service is currently unavailable in your country. Sorry about that." The site has yet to release an official statement on the "block." Whether it's permanent, and the alleged relation to the MegaUpload raids and arrests is unknown at this point. Uploaded.to's decision is just one of the many changes the major cyberlockers have made during the past days. More on that later.
| ||||
| How to Do XPath Injection Tutorial to Hack Websites Database Posted: 22 Jan 2012 04:00 AM PST Everyday we get news that so and so website is hacked by some Hacker and most of us think that Hacker is very genius but reality is quite different. Most of the hackers which defaces websites are novice hackers and perform these shameful acts just for popularity and show off. Its just the interest which varies from person to person, the web designer just concentrates on designing his website and hackers just focuses on searching of exploits. But did we had ever concentrated on the fact, if web designer starts searching exploits then how destructive he can be, and if he uses it positively then how much constructive that can be. So its your decision which path you will choose.. constructive or destructive . I can just provide you tutorials that will enhance you knowledge base.. Note: This article is for Educational Purposes only. Be a part of constructive society. Fame and Name can also be earned by being on constructive side. I know its difficult but if you are good then you will be surely recognized.
|
| Hacked by Gazzaly |
Lets learn with the help of examples that how XPath works, in below example we have a sample XML Database File:
<?xml version="1.0" encoding="ISO-8859-1"?><greenhathacker_database><greenhathacker_user><username>greenhathacker</username><password>testing123</password><account>Administrator</account></greenhathacker_user><greenhathacker_user><username>Lokesh</username><password>test1234</password><account>Subscriber</account></greenhathacker_user><greenhathacker_user><username>Destructive</username><password>mind123</password><account>Subscriber</account></greenhathacker_user></greenhathacker_database>
In the above code shows the basic format how XML file that is used to store sensitive
Now if we want to retrieve the information about Administrator from the above XML file, we have to write a XPath Better to Try Next Tutorial .. If u need only i'll teach so better to Comment ;)))))
Posted: 22 Jan 2012 03:51 AM PST
Posted: 22 Jan 2012 03:50 AM PST
Posted: 22 Jan 2012 03:48 AM PST
User : radioactive15@hotmail.com
Pass : stephie1
Pro Membership Valid Until:
2012-08-02 05:31:19
User : sumper14@hotmail.com
Pass : www.extra7.pl
Pro Membership Valid Until:
2012-02-09 06:10:01
User : naser_1980@hotmail.com
Pass : 123654
Pro Membership Valid Until:
2012-12-02 21:28:21
User : superfly@mail.gr
Pass : superfly
Pro Membership Valid Until:
2012-02-05 21:29:14
User : mehsin@gmail.com
Pass : 22221111
Pro Membership Valid Until:
2012-02-07 06:03:07
User : naser_1980@hotmail.com
Pass : 123654
Pro Membership Valid Until:
2012-12-02 21:28:21
User : chiefw@live.de
Pass : abc123
Pro Membership Valid Until:
2012-01-10 21:15:03
User : numbvox@gmail.com
Pass : ecips2
Pro Membership Valid Until:
2012-02-20 02:47:15
User : fhr.scholz@t-online.de
Pass : pastill
Pro Membership Valid Until:
2012-01-21 03:18:56
User : sh@heymann-online.de
Pass : saxtur
Pro Membership Valid Until:
2012-02-20 13:13:32
User : woody78_2000@yahoo.com
Pass : manjola
Pro Membership Valid Until:
2012-01-21 16:58:14
User : truematt@yahoo.com
Pass : download5
Pro Membership Valid Until:
2012-01-21 19:41:37
User : c.danya@me.com
Pass : ciao73
Pro Membership Valid Until:
2012-02-15 20:31:21
| You are subscribed to email updates from Free Hacking and Security Related Articles To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google Inc., 20 West Kinzie, Chicago IL USA 60610 | |




Niciun comentariu:
Trimiteți un comentariu