Saturday, January 31, 2015

Accessing Databases with Object-Oriented PHP Tutorial



- 01. Introduction


 01_01-Welcome 

 01_02-What you should know before watching this course


01_03-Using the exercise files


01_04-Setting SQLite permissions


01_05-A quick primer on using PHP objects



 Downlaod >> 01. Introduction :  Password For 7zip is AlbDll.com


-----------------------------------------------------------


- 02. Why Use Object-Oriented PHP to Access a Database 

02_01-Overview of PHP database APIs


02_02-Using prepared statements



02_03-Using transactions


 Downlaod >> 02. Why Use Object-Oriented PHP to Access a Database  :  Password For 7zip is AlbDll.com

-----------------------------------------------------------

Wednesday, January 21, 2015

EC-Council Certified Ethical Hacker CEH v8 (Tools)




Module 00 - Student Introduction
- Student Introduction
- Course Materials
- CEHv8 Course Outline
- EC-Council Certification Program
- Certified Ethical Hacker Track
- CEHv8 Exam Information
- Lab Sessions
- What Does CEH Teach You?
- What CEH is NOT?
- Remember This!
- CEH Class Speed
- Live Hacking Website
- Advanced Lab Environment
- Student Computer Checklist
- Launching Command Shell
- Snapshots of Virtual Machines
- AirPcap
- Live Hack Website
- Lets Start Hacking!!!!!


Module 01 - Introduction to Ethical Hacking

- Module Flow: Info Security Overview
- Security News
- Internet Crime Current Report: IC3
- Data Breach Investigations Report
- Essential Terminology
- Elements of Information Security
- The Security, Functionality, and Usability Triangle
- Module Flow: Information Security Threats and Attack Vectors
- Top Information Security Attack Vectors
- Motives, Goals, and Objectives of Information Security Attacks
- Information Security Threats
- Information Warfare
- IPv6 Security Threats
- Module Flow: Hacking Concepts
- Hacking vs. Ethical Hacking
- Effects of Hacking on Business
- Who Is a Hacker?
- Hacker Classes
- Hacktivism
- Module Flow: Hacking Phases
- Hacking Phases
- Module Flow: Types of Attacks
- Types of Attacks on a System
- Operating System Attacks
- Misconfiguration Attacks
- Application-Level Attacks
- Examples of Application-Level Attacks
- Shrink Wrap Code Attacks
- Module Flow: Information Security Controls
- Why Ethical Hacking is Necessary
- Scope and Limitations of Ethical Hacking
- Skills of an Ethical Hacker
- Defense in Depth
- Incident Management Process
- Information Security Policies
- Classification of Security Policies
- Structure and Contents of Security Policies
- Types of Security Policies
- Steps to Create and Implement Security Policies
- Examples of Security Policies
- Vulnerability Research
- Vulnerability Research Websites
- Demo - Vulnerability Research Website
- What is Penetration Testing?
- Why Penetration Testing
- Penetration Testing Methodology




Friday, January 9, 2015

Latest Google Dorks.



SQLi Dork list:

trainers.php?id=
article.php?ID=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
detail.php?ID=
publications.php?id=
Productinfo.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
channel_id=
newsid=
news_display.php?getid=
ages.php?id=
clanek.php4?id=
review.php?id=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
look.php?ID=
galeri_info.php?l=
tekst.php?idt=
newscat.php?id=
newsticker_info.php?idn=
rubrika.php?idr=
offer.php?idf=
“id=” & intext:”Warning: mysql_fetch_array()
“id=” & intext:”Warning: getimagesize()
“id=” & intext:”Warning: session_start()
“id=” & intext:”Warning: mysql_num_rows()
“id=” & intext:”Warning: mysql_query()
“id=” & intext:”Warning: array_merge()
“id=” & intext:”Warning: preg_match()
“id=” & intext:”Warning: ilesize()
“id=” & intext:”Warning: filesize()