Search the Community

Showing results for tags 'sql'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 553 results

  1. In this course, we'll be looking at database management basics and SQL using the MySQL RDBMS. The course is designed for beginners to SQL and database management systems, and will introduce common database management topics. Throughout the course we'll be looking at various topics including schema design, basic C.R.U.D operations, aggregation, nested queries, joins, keys and much more. Contents (0:00) Introduction (2:36) What is a Database? (23:10) Tables & Keys (43:31) SQL Basics (52:26) MySQL Windows Installation (1:01:59) MySQL Mac Installation (1:15:49) Creating Tables (1:31:05) Inserting Data (1:38:17) Constraints (1:48:11) Update & Delete (1:56:11) Basic Queries (2:08:37) Company Database Intro (2:14:05) Creating Company Database (2:30:27 ) More Basic Queries (2:26:24) Functions (2:45:13) Wildcards (2:53:53) Union (3:01:36) Joins (3:11:49) Nested Queries (3:21:52) On Delete (3:30:05) Triggers (3:42:12) ER Diagrams Intro (3:55:53) Designing an ER Diagram (4:08:34) Converting ER Diagrams to Schemas [Hidden Content]
  2. SQL Injection In this section, we'll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. What is SQL injection (SQLi)? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. [HIDE][Hidden Content]]
  3. [HIDE][Hidden Content]]
  4. 0x1

    HackBar V2

    Firefox Extension of HackBar without license A HackBar for new firefox (Firefox Quantum). This addon is written in webextension and alternatives to the XUL version of original Hackbar. How to use Press F12 to open hackbar Feature Load, split, execute url from address bar. Custom/add referrer url, User Agent, cookie. Tools: md5, sha1, sha256, rot13 encryption, url, base64 encoding, beautifier json data, sql, xss features. Shortcut Ctrl + Enter to execute FOREVER FREE Download && Code Source [Hidden Content]
  5. dEEpEst

    How Does SQL Injection Work?

    [Hidden Content]
  6. TheJshen contentManagementSystem version 1.04 suffers from a remote SQL injection vulnerability. View the full article
  7. Mr Blog PHP suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  8. WordPress Google Review Slider plugin version 6.1 suffers from a remote SQL injection vulnerability. View the full article
  9. delpino73 Blue-Smiley-Organizer version 1.32 suffers from a remote SQL injection vulnerability. View the full article
  10. waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a remote SQL injection vulnerability. View the full article
  11. AUO SunVeillance Monitoring System version 1.1.9e suffers from a remote SQL injection vulnerability. View the full article
  12. WordPress Sliced Invoices plugin versions 3.8.2 and below suffer from a remote SQL injection vulnerability. View the full article
  13. WiKID Systems 2FA Enterprise Server version 4.2.0-b2032 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. View the full article
  14. Joomla Sumoku component version 3.9.8 suffers from a remote SQL injection vulnerability. View the full article
  15. Joomla Vemod News Mailer component version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  16. Joomla MediaLibrary component version 1.5.26 suffers from a remote SQL injection vulnerability. View the full article
  17. Joomla MisterEstate component version 1.5.26 suffers from a remote SQL injection vulnerability. View the full article
  18. Joomla Google Maps component version 1.0.4 suffers from a remote SQL injection vulnerability. View the full article
  19. Joomla Mad4Joomla component version 1.1.x suffers from a remote SQL injection vulnerability. View the full article
  20. Joomla Cactus component version 1.2.0 suffers from a remote SQL injection vulnerability. View the full article
  21. Joomla SwPhotoGallery component version 1.5.26 suffers from a remote SQL injection vulnerability. View the full article
  22. 1337day-Exploits

    SugarCRM 9.0.1 SQL Injection

    SugarCRM versions 9.0.1 and below suffer from multiple remote SQL injection vulnerabilities. View the full article
  23. 1337day-Exploits

    vBulletin 5.5.4 SQL Injection

    vBulletin versions 5.5.4 and below suffer from multiple remote SQL injection vulnerabilities. View the full article
  24. Thailand Union Library Management version 6.2 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  25. SQLMap v1.3.10 - Automatic SQL Injection And Database Takeover Tool SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Features Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, HSQLDB and Informix database management systems. Full support for six SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band. Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. Support to enumerate users, password hashes, privileges, roles, databases, tables and columns. Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack. Support to dump database tables entirely, a range of entries or specific columns as per user's choice. The user can also choose to dump only a range of characters from each column's entry. Support to search for specific database names, specific tables across all databases or specific columns across all databases' tables. This is useful, for instance, to identify tables containing custom application credentials where relevant columns' names contain string like name and pass. Support to download and upload any file from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server. Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is MySQL, PostgreSQL or Microsoft SQL Server. Support to establish an out-of-band stateful TCP connection between the attacker machine and the database server underlying operating system. This channel can be an interactive command prompt, a Meterpreter session or a graphical user interface (VNC) session as per user's choice. Support for database process' user privilege escalation via Metasploit's Meterpreter getsystem command. [HIDE][Hidden Content]]