Malaysia Government DBKL Web Vulnerability (2nd)

February 12, 2010 0 Comments 0 tags

PlanetCreator has reported Critical XSS vulnerability on Official Portal of Kuala Lumpur, Malaysia Web Site, http://www.planetcreator.net/2009/09/criti…aysia-web-site/ and http://www.xssed.com/mirror/64058/ but nobody takes action ~~~ How come? Hello, DBKL’s Staffs! Are you

Burmese Hackers Hacked Georgia Government’s Web www.moh.gov.ge

February 12, 2010 0 Comments 0 tags

Burmese Hackers Group! Named (“BurmeseHackers” or “UnderGround Hackers Group @ ughackersgroup{at}gmail.com”), Hacked Georgia Gorvernment’s Web  www.moh.gov.ge , Really rare event, cos i’ve never heard about this hackers group before! They

Open University Malaysia (OUM)’s Web Vulnerability

February 2, 2010 0 Comments 0 tags

PlanetCreator had informed OUM’s XSS Vulnerability CODE http://www.planetcreator.net/2009/11/critical-xss-vulnerability-on-open-university-malaysia/ But nobody cares , How come they all wana do like this so shit! Where is OUM’s Wemaster? Sleeping @ Camp? Yeah,

Malaysia mymasjid.net.my’s Web Vulnerability, MySQL Injection

February 2, 2010 0 Comments 0 tags

PlanetCreator has reported another critical MySQL Injection (vulnerability) on www.mymasjid.net.my This vulnerability has been alerted to :- Webmaster : [email protected] Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Securi ty_T00L System Time: ———— (UTC+08:00) Kuala Lumpur,

Local File Inclusion (LFI) tutorial

January 28, 2010 0 Comments 0 tags

This tutorial will guide you into the process of exploiting a website through the LFI (Local File Inclusion). First lets take a look at a php code that is vulnerable

Blind SQL Injection

January 27, 2010 0 Comments 0 tags

Blind injection: you dont actually see anything, you just see how the server responds.Blind injection is a little more complicated/time consuming, but when your injection is multi-select and union isn’t

MSSQL – injection Tutorial

January 26, 2010 0 Comments 0 tags

MSSQL – injection ########################### 1.1 Introduction 1.2 How to ask Vulnerability page? 1.3 How to prove that the site of weakness? 1.4 How to find version / name of the