Friday, June 18

Sql Injection / attack.............

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.
_______________________________________
' or '1'='1
_______________________________________

anything' or 's'='s


above is the code........
Put in the Login and password to get in.......which is connected to sql database....


Reason......

This form of SQL injection occurs when user input is not filtered for escape characters and is then passed into an SQL statement. This results in the potential manipulation of the statements performed on the database by the end user of the application.

This SQL code is designed to pull up the records of the specified username from its table of users. However, if the "userName" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the "userName" variable as

Thursday, June 17

Using Stegenography

Stegenography ____________________________
Hiding text behind images.................

1. Place one Jpeg image (a.jpg) and Text image (b.txt)
2. To combine Both file and using Stegenography
3. Open Dos and change location to where both file exist by cd command
4. Type code Below :

copy /b a.jpg+b.txt c.jpg




and enter now........
5. Open c.jpg as usual u do.. U will get images but not written text...
6. To watch text in d image file. Right click on it and open with notepad

U will got just symbols....... and bla bla.....
But at the end of all bla bla
U will got your message.............................

Monday, June 14

Sound Recorder...

Sound Recorder



______________________________________________________________________________


Public Class Recorder
Private Declare Function mciSendString Lib "winmm.dll" Alias "mciSendStringA" (ByVal lpstycommand As String, ByVal lpstrReturnString As String, ByVal uReturnLength As Integer, ByVal hwndCallback As Integer) As Integer
Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load

End Sub

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
Timer1.Enabled = True
Button1.Enabled = False
Button2.Enabled = True
Button3.Enabled = False
Label2.Text = 0
Label1.Text = "Recording!!"
mciSendString("open new type waveaudio Alias recsound", "", 0, 0)
mciSendString("record recsound", "", 0, 0)
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click
Timer1.Enabled = False
Button1.Enabled = True
Button2.Enabled = False
Button3.Enabled = True
Label1.Text = "Stopped!!"
mciSendString("Save recsound c:\recsound.wav", "", 0, 0)
MsgBox("File Created:C:\recsound.wav")
Label1.Text = "Stopped"


End Sub

Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button3.Click
Label1.Text = "Playing"
Label1.Visible = True
AxWindowsMediaPlayer1.URL = "C:\recsound.wav"
End Sub

Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick

Label2.Text = Label2.Text + 1
If Label2.Text > 59 Then
Label3.Text = Label3.Text + 1
Label2.Text = 0
End If

End Sub
End Class
_________________________________________________________