Version 1.27 ~ June 2007 HOW TO ACCESS ANY DATABASE ON THE WEB (how to find working passwords when you forget your own) This is a 'living' workshop on passwords searching and database accessing, you will find elsewhere on my site other "broad" site protection (and de-protection :-) lore. There are many approaches that will open us the "dragon lairs" where our targets have been hidden.Anyway we will find more knowledge only if we create it ourself at the same time. Your own contributes and work are necessary. The material presented here should be more than enough to "get you started". Awaiting your own contributions. Check the passwords ad hoc tools.
|
An introduction - explanation for those that do not know... |
Our essays |
Strata gems by ~S~ loki |
|
Combing approach |
Guessing and using backdoors |
1. Smith | 11. Anderson | 21. Clark | 31. Wright | 41. Mitchell |
2. Johnson | 12. Thomas | 22. Rodriguez | 32. Lopez | 42. Perez |
3. Williams | 13. Jackson | 23. Lewis | 33. Hill | 43. Roberts |
4. Jones | 14. White | 24. Lee | 34. Scott | 44. Turner |
5. Brown | 15. Harris | 25. Walker | 35. Green | 45. Phillips |
6. Davis | 16. Martin | 26. Hall | 36. Adams | 46. Campbell |
7. Miller | 17. Thompson | 27. Allen | 37. Baker | 47. Parker |
8. Wilson | 18. Garcia | 28. Young | 38. Gonzalez | 48. Evans |
9. Moore | 19. Martinez | 29. Hernandez | 39. Nelson | 49. Edwards |
10. Taylor | 20. Robinson | 30. King | 40. Carter | 50. Collins |
1. James | 11 Christopher | 21. Ronald | 1. Mary | 11. Lisa | 21. Michelle | |
2. John | 12. Daniel | 22. Anthony | 2. Patricia | 12. Nancy | 22. Laura | |
3. Robert | 13. Paul | 23. Kevin | 3. Linda | 13. Karen | 23. Sarah | |
4. Michael | 14. Mark | 24. Jason | 4. Barbara | 14. Betty | 24. Kimberly | |
5.William | 15. Donald | 25. Jeff | 5. Elizabeth | 15. Helen | 25. Deborah | |
6. David | 16. George | 6. Jennifer | 16. Sandra | |||
7. Richard | 17. Kenneth | 7. Maria | 17. Donna | |||
8. Charles | 18. Steven | 8. Susan | 18. Carol | |||
9. Joseph | 19. Edward | 9. Margaret | 19. Ruth | |||
10. Thomas | 20. Brian | 10. Dorothy | 20. Sharon |
Reversing protection schemes |
Function decif(cifrat) y = 0 For X = 1 To Len(cifrat) Step 2 decif = decif & Chr(CInt("&H" & Mid(cifrat, X, 2)) - y) y = y + 1 Next X End FunctionSo if password
616F71717D727B7A48 a o q q }r {z Hthen it is anonymous
Exploiting server weakness |
Bruteforcing & "Bruteforcing resistant" passwords |
Schon haengen die Lampions wie bunte Trauben An langen Schnueren ueber kleinen Beeten Den gruenen Zaeunen, und von den Staketen Der hohen Bohnen leuchtend in die Lauben |
Password_1: ShdLwbT Password_2: AlSukB Password_3 (1+2): ShdLwbTAlSukB SuperPassword_4 (all_together_now): ShdLwbTAlSukBDgZuvdSdhBlidL StraSuperPassword_5 (all_together_now plus numbers): ShdLwbTA1SukBDgZuvdSdhB1idL (notice the two "1") |
Social engineering |
Carding |
Targets |
Password webbits |
Targets |
And next ? |
"please" and "thank you" will open any door... hehe