

Below is example of some queries.Įxamples: Open Google and copy and paste these queries: Some Google searches can be wonderfully utilized to find out vulnerable websites. I have collected a lot of dorks i.e the vulnerability points of the websites.

Finding the Target and the Admin Passwordįirst of all we must find out our target website. Most of it was written by me so I can clear up any confusion you may have.ġ. Shell Script (for getting Admin Controls)įirst of all, I would like to say that I took parts of an SQL injection tutorial from my previous posts and a site. SQL Injection (for analyzing website loops)ģ.

Then all the users who open it will see our page (i.e the page being uploaded by us).įor defacing a website, three things that you need are:ġ. FIRST OF ALL YOU SHOULD KNOW: WHAT IS DEFACEMENT?ĭefacing a website simply means that we replace the index.html file of a site with our file.
