
A hacker can get easily access to user names and passwords in a database by simply inserting ‘or”=’ into the user name and password text box as shown below: SQL Injection is one of the most common web hacking technique and usually occurs when you ask a user for input, like username and password. So first step to bypass the login panel via string based SQL Injection. In this practical scenario, we are going to hack the admin panel of a website through String based SQL Injection and then will try to upload a malicious exploit through a form via upload field and then will get the reverse connection in Meterpreter. The following are common web application threats.

This makes them vulnerable to attacks due to easy accessibility. Most web applications are hosted on public servers accessible via the Internet. In this article, we will introduce you to web applications hacking technique and the counter measures you can put in place to protect against such attacks.

Poorly written code for web applications can be exploited to gain unauthorized access to sensitive data and web servers. This has prompted many organizations to develop web-based applications that users can use online to interact with the organization. More people have access to the internet than ever before. In a recent survey, only 15% of business owners saw security as a challenge when more than half had reported being hacked and of that, only 6% of small businesses don’t have anyone handling their online security.
