WELCOME TO SHOTTING.CC
hackers. They are the elite one per cent of computer people in cyberspace.
it takes years of training to find a working exploit. But, with researching exploits, one finds that if one exploit exists, such as xss, then in cyberspace people who build the web leave holes behind that the fly can pass through - and basically hack the box.
how do they do it? By exploits such as xss, buffer overflows on the command or terminal line, and open ports. If you open a port on your system, you can be exploited. There are not many defences for an open port.
Is shottings inputs sanitary? Sure! We limit input by the char, we do not allow certain characters. And strip input for insertion in the database.
GET and POST requests can be overflowed if there is no limit checks on input. Think twitter. And an overflow can result in GET rooted.
But the hacker doesn't always want server root. They may just want your password. And use social engineering to extract the password from you or a colleague.
Excuse the noise.