Powered by Blogger.

Translate

Popular Posts

About

IP Address Checker
IP Address Checker

Blogger news

Blogroll

Search

Blogger templates

RSS
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

List Of 7000 Dorks For Hacking Into Various Websites


Finding Vulnerable Website Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google.

Some Examples:
 inurl:index.php?id=
 inurl:gallery.php?id=
 inurl:article.php?id=
 inurl:pageid=

How to use?
 copy one of the above command and paste in the google search engine box.
 Hit enter.
 You can get list of web sites.


 List of 7000 Dorks.....
DOWNLOAD HERE

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Symlink Tutorial



Hello Guys, Today I'm going to explain how to symlink websites in two different methods.

So Lets Start!

[#] Explanation

First I will explain what symlink can do, Symlinking is making Symbolic links to other websites on the same server to read their configuration files, connect to their database, and get the information needed to get access to their Control panel.
and that's about it :)



[#] Method #1


After uploading you shell on the server make a directory with the command bellow:

mkdir sym


NOTE:- The directory can be called whatever you want, just change the "sym" to any name.


Enter your new directory then upload OR create a file called ".htaccess" in the new directory with the code bellow inside it:


Options all 

DirectoryIndex Sux.html 

AddType text/plain .php 

AddHandler server-parsed .php
  AddType text/plain .html 

AddHandler txt .html 

Require None 

Satisfy Any
Like this picture:

After that, we will run the command bellow to create a symlink to "/" directory:
ln -s / root
and it will look like this:

And if we opened the directory "sym" from our browser like "www.website.com/sym" it should look like this:

in the image above my shell was in /downloads so I made "sym" directory inside /downloads
and our process is almost done, now we just have to get the user of the target website.
I've provided user.php code in the bottom of the post, this script will give you all the websites on the server and their username.

when you get the username of your target, just open the link like this:


www.website.com/sym/root/home/(user)/public_html

where (user) = the user of the target
here is a picture for example:

where the user was "hillock"
now the next step is easy, we will start looking for the configuration its usually called config.php, or configuration.php. here are the location of configuration files in the most famous webapps out there.
vBulletin -- /includes/config.php

IPB -- /conf_global.php

MyBB -- /inc/config.php

Phpbb -- /config.php

Php Nuke -- /config.php

Php-Fusion -- config.php

SMF -- /Settings.php

Joomla -- configuration.php , configuration.php-dist

WordPress -- /wp-config.php

Drupal -- /sites/default/settings.php

Oscommerce -- /includes/configure.php

e107 -- /e107_config.php

Seditio -- /datas/config.php


when you find the configuration file, it will contain the database details.

it will look like the image bellow (image bellow is joomla configuration file):

now upload SQL.php (code provided bellow)
and connect to the database.
Congrats :) now you can get all the details from admin table, and even change it.

[#] Method #2


In this method, we wont symlink the root directory, we will symlink the target's public_html dir directly.

To do this, just follow those steps,
1. Make the a new directory, just like method 1
2. make ".htaccess" OR upload it with the code bellow:
Options Indexes FollowSymlinks

DirectoryIndex z0mbie.htm

AddType txt .php

AddHandler txt .php

3. run the following comman:
ln -s /home/(user)/public_html (user)

where (user) = the target's user
and it will look like this when we open it in our browser:
in the picture the user name of my target was "csseipsn"
now you just have to find the configuration and connect :)

Scripts Needed:

User.php Source Code

SQL.php Source Code


LIKE ALWAYS ITS ONLY FOR EDUCATIONAL PURPOSE ONLY!

Source: Security Geeks

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Using Metasploit Tool



Steps:

1) Get the correct Distribution of metaslpoit framework from http://www.metasploit.com/base upon the distribution u are using, Windows or Linux.
2) Install the framework, but remember the followings
i) Disable your Antivirus while installing ; Otherwise it will delete certain files or format, which are updated as virus in your antivirus software by the vendor.
3)It has a nice documentation at : http://www.metasploit.com/projects/Framework/docs/userguide/index.html
, You can also save a copy of the PDF version from http://www.metasploit.com/projects/Framework/docs/userguide.pdf
4) To use metasploit you have to know the commands : use, show, set. These commands have following definitions:
Let us start with use : for using some exploit (use exploit_name), that can be viewed by the show command. After using a exploit what are the operation you can carry out can be vewied by the command show options. And the options can be set by the set command. So the following steps of commands will carry an succesfull attack.
> show exploits
a descriptions
b descriptions
..
..
..
>use a
>show payloads
x descriptions
y descriptions
..
..
>set PAYLOAD x
>show options
x descriptions

...

After you set all.
> exploit
So, I think i have tried to give something here to start with metasploit.

~~~~~~~~~~~~~~~All the best~~~~~~~~~~~~~~~~~~~~~~~~~~~

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

DDOSing Without Any Software



DDOSing without any software :D

First open your CMD from run ( window + r )


Now the important thing what we want is the ip address of the

site that we are going to attack.

To get the ip of any site just type nslookup in cmd followed by

the address of website

for eg: if you want the ip address of google just type

nslookup http://www.google.com/ 

or
ping www.google.com


these command will give you the ip address

Ok , now you got the ip address of the site you are going to

attack,

then type the following command in your CMD and hit enter

ping website-IP -l 65500 -n 10000000 -w 0.00001

-n 10000000= the number of DoS attemps.. u can change the

value "10000000" with ur desiredvalue u want to attempt attack.

website-IP= Replace the text with the ip address of the site u

want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

for eg: if the ip address is 112.158.10.2

just type

ping 112.158.10.2 -l 65500 -n 10000000 -w 0.00001

And thats it you are done . Dont Change or Remove -l, -n and -w

in this command.. otherwise it wont work
 enjoy hacking !!! :D


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Become Hacker


How to become H4ck3r ? 
 1. Have the 'hacker' attitude
 2. Improve your logical thinking
 3. Practice your English
 4. Learn programming languages
 5. Make your one GOAL
 6. Think like an Intelligent Person
 7. Kick out Studies. :D
 8. Bung the College and sit on
 Computer :D

 9. Get Hacker's Inspiration
 10. Switch to LinuX from Windows

 PRACTICE PRACTICE PRACTICE

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Top 5 Things Hacker Must Know

Top 5 Things Hacker Must Know




This post is for those who want to become a true hacker and for those also who are hacker, most of the hacker doesn't know some basic things that a hacker must know.Today most of the hackers want direct method to hack big site without having full knowledge and want to earn lots of money in short time.
 


Remember that   A Hacker Is Not a person who just hacks email id’s or servers but a True Hacker is a Computer Genius who the knowledge of computers more than anyone.
 Next time think before asking the question – “How much Will I get in this field?” because, if you have so many skills , you really don’t have to run after money. Success comes and money follows itself.
 

1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.

2) There is NO DIRECT SOFTWARE  to Hack Facebook , Google , Yahoo or any other big website. All the softwares that you find on the site claiming to hack big site are not trusted. They are just meant to take your money and in worse cases, those softwares may also have trojans or keyloggers in them. As a result your account gets hacked trying to hack others.

3) NEVER use the untrusted keyloggers or trojans you find as freeware on internet or suggested by a friend. Hackers are not fools. They compile keyloggers and trojans almost with any such software and when you install them , you are already hacked before even trying to hack others.

4) You are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only ready made softwares and would depend on them for hacking anything then your functionality would be limited upto the functionality of the software. When you are not going to use your brain , just doing the copy paste thing, then how can you even think of being a good hacker.

5) If you are a good Hacker, you already become a good programmer , a good script writer , a good web developer and an excellent security expert. Well any good Hacker will/should have good knowledge of various aspects and programming languages. to do XSS (Cross Site Scripting ) , PHP INJECTION , SQL INJECTION , PHISHING , FOOTPRINTING etc… you will have to be good at programing and scripting. And when you know the Various loop holes , vulnerabilities and security tips, you already become a Computer Security Expert.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS