Using search engines as a hacking tool Google hacking involves using special search terms in the google search engine to narrow down the search results to something very specific. Hackers use it to find vulnerable or exploitable websites, servers and confidental/sensitive data that got exposed to the internet due to poor security. Google search supports… Read More »
Sqlmap is the most popular tool for automated exploitation of sql injection vulnerability and database takeover. Its written in python is cross platform. If you are using Backtrack then sqlmap comes pre packaged in it. In this post I am going to show you the simple process to setup and run sqlmap on windows. 1…. Read More »
Out of the many useful auxiliary modules that metasploit has, one is called search_email_collector which searches google, bing and yahoo for email addresses associated to a particular domain. This is useful in automated information gathering during a penetration test program. The location inside msfconsole is auxiliary/gather/search_email_collector So lets try it out. Launch msfconsole. I am… Read More »
Ping Sweep Ping sweep is the process of pinging an entire range of network ip addresses to find out which ones are online or alive. Nmap is an excellent tool to do this quickly and effectively. Here is the command $ nmap -n -vv -sn 192.168.1.1-255 -oG – | grep -i 'up' Host: 192.168.1.1 ()… Read More »
Social Engineering Toolkit Social engineering toolkit is the most powerful tool for performing social engineering attacks. It is the metasploit of social engineering in a way. It provides a very easy user interface to perform attacks like phishing, browser exploitation etc. In this tutorial we are going to see how it can be used to… Read More »
Sqlmap In the previous post on we learnt how to use sqlmap to hack a vulnerable web application and fetch the list of databases, tables, columns and data rows. In this post we shall see how to do some simple fingerprinting on the remote database to find valuable information that can be used to assist… Read More »
Netcat is a command line utility that can perform lots of tasks like telnet. In this tutorial we shall use it to get a reverse shell using a php backdoor.
After hacking a web application or server to such an extent that you can upload files to it, the next thing to try is get a proper shell on the system. The most common approach is to create reverse shells. In this approach first a listener program is run on the hacker’s machine and then… Read More »
The nmap scripting engine allows users to write scripts in Lua to automate the process of scanning. This tutorial shows how to use the existing scripts that come with nmap for information gathering.
Metasploit can be used to make simple yet powerful trojans for windows that can allow a hacker complete access and control over the target system. In this article we shall see how to use metasploit to make a trojan and hack a windows system using it. You shall need a system running metasploit and another… Read More »
NMAP – Network Mapper Nmap is the most popular (and most featureful) port scanning tool out there. And although it appears like a small port scanning utility, it has a lot of hidden potential to serve as a powerful hacking tool. This is precisely what we shall try to work out in this article. In… Read More »
Tcpdump Tcpdump is a commandline network analyzer tool or more technically a packet sniffer. It can be thought of as the commandline version of wireshark (only to a certain extent, since wireshark is much more powerful and capable). As a commandline tool tcpdump is quite powerful for network analysis as filter expressions can be passed… Read More »
The standard telnet utilities that are present in linux or windows can connect to services running on TCP ports. They do not support udp ports. However the utility netcat can be used to connect and work with udp ports in the same way as the telnet command. The telnet command can connect to a host… Read More »
BSNL now a days is providing a adsl router made by SemIndia Systems and the model names are similar to DNA-A201 or DNA-A211-1. In this article we are going to hack into this router to learn more about it. You might not know that this small and innocent looking modem is actually a “Linux CPU”…. Read More »
Netcat is a commandline utility like telnet but with much more features. Learn to use netcat with these simple commands examples.
Nmap Nmap (Network Mapper) is the most popular port scanner and network discovery tool used. It can be used to scan a network for live hosts and scan hosts for open ports. Besides port scanning there are many more things that Nmap can do like OS identification, running user scripts etc. It is widely used… Read More »
Tsocks There are many network applications that do not have the option to specify a proxy or do not support the use of proxies. In such cases tsocks is a useful tool to wrap all network communication done by a program via a socks proxy. Project website Install on ubuntu $ sudo apt-get install tsocks… Read More »
TOR is an anonymity solution that can be used as a proxy over the internet. Project website Install on Ubuntu $ sudo apt-get install tor vidalia During the installation a configuration screen will come up, asking to select those users who would be using tor. Select the appropriate users on that page and continue. After… Read More »
Nikto Nikto is a vulnerability scanner that scans webservers for thousands of vulnerabilities and other known issues. It is very easy to use and does everything itself, without much instructions. It is included by default in pen testing distros like Kali linux. On other oses/platforms you need to install it manually. Can be downloaded from… Read More »
In a previous article we saw how to use sqlmap to exploit vulnerable urls of the form http://www.site.com/section.php?id=59 where the id parameter for example is vulnerable to sql injection. Now we shall try to do the same thing with forms, especially login forms. Forms often submit data via post, so the sytanx for launching the… Read More »