Website Hacking Using Havij Sql Injection Tool

07:18 |

Hacking Using Havij Powerfull Sql Injetion Tool
It is simple to hack with this Professional Tool Havij.You will learn how to get Usernames 
Passwords and other details from vulnerable sites.
 Go to google enter the dorks bellow
inurl:class.php?id=
inurl:faq2.php?id=
inurl:article.php?id=
inurl:main.php?id=

More can be found from Google!
Select a vulnerable website
eg; http://thewsite.com/class.php?id=12
 
Add (') without brackets to the adress 
and the website above will be like http://thewsite.com/class.php?id=12'
If you get Mysql error like bellow then site is Vulnerable. otherwise select another
Open Havij


 Enter the site address in the
Target Field and click Analyse
 Wait till the tool analyses
 Then if ur site is vulnerable you will be getting the database name in log field
eg
Current DB: ViRtUaL_SEdA_MaIn
Click on Get DBS
Select A Database
Click on Get Tables
Select A Table
Click on Get Colums

 
Select Some Columns eg username,password, ect

Click on Get Data
  
You will be getting Usernames and Passwords
Note:Passwords will be in encrypted form(eg; *3F5FB6596AF8D91ED7B5AC13071C73BF3E819A9A)
How to Decrypt  passwords

Click on MD5
Paste the encrypted password and click Start
Now you will have the plain Passwords
now you will have to find the Admin page

How to find the Admin Page

 
Click Find Admin
Enter the site address and click Start
Now Login Sucessfully

Note:This tutorial is only for practicals in your own Labs and Websites

  
This material is only for educational purpose only....
Read More

BlueTooth Hacking

07:15 |


Discovering Bluetooth Devices :-
Before any two bluetooth enabled devices can start communicating with one another, they must carry out a procedure known as discovery. It can be carried out by scanning for other active devices within the range.

Recommended   Tools
BlueScanner - It will try to extract as much information as possible for each newly discovered device.
BlueSniff       -It is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.
BTBrowser   -It is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth enabled devices. It works on phones that supports JSR-82 - the Java Bluetooth specification.
BTCrawler   -It is a scanner for Windows Mobile based devices. It also implements the BlueJacking and BlueSnarfing attacks.
  
Hacking Bluetooth Devices :-
There are a variety of different types of bluetooth related threats and attacks that can be executed against unsuspecting mobile phone users. Following are some of the most common types of threats :-

1) BluePrinting Attack :- Information gathering is the first step in the quest to break into target system. Even BlueTooth devices can be fingerprinted or probed for information gathering using the technique known as BluePrinting. Using this one can determine manufacturer, model, version, etc. for target bluetooth enabled device.

Recommended   Tools
BluePrint     -As the name suggests.
BTScanner  -It is an information gathering tool that allows attacker to query devices without the need to carry out pairing.

2) BlueJack Attack :- Bluejacking is the process of sending an anonymous message from a bluetooth enabled phone to another, within a particular range without knowing the exact source of the recieved message to the recepient.

Recommended   Tools
FreeJack  -Bluejacking tool written in JAVA.
CIHWB    -Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Supports BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack.

3) BlueSnarf Attack :- Bluesnarfing is the process of connecting vulnerable mobile phones through bluetooth, without knowing the victim. It involves OBEX protocol by which an attacker can forcibly push/pull sensitive data in/out of the victim's mobile phone, hence also known as OBEX pull attack.
This attack requires J2ME enabled mobile phones as the attacker tool. With J2ME enabled phone, just by using bluesnarfing tools like Blooover, Redsnarf, Bluesnarf, etc. an attacker can break into target mobile phone for stealing sensitive data such as address book, photos, mp3, videos, SMS, ......!

Recommended   Tools
Blooover       -It is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. It can also be used to carry out BlueBug attack.
RedSnarf      -One of the best bluesnarfing tool.
BlueSnarfer  -It downloads the phone-book of any mobile device vulnerable to Bluesnarfing

4) Blue Backdoor Attack :- Here, the bluetooth related vulnerability exploits the pairing mechanism that is used to establish a connection between two bluetooth enabled devices.Not only does it gives the attacker complete access and control over the target but also allows the attacker to place strategic backdoors for continued access and entry.

5) BlueBug Attack :- It was first discovered by Martin Herfurt and allows attackers to gain complete control over the data, voice and messaging channels of vulnerable target mobile phones.

Recommended   Tools
BlueBugger  -Exploits the BlueBug vulnerability.
Bluediving    -It is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, etc.

6) The bluetooth protocol allows devices to use 16 digit long pairing codes. Unfortunately many applications continue to use only 4 digit pairing codes which can be easily brute-forced. This is known as short pairing codes.
Most slave bluetooth devices continue to use default pairing codes such as 0000, 1111, 1234, etc. So, easy to crack and gain access...!
  

Recommended   Tools 
BTCrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.

Other Powerful BlueTooth Hacking Tools-

Transient Bluetooth Environment Auditor :- T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.

BlueTest :- BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. 

BTAudit :- BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. 

RedFang :- It is a brute force tool that finds even non-discoverable device.

BlueAlert :- A windows based tool that runs on bluetooth enabled computer and alerts the user each time a blurtooth device leaves or enters into its range.

BlueFang :- Similar to BlueAlert.

Bluestumbler :- One of the best BluePrinting tool.

Super Bluetooth Hack :- With this java software you can connect to another mobile and ….

Once connected to a another phone via bluetooth you can-

  • Read his/her messages
  • Read his/her contacts
  • Change profile
  • Play ringtone even if phone is on silent
  • Play songs
  • Restart the phone
  • Switch off the phone
  • Restore factory settings
  • Change ringing volume
  • Call from his phone it includes all call functions like hold, etc.
Notes:-
1) When connecting devices use a code 0000
2) At start of program on smartphones do not forget to turn on bluetooth before start of the mobile .
       
Read More

Boost Your Internetspeed-Free public DNS servers

07:14 |


                      Free public DNS servers that can boost the speed of web browsing unlike the DNS of your ISP. Using Open public DNS will improve the speed of web browsing that you will see noticeable increase in speed while viewing YouTube videos. 
The reason behind the speed boost is that Open DNS work with CDNs (Content Delivery Networks) and sends your request for any webpage to the closest possible server to your IP address.
What is DNS?
Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4
This is my list of better, fast public dns servers and free dns server (as compare to your ISP ). These dns servers are free to all. I was able to improve my browsing speed with following DNS servers. Use any one of the following provider.
  
Service provider  Google
         Preferred DNS: 8.8.8.8
         Alternate DNS: 8.8.4.4
Service provider Norton
* Norton offered "filtered" DNS servers that restrict access to pornographic and malicious web sites.
A - Security (malware, phishing sites, scam sites and web proxies)
                 
         Preferred DNS: 198.153.192.40 
         Alternate DNS: 198.153.194.40              
 
 
         Preferred DNS: 198.153.192.50 
         Alternate DNS: 198.153.194.50
C - Security + Pornography + Non-Family Friendly
        Preferred DNS: 198.153.192.60 
        Alternate DNS: 198.153.194.60

Service provider OpenDNS
       Preferred DNS: 208.67.222.222
       Alternate DNS: 208.67.220.220

Service provider DnsAdvantage
        Preferred DNS: 156.154.70.1

       Alternate DNS: 156.154.71.1
Service provider ScrubIt
        Preferred DNS: 67.138.54.100
        Alternate DNS: 207.225.209.66
Service provider OpenNIC
        Preferred DNS: 69.164.208.50
        Alternate DNS: 216.87.84.211
Service provider Public-Root
        Preferred DNS: 199.5.157.131
        Alternate DNS:  208.71.35.137
                     ~ Google also offers IPv6 public DNS servers: 2001:4860:4860::8888 and 2001:4860:4860::8844
Note :
If you want to change DNS just configure your modem by typing 192.168.1.1 or 192.168.1.1/main.html in url of your browser.
                                                                        or
If you dont know to configure don't worry download a software to change DNS it's portable no need to install  "DNS Jumper " Download from here : www.fiberdownload.com/Transfer/DNS-Jumper/20721
Read More

IP Address

07:12 |

The Internet Protocol (IP) has two versions currently in use which are IPv4 and IPv6.
This article represents to IPv4 version only.

In general, an IP address is a 32-bit decimal number that is normally written as four numbers between 1 to 255 (8 bits or 1 byte each), each seperated from the other by a decimal point. This standard is known as "Dotted Decimal Notation".
e.g.-   117.200.77.110

IP addresses are divided into number of ranges/classes as given in the table below-



Class Range
A 0.0.0.0 to 127.255.255.255
B128.0.0.0 to 191.255.255.255
C192.0.0.0 to 223.255.255.255
D224.0.0.0 to 239.255.255.255
E240.0.0.0 to 255.255.255.255

e.g.-  IP Address 192.168.24.114 belongs to Class 'C'.

How to find out IP Address of your system ?
1) Connect to the Internet.
2) Launch MS-DOS Command Prompt.
3) Type "netstat -n", Press Enter.

You will get the output similar to following-



The IP Address shown in local address field denotes IP Address of your system.
In this case it is 117.200.160.151

IP Address Formats :-
Four different formats of IP Address along with example is as given below-

1) Domain Name System (DNS) : www.yahoo.in
2) DWORD Format : 2928008962
3) Octal Format : 0256.0205.0337.002
4) Dotted Decimal Format : 174.133.223.2


Converting DNS IP Address into Normal IP Address :-
You can easily get the IP Address of any domain by various methods such as WHOIS, Netstat, Ping, Traceroute, etc.
Here I have used 'Ping' to get IP Address.

1) Connect to the Internet.
2) Launch MS-DOS Command Prompt.
3) Type "ping domainname", Press Enter.

You will get the output similar to following-




Here, IP Address for Domain "www.insecure.in" is "174.133.223.2"

Thus by typing "http://www.insecure.in" OR "http://2928008962" OR "0256.0205.0337.02" OR "174.133.223.2" in your browser will take you to the same site
Read More

Network Hacking

07:12 |

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--

c:/>ping hostname.com

example:- c:/>ping www.google.com

Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in




Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.
Read More

ClickJacking

07:06 |

Definition :-

"Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia

Introduction :-
A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.
The long list of vulnerabilities involves browsers, Web sites and plug-ins like Flash.

How It Works? :-
ClickJacking is a little bit difficult to explain however try to imagine any button that you see in your browser from the Wire Transfer Button on your Bank, Post Blog button on your blog, Add user button on your web-site, Google Gadgets etc.
ClickJacking gives the attacker to ability to invisibly float these buttons on-top of other innocent looking objects in your browser.
So when you try to click on the innocent object, you are actually clicking on the malicious button that is floating on top invisibly.

In other words, the attack is thrown by a malicious web page embedding objects, possibly from a different site, such as framed documents or plugin content (Flash, Silverlight, Java\85) which may lead to unwanted results if clicked by the current user (e.g. a \93Delete all messages\94 button in your webmail or an advertisement banner in a click fraud scheme). Using DHTML, and especially CSS, the attacker can disguise or hide the click target in several ways which go completely undetected by the user, who\92s easily tricked into clicking it in a more or less blind way.

JavaScript increases the effectiveness of these attacks hugely, because it can make our invisible target constantly follow the mouse pointer, intercepting user\92s first click with no failure.
We can however imagine a few less effective but still feasible scriptless scenarios, e.g. covering the whole window with hidden duplicates of the target or overlaying an attractive element of the page, likely to be clicked (e.g. a game or a porn image link), with a transparent target instance.

Examples :-
1) Malicious camera spying using Adobe's Flash.
2) Flash, Java, SilverLight, DHTML Game or Application used to Spy on your Webcam and/or Microphone.

Note : The best defense against ClickJacking attacks is to use Firefox with the NoScript add-on installed.


 NoScript 2.0.9.7
Allow active content to run only from sites you trust,
and protect yourself against XSS and Clickjacking attacks...!
Read More