Hacking

Hacking is an ART OF EXPLOITATION.

Monday, October 1, 2012

Installing Nessus on Backtrack 5R3

Hello Friends,Today i am showing how to install Nessus on Backtrack 5 R3First go to the Nessus Website and register by clicking herethe Activation code will be send to your e-mail ID, Now take the Activation codeOpen an new terminal in Backtrack 5R3  and type the following command to download the Nessusapt-get install nessusafter complete download next type this commandroot@bt:/opt/nessus/bin/nessus-fetch --register xxxx-xxxx-xxxx-xxxx-xxxxit...

Sunday, September 23, 2012

How to Run "C Program" in Linux

Hello friends,sometimes we need to run the C programs in the Linux Box,Today i am showing you people how to run an "C language program" from the Linux System.In linux we can use the gcc command to run C programsMost of the time by default the gcc installed in the linux.Type the following command to verify the gcc is installed :which gcc output/usr/bin/gccTo find the version of the gccgcc --verisionoutputgcc (Ubuntu/Linaro 4.6.3-1ubuntu5) 4.6.3Copyright (C) 2011 Free Software Foundation, Inc.This is free software; see the source for copying conditions. ...

Tuesday, September 4, 2012

BeEF Lab

Hello friendswe seen how to start and test BeEF in the previous post. Now in this post we will be seeing how to work with XSS Vulnerability by using BeEF Framework.Lab Setting:1.XP Virtual Machine (Victim)2.Backtrack VM (Attacker)Attacker:1.Start BeEF in the Backtrack.Now we will get the UI URL and the HOOK URL2.Open the browser (any browser but firefox is preferable)3.Copy the UI URL from the terminal and paste it in a URL of a browser http://192.168.0.103:3000/ui/panel4.Now...

Monday, September 3, 2012

BeEF - Browser Exploitation Framework

BeEF is the Browser Exploitation Framework. The BeEF is an powerful security Framework. It Mainly focuses on the browser based exploits.If you want to see the real exploitaiton with the XSS(Cross Site Scripting) the beef can be good one. By using Beef we can see what we can do with the XSS Vulnerability.How to start with BEEFIn Backtrack Beef is already there but before that you have to install it onceApplications --> Backtrack --> Exploitation...

Friday, July 20, 2012

Acunetix

Hello Friends today we are seeing the popular web application scanner called Acunetix,The Acunetix is one of the best web application scanners,we are having a lot of other scanners likeIBM Appscan,AcunetixHPWeb InspectNetsparkerW3afIn this only the w3af is the opensource web application scanner that is freely available with the Backtrack 5comming to the Acunetix here i am showing the Acunetix version 7 and how to install and use itgo and search the...

Saturday, May 19, 2012

Command Execution Vulnerability Exploitation

Today i will be showing how to hack the website with the command execution vulnerability.we will be see this on the DVWAWhat is Command Execution ?OS command injection is a technique used via a web interface in order to execute OS commands on a web server.The user supplies operating system commands through a web interface in order to execute OS commands. Any web interface that is not properly sanitized is subject to this exploit. With the ability...

Access DVWA from Backtrack

Hi,Today i will show you, How to access the DVWA(Damn Vulnerable Web Application) that is installed on the xp machine from the backtrack1.First we require the XP machine and Backtrack machine in same network meansif the XP machine ip is 192.168.0.22 then backtrack should also be in the same network like 192.168.0.562.Install the XAMPP in the XP macine and start the services like Apache and Mysql3. Download the DVWA(Damn Vulnerable Web Application)...

Thursday, April 26, 2012

Installing Google Chrome in Backtrack 5

Friends ,Many asking how to install the Google chrome browser in the backtrack 5, today we will be seeing how to install thatLet us see the steps1.In the root type asapt-get install chromium-browser2.change to chrome-browser directory cd /usr/lib/chromium-browser3.Type the following command hexedit chromium-browser4.You will be getting the hex-code ,Here you have to search for geteuid and replace with getppidpress TAB and search...

Sunday, April 15, 2012

Stuxnet

Stuxnet --Stuxnet is an Computer Worm discovered in the year of June 2010, that is initially spreading via windows machines and targeting the Siemens Systems. it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit. The worm will spread very fastly and it is mainly target to the Siemens SCADA(supervisory control and data acquisition) Systems that are...

Saturday, March 17, 2012

Basic Commands for Windows

Hello Friends,for all your reference i am placing some basic windows commands.Quote:compmgmt.msc - Computer managementdevmgmt.msc - Device managerdiskmgmt.msc - Disk managementdfrg.msc - Disk defrageventvwr.msc - Event viewerfsmgmt.msc - Shared foldersgpedit.msc - Group policieslusrmgr.msc - Local users and groupsperfmon.msc - Performance monitorrsop.msc - Resultant set of policiessecpol.msc - Local security settingsservices.msc - Various Servicesmsconfig...

What is Hacking

                    The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is...

Tuesday, February 28, 2012

Interpol swoop nets 25 suspected 'Anonymous' hackers

Interpol has arrested 25 suspected members of the 'Anonymous' hackers group in a swoop on over a dozen cities in Europe and Latin America, the global police body said Tuesday."Operation Unmask was launched in mid-February following a series of coordinated cyber-attacks originating from Argentina, Chile, Colombia and Spain," said the world police body based in the French city of Lyon.The statement cited attacks on the websites of the Colombian Ministry...

Monday, January 16, 2012

Team GrayHat Hacked

                                  Official Forum of one of the most popular hackers group named Teamgreyhat get hacked. A hacker named Hunt has hacked into the TGH's web-server and deface the index page. Also the hacker has claimed that he has breached all the data from that particular...

Online tools for Analysing Website

Everyone of us curious to know about the website information like site owner ,earnings etc...In Ethical Hacking the Information Gathering is the first and basic step to perform.Here I’m gonna list 4 awesome online tools to study a website thoroughly:1. How to Find The  Hosting Provider of Any Website?Before we start a website as a beginner we are very much confused in selecting the hosting provider,in such case we Start analyzing the hosting...

What is 404 Error ?

While Browsing through net you all might probably encounter this “Error 404? “Page not found” is the error page displayed whenever requested page is simply not available on your site. The reason for this might occur is that there may be a link on your site that was wrong or the page might have been recently removed from the site. As there is no web page to display, the web server sends a page that simply says “404 Page not found”.When we expand the...

Friday, January 6, 2012

Hackers Leak The Source Code For Symantec Product

A group calling itself the "Lords of Dharmaraja" posted an Adobe document online Wednesday that it claimed was a glimpse of the source code for the internet security software. But Symantec spokesman Cris Paden said "no source code was disclosed" in the post, which was a 12-year-old document describing how the software worked, but not the code. Paden said Symantec continues to investigate the hackers' claim that they have source code.But now Symantec,...