Pages

Friday, 27 June 2014

What is Port Scanner? what is the use?

What is Port Scanner? what is the use?

In my last post i gave you the list of best port scanner tools. In this post i will explain about port scanning process and use of port scanning.

Port Scanning:
Port scanning is the process of searching for active or opened ports in victim system. Just like a thief searching for gate opened house. Consider this scanning

Starting Scan.

Target Host: www.yourcompany.com or IP Address

TCP Port :7 (echo)
TCP Port :9 (discard)
TCP Port :13 (daytime)
TCP Port :19 (chargen)
TCP Port :21 (ftp)
TCP Port :23 (telnet)
TCP Port :25 (smtp)
TCP Port :37 (time)
TCP Port :53 (domain)
TCP Port :79 (finger)
TCP Port :80 (www)
TCP Port :110 (pop)
TCP Port :111 (sunrpc)
Finished.

It shows the active ports in that domain or ip address

What is the Use?
what we can do with these ports? we can communicate with the victim system remotely using those active ports. So we can get their data without their knowledge.(The thing is that you can theft their data).

Scanning for open ports is done in two ways.

¶ Scan a single IP address for open ports:
It just like a thief who searching for any opened gate in single house.
In relation to scanning, the gate is port and house is IP address.
We are searching for the active port in a single IP address
Eg:
searching for active ports only at 123.xx.xx.xx

¶ Scan a range of IP address to find open ports:
Scanning a range of IP address is like thief who searching for any opened gate in a street. In relation to scanning, the gate is ports and street is range of ip address

Eg:
searching active ports only at
123.20.xx.xx to 123.30.xx.xx

Download:- port scanning tools

http://cyberattacker147.blogspot.in/2014/06/some-of-best-port-scanning-tools.html?m=1

Enjoy:)

                 ~~~jaii hoo~~~

Google dork "Index of /sh3llZ" allows you to find shell uploaded by hackers

Google dork "Index of /sh3llZ" allows you to find shell uploaded by hackers

Usually hackers upload shell to victim's site using the vulnerability in that website. Shell allows hackers to hack/deface the website. Sometimes hackers left the shell in the vulnerable sites.  Here is simple google search allows you to find a shell uploaded by hackers.

Use one of the following google dork to find the shell:
¶ intitle:index of/sh3llZ

¶ "Index of /sh3llZ"

¶ "/sh3llZ/uploadshell/uploadshell.php"

This will show the list of sites that has a sh3llZ folder. Probably, there will be link to c99 shell.  If you click the link, it will land you in a shell page. Using that shell, you can upload your own shells or deface the sites.

Enjoy:)

                 ~~~jaii hoo~~~

List of Best Ethical Hacking / Penetration Testing Tools

Here is list of useful and Best Software tools that helpful in Ethical Hacking and Penetration Testing, Forensics ...

MetaSploit :

Metsploit is a very Powerful PenTesting Tool . Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. The Metasploit Project is also well known for anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Very useful tool for Information Gathering, Vulnerability Scanning, Exploit Development, Client side exploits,...
Official site: http://www.metasploit.com/

WireShark:
WireShark is a free and best Network Packet Analyzer tool for UNIX and Windows.  It is used for networking troubleshooting, Malware analysis and education.

Homepage: http://www.wireshark.org

NMAP
Nmap("Network Mapper") Free Security Scanner For Network Exploration & Hacking.It is used to scan a network and gathers information about the target network including open ports,Services running in the host, OS information,packet filters/firewalls details, and  more.

Official site: http://nmap.org/

John The Ripper:
JTR is free and  fast password cracker.  Its primary purpose is to detect weak Unix password.
Official site: www.openwall.com/john/

Acunetix Web Security Scanner
Audit your website security and web applications for SQL injection, Cross site scripting and other web vulnerabilities with Acunetix Web Security Scanner.
This tools is not free one ;(
Official Site: www.acunetix.com

Maltego;

Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.
Official site: www.paterva.com/

IronWASP:
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it. Though an advanced user with Python/Ruby scripting expertise would be able to make full use of the platform, a lot of the tool's features are simple enough to be used by absolute beginners.

Official site: http://ironwasp.org

HconSTF
HconSTF is very useful PenTesting tool. It is used for Information gathering,Enumeration & Reconnaissance,Vulnerability assessment, Exploitation,Privilege escalation,Reporting.

Official site: http://www.hcon.in

Ettercap
Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
Official site: http://ettercap.sourceforge.net/

If you think i left some tools, you can help me to add it.

Enjoy:)

                  ~~~jaii hoo~~~

jSQL Injection - Java based automated SQL injection tool

jSQLi is java based free SQL Injection Tool.  It is very easy for user to retrieve database information from a vulnerable web server.

SQL Injection features:

¶ GET, POST, header, cookie methods

¶ normal, error based, blind, time based algorithms

¶ automatic best algorithms detection

¶ data retrieving progression

¶ proxy setting

¶ evasion

¶ for now supports MySQL

Download it from here:
http://code.google.com/p/jsql-injection/downloads/list

Enjoy:)

           ~~~jaii hoo~~~

Hack Your Broadband

Hack Your Broadband

Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)

Step 2: First Get your ip from
CODE www.whatismyip.com
Asume your IP to be 59.x.x.17

Step 3: copy your ip in IPscanner
Software and scan for alive IPs in
the below range start:59.x.x.1 to End:59.x.x.255

Step 4: Then check in your scanner which alive IPs has the port 80 open

Step 5: Enter that alive IP in your
web browser

Step 6: It asks for user , pass
Type u User=admin Password=admin or password
It is the default password for most
of the routers. if denied then use on another alive IP

Step 7: If success then it will show router settings page of tht IP user There goto Home -> Wan Setting and the username and password of his account will appear there.

Step 8: use ShowPassword or
Revelation software to view the
password in asterisks Now You have Username/Password

Enjoy!

           ~~~jaii hoo~~~

XSS DORKS LIST

XSS Dorks
Code:

inurl:".php?cmd="
inurl:".php?z="
inurl:".php?q="
inurl:".php?search="
inurl:".php?query="
inurl:".php?searchst­ring="
inurl:".php?keyword=­"
inurl:".php?file="
inurl:".php?years="
inurl:".php?txt="
inurl:".php?tag="
inurl:".php?max="
inurl:".php?from="
inurl:".php?author="
inurl:".php?pass="
inurl:".php?feedback­="
inurl:".php?mail="
inurl:".php?cat="
inurl:".php?vote="
inurl:search.php?q=
inurl:com_feedpostol­d/feedpost.php?url=
inurl:scrapbook.php?­id=
inurl:headersearch.p­hp?sid=
inurl:/poll/­default.asp?catid=
inurl:/­search_results.php?se­arch=

Enjoy:)

              ~~~jaii hoo~~~

Some sql dorks for credit card shops

Hello Brother's
feel free to try out these dorks is for some shops that have credit-cards, that is vulnerable to sql injection

cat.asp?cat=
productlist.asp?catalogid=
Category.asp?category_id=
Category.cfm?category_id=
category.asp?cid=
category.cfm?cid=
category.asp?cat=
category.cfm?cat=
category.asp?id=
index.cfm?pageid=
category.asp?catid=
Category.asp?c=
Category.cfm?c=
productlist.cfm?catalogid=
productlist.asp?catalogid=
viewitem.asp?catalogid=
viewitem.cfm?catalogid=
catalog.cfm?catalogId=
catalog.asp?catalogId=
department.cfm?dept=
department.asp?dept=
itemdetails.cfm?catalogId=
itemdetails.asp?catalogId=
product_detail.asp?catalogid=
product_detail.cfm?catalogid=
product_list.asp?catalogid=
product_list.cfm?catalogid=
ShowProduct.cfm?CatID=
ShowProduct.asp?CatID=
search_results.cfm?txtsearchParamCat=
search_results.asp?txtsearchParamCat=
itemdetails.cfm?catalogId=
itemdetails.asp?catalogId=
store-page.cfm?go=
store-page.asp?go=
Detail.cfm?CatalogID=
Detail.asp?CatalogID=
browse.cfm?category_id=
view.cfm?category_id=
products.cfm?category_id=
index.cfm?Category_ID=
detail.cfm?id=
category.cfm?id=
showitems.cfm?category_id=
ViewProduct.asp?PID=
ViewProduct.cfm?PID=
shopdisplayproducts.asp?catalogid=
shopdisplayproducts.cfn?catalogid=
displayproducts.cfm?category_id=
displayproducts.asp?category_id=
DisplayProducts.asp?prodcat=
DisplayProducts.cfm?prodcat=x
productDetail.cfm?ProductID=
products.php?subcat_id=
showitem.cfm?id=21
productdetail.cfm?pid=
default.cfm?action=46
products_accessories.asp?CatId=
Store_ViewProducts.asp?Cat=
category.cfm?categoryID=
category.asp?category=
tepeecart.cfm?shopid=
view_product.asp?productID=
ProductDetails.asp?prdId=12
products.cfm?ID=
detail.asp?product_id=
product_detail.asp?product_id=
products.php?subcat_id=
product.php?product_id=
view_product.cfm?productID=
product_details.asp?prodid=
shopdisplayproducts.cfm?id=
displayproducts.cfm?id=

Enjoy:)

                 ~~~jaii hoo~~~