hacking articles

DEFACING WEBSITES
Through this technique,the user will enter the URL but would be directed to another WEB ADDRESS,popularly known as URL spoofing
1.) open the file:-%systemroot%/windows/system32/drivers/etc./hosts in victims computer , read it carefully at the end you will see
something like this:-127.0.0.1       localhost
2.) just add The address you want to spoof Ex:- if you want your victim to open a porn site when he types the address of his institute
ip of the porn  site                    URL of the UNIVERSITY
3.) You might be thinking how to get the ip of a site.No probs just open cmd.exe and type 
ping web-address of the site(you will get the ip) 
This trick doesn't work if the browser is configured to use proxy server, if it works then also an intelligent user can catch you, i m posting a javascript this will solve your problem url spoofing
I am also giving an HTML example

G00GLE HACKS
WARNING:-Practising this may lead you in serious problem,Gathering information from a webserver is supposed as a Cybercrime and may lead to imprisonment,I would not be held responsible.
The keywords reveal crucail information that can crack into any website 
Search engines like google contains some keywords that are used to explore there hidden doccument. The information reveled by these searches are very crucial as they impart knowledge about various sites,protected data,secret web cams and so on....................,a lame user cannot acces these keywords but as a hacker you must know how to surf the hidden data on net Some of these keywords are listed here:-
1.) For secret webcams :-
inurl:/view.shtml
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/

2.)  These are index pages of "My Shared Folder". Sometimes they contain juicy stuff like mp3's or avi files
intitle:"Index of *" inurl:"my shared folder" size modified
3.) Some of you pay some sites to download your favorite song,but why if google themselves provide free music:-(above keyword may also be used)
intitle:"index of" -inurl:htm -inurl:html mp3
4.) Backup directories are often very interesting places to explore. Some of the sites in this search meant to reveal the contents of their backup directories, others did not.
"Index of /backup"
5.) Accessing secret,personal and private data :-
intitle:"index.of.personal"                                                                                              index.of.secret
intitle:index.of.private
index.of.protected
index.of.secure

6.) Hacking through exploiting various scripts provided by google,the search engine provides how the sites passes there dat through different scripts,an attacker can read these scripts and can exploit the loopholes
inurl:ojspdemos                                                               jsp scripts
inurl:j2ee/examples/jsp
intitle:index.of WEB-INF                                                  java powered webservers
7.) Now the most intresting thing,password files user ID,Email passowrds anything related to security,type following keywords:-

index.of.password (some of the files contain name like horny.htm or brittany.html these are links for porn sites)                                                                                                       ext:asa | ext:bak intext:uid intext:pwd -"uid..pwd" database | server | dsn
enable password | secret "current configuration" -intext:the
ext:passwd -intext:the -sample -example
intitle:"Index of" pwd.db
intitle:"Index of" ".htpasswd" htpasswd.bak
intitle:"Index of" ".htpasswd" "htgroup" -intitle:"dist" -apache -htpasswd.c
intitle:"Index of" spwd.db passwd -pam.conf
index.of passlist(CLEAR TEXT PASSWORD)
index.of.etc
inurl:config.php dbuname dbpass
inurl:passwd.txt(CLEAR TEXT PASSWORD)
intitle:index.of trillian.ini
inurl:secring ext:skr | ext:pgp | ext:bak
intitle:index.of administrators.pwd
intitle:"index of" intext:globals.inc
intitle:"index of" intext:globals.inc (CLEAR TEXT PASSWORD)
signin filetype:url
inurl:"Sites.dat"+"PASS="
inurl:/yabb/Members/Admin.dat                                                                                       intitle:index.of people.lst
intitle:"Index of" passwd passwd.bak   
inurl:backup intitle:index.of inurl:admin  (this contains information about sql tables)

filetype:reg reg +intext:â€Â�WINVNC3â€Â                                                       decode the files using can and abel
filetype:cfg ks intext:rootpw -sample -test -howto                                                                  its linux configuration tool named Anaconda,the root passords or ssuid are often encrypted
This returns xls files containing login names and passwords. it works by showing all the xls files with password
"login: *" "password= *" filetype:xls

This search shows Microsoft Excel spreadsheets containing the words username, password and email                                                                                                filetype:xls username password email
The .netrc file is used for automatic login to servers. The passwords are stored in cleartext.
filetype:netrc password

It reveals the configuration of a web server,it contains password but 90% of them are encrypted                                                                                                       intitle:index.of.config
"master.passwd" files which contain encrypted passwords                                                  intitle:index.of master.passwd  passwords can be decoded using L0phtcrack.
SQL(Structured query language) this language helps to prepare the database,and d00dz almost all websevers maintain there logs,USER ID's,Email-passwords through this language,those who might have taken Computers in 12th(indian standards) might know about this language,an attacker can inject an SQL session to know the passwords and some of the webservers contain cleartext passwords,use following key words:-
Sql history files:-               intitle:index.ofntext:"secring.skr"|"secring.pgp"|"secring.bak"       
look for dump SQL passwords  
filetype:sql "insert into" (pass|passwd|password)
8.) CGI directories contain scripts which can often be exploited by attackers,Common gateway interface(CGI)
"index of cgi-bin"

9.) Rapidshare free accounts,in case of rapidshare,you can use other accounts as well who have login passwords
intitle:rapidshare intext:login(RAPID SHARE)
10.) Index of /admin
Index of /passwd
Index of /password
Index of /mail
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"                                                                                          allinurl:winnt/system32/    (reveals crucial information about the type of  platform ) allinurl:wwwboard/passwd.txt (reveals password files) 

11.) Hacking through PHP:-
"Welcome to phpMyAdmin" " Create new database"
Note:-More keywords can be revealed if you try some of them on other search engine like yahoo                                                                   
Other major keywords:-
inurl:ftproot
intitle:"Folder Listing" "Folder Listing" Name Size Date/Time File Folder
"index of" inurl:recycler
allintitle:"FirstClass Login"
inurl:install.pl intext:"Reading path paramaters" -edu
log inurl:linklint filetype:txt -"checking"
"Index Of /network"                                                                                                                               
intitle:"Index of /etc"                                                                                                                            intitle:"Index of /var/spool/mail"(for mails)
 
HACKING WEBSITES
This requires intellect
1.) In order to hack a website,just search for the material which don't have any link
2.) When you get it just try to enter through it
ex:-i saw on a website igi's signature it didn't shiow any hyperlink
I just typed www.url.com/igi.jpeg/ (not a link) and i was in now search for following strings                         
whole url/cgi-bin/ or wholeurl....../cgi-bin/
CGI(common gateway interface)
3.) Type following on google search intitle:"Index of /var/spool/mail",but you would be greeted by nothing just parent directory,You are wrong it contains hidden data surf further you will see mail box
4.) Change the permissions on someone's account in /var/spool/mail/ so the  email becomes word readable.Some guz can also make a symbolic link to a page of the email server's web site
 (if it runs a web server and is a Unix or Linux type system).

5.) Here's how you can check to see whether anyone can snoop on your email by using their browser.
Then type that location into your browser, for example url/var/spool/mail
That "../" means "go up one directory.

Download system programs
Unix or Linux type
PAM stands for Pluggable Authentication Modules.
Basically PAM is a way to change on the fly the way applications or services are authenticated.
When you use PAM, you can define at run time how an application or service
is authenticated, rather than having to recompile it.... Effectively, program simply asks PAM "Is this user
allowed to access the service I'm offering", and PAM takes care of the background details
of searching /etc/shadow, /etc/passwd, checking times, etc... The "pluggable" means that as your authentication
needs change, your software can be adjusted to fit without having to recompile (often a great number of) applications.
You simply change the PAM configuration file to reflect the changes in your authentication.
Let's try to download it. In the browser window change http to ftp and we get this:


WARNING:-Some Internet servers are protected by an Intrusion Detection System (IDS) that detects attempts
to look in sensitive directories such as cgi-bin, /etc or /bin.
An IDS will record the Internet address from which you accessed this directory.
If the systems administrator using the IDS is paranoid,
he or she might ask your online service to kick you off
 /etc/group

FOLDER LOCK
You require a software to lock your folders,oh!
but i don't use any software then too i can lock them, use following code and you can also lock your folder
folder lock
rename the file as user.bat "user"-any name double click it
a folder will be created (at the same place where the batch file is present)
COMMENTs:-guestbook(to tell your queries)

Post a Comment

Previous Post Next Post