Skip to main content

Posts

Showing posts from October, 2012

Hacking WebServer : Brute Forcing

Hello Friends.                       Today I am going to show you how to develop a word list and use brute force the login authentication to access certain directory in web server. Basic Things Required 1.Java SDK and JRE [this will be required to develop the word list. ] 2.Any IDE like BlueJ or NetBeans or Eclipse . You can use notepad but you need to compile that manually.It is not necessary you need to create word list using Java only.You can use any programming language you feel comfortable.  3.Brutus or THC Hydra [Brute Force tools] CAUTION "This tutorial should be used for educational purpose only. I won't be responsible if you misuse this techniques and get yourself in trouble.Sometimes (rarely although) performing Brute Force attacks can lead do DOS attacks. To prevent this sometimes system admin keeps tracks of the incoming connections . If they find that too many requests are being sent from a particular IP then they block that IP for sometime, sometimes e

Web Server Hacking using Local File Inclusion Attack

                      Hey Friends I am back with a new tutorials on how to hack a web server using LFI attack or Local File Inclusion Attack.                      LFI is an attack by which a attacker can access files in directory by including them in the web pages . This happens due to flaws in coding and careless ways of coding.Here I will demonstrate how you can hack a website and get root level access to a server                      Now some word of caution. You should never perform such activity without the permission of the site owner. This is completely illegal. I am showing you this demo for educational purpose only. I won't be be responsible if you get in trouble after misusing these techniques.  Here I will be showing a demo on a training website of enigmagroup for demo purpose only. What do u need to know ? Linux Directory Architecture. About the location of passwd files and its encryption files. Techniques of file traversal in Linux ( use forward slash /). Wo

Hide your shadow and bypass the security

Hey Friends, Today I am going to share with you some cool ways how you bypass and  access blocked sites. Few important thing you should keep in mind while executing these methods. 1.Never send any secured information . Example your ATM or credit card number. 2.Keep a check on the open ports of your computer.It may happen that you can be a victim of DDOS (Distributed Denial of Service Attack) attack . 1.Modify host file  Modifying host file allows you bypass local DNS filtering. Open command prompt and write this in the terminal          ping  anyblockedsite.com  Now Go to windows/system32/drivers/etc folder Open host file with any text editor like notepad and add a line like this from the output 10.0.2.16  kiit.ac.in Save the file. This has only some disadvantage. This is good if the page is a single page. If u need to do for a whole site then u need to map other ip address also. Other disadvantage is that technique cannot be used if the administrator is us