Monday, June 25, 2018

Google Hacking........


Hey , 
        I'm MahaKaaL . And you known me. Today i'ill telling you  What Is Google Hacking?



History of Google Hacking?

The concept of "Google Hacking" dates back to 2002,when Johnny Long began to collect interesting Google search queries that uncovered vulnable systems and sensitive information disclosures.

The list of google Dorks grew into large dictionary of queries,which were eventually organized into the original Google Hacking Database (GHDB) in 2004. These Google hacking techniques were the focus of a book released by Johnny Long in 2005 called Google Hacking for Penetration testers.

Since its heyday,the concepts explored in Google Hacking have been extended to other search engines , such as Bing and Shodan. Automated attack tools use custom search dictionaries to find vulnerable system and sensitive information disclosures in public system that have been indexed by search engines.

For a full visual timeline, delailing the major events and developments in Google Hacking from 2002 to present , see the Google Hacking History by Bishop Fox.






What Is  Google Hacking??

Google hacking involves using advanced operators  in the Google search engine to locate  specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. The following search query would locate all web pages that have that particular text contained within them.






There are two types of Google operators:-
  • Basic Operators
  • Advance Operators
Basic Operators: -(+, -, ~, ., *, “”, OR)
“ + ” (It force inclusion of something common)
Using “+”It forces Google to search for a particular keyword. Its includes all web pages where both keywords occur. Do not put a space after the “+”.
Google Hacking-1



The minus operator does reverse. It gives you search results without the keyword placed after the operator. Do not put a space after the “–“
google hacking
The tilde symbol generally suggests ‘similar to’.
google hacking


double dots help you to search within a range of two numbers.
google hacking


Asterisk operator (*) is handy when you are sure of more keywords are missing.
google hacking
Surround a word or a phrase with double forces Google to search for pages that contain it exactly in the same form.
google hacking
Using OR (in uppercase) with two or more keywords tells Google to search for pages that contain either of the words.
Example: apple OR samsung
google-7


Advance Operators?

OperatorPurposeMixes with Other Operators?Can be used Alone?WebImagesGroupsNews
intitleSearch page Titleyesyesyesyesyesyes
allintitle[3]Search page titlenoyesyesyesyesyes
inurlSearch URLyesyesyesyesnot reallylike intitle
allinurlSearch URLnoyesyesyesyeslike intitle
filetypespecific filesyesnoyesyesnonot really
intextSearch text of page onlyyesyesyesyesyesyes
allintextSearch text of page onlynot reallyyesyesyesyesyes
siteSearch specific siteyesyesyesyesnonot really
linkSearch for links to pagesnoyesyesnononot really
inanchorSearch link anchor textyesyesyesyesnot reallyyes
numrangeLocate numberyesyesyesnononot really
daterangeSearch in date rangeyesnoyesnot reallynot reallynot really
authorGroup author searchyesyesnonoyesnot really
groupGroup name searchnot reallyyesnonoyesnot really
insubjectGroup subject searchyesyeslike intitlelike intitleyeslike intitle
msgidGroup msgid searchnoyesnot reallynot reallyyesnot really

intitle:- Restricts your search to the titles of web pages and provide exact result.
Example:
armour-infosec-google

allintitle:- Find pages where in all word specified make up the title of the web page.
Example
allintitle:Armourinfosec
inurl : Restricts your search to the URLs of web pages.
inurl :armour-infosec
inurl:password
armour infosec google
intext :- searches only in body text and provide text results according to your search query (i.e., ignores link text, URLs, and titles).
Example:
google hacking
filetype :- Search for thesuffixes’ or filename extensions. These are usually, but notnecessarily, different file types.
Example:
armour-infosec-google-3


site:- It allows the user to narrow your search by either a site or a top-level domain.
Example:
google hacking

inanchor:- searches for texts in a page of link anchors. A link anchor is a descriptivetext of a link.
Example:
google hacking
link:- It giveslisting of pages those which are linked to a specified URL.
Example:
google hacking
cache:- It finds a copy of the page that Google indexed and it give exact date and time.
Example:
google hacking


related:- It finds those pages which are related to the specified page.
google hacking
info:- provides a page of links to more information about a specified URL.
google hacking
Google Hacking techniques?
    • Exploring title messages from servers, e.g. intitle:"Welcome to IIS 4.0" You can see the results here. This is a list of servers running what is in the message, in the case IIS 4.0.
    • Exploring server messages in the URL, e.g."VNC Desktop" inurl:5800 You can see the results here. This is a list of servers running VNC in port 5800 (we will study VNC as a remote control software and its vulnerabilities later in the course).
    • Exploring filetype to find servers with FrontPage vulnerabilities, e.g. filetype:pwd service Note that pwd is not one of the types listed above, but Google still looks for service.pwd and you can see the results here. This is a list of usernames and encrypted passwords. As we will study later in the course a hacker can use John the Ripper to crack the password using brute force. The damage here is defacing a Web site, but users tend to repeat username and passwords elsewhere.
    • Exploring filetype and inurl to find password files in servers, e.g. filetype:bak inurl:"htaccess|passwd|shadow|htusers" and you can see the results here. This is a list of usernames and encrypted passwords for login in servers. The damage here can be devastating, if the root password is available, as in one case it is. We will discuss UNIX/Linux vulnerabilities, the use of shadow passords, etc, later in the course.
    • Exploring filetypeinurl and intext to find DB passwords, e.g. filetype:properties inurl:db intext:password and you can see the results here. This is a list of files containing username and password in databases. Once more you can see the root password, and in one case is blank!?!?

    • Exploring security vulnerability scanners' output, not even using operators, e. g. "This file was generated by Nessus" and see the results here. This is a list of vulnerabilities found in servers generated by the Nessus scanner that were not deleted from the servers after it was run. The hacker has the vulnerabilities identified for him/her ...
                                                                                                                                          By: MahaKaaL

Wednesday, June 20, 2018

Footprinting and Reconnaissance............

hey,
       I'm MahakaaL . And you known  me Who am i? And today i will tell you about  Footprinting and Reconnaissance .



What is Footprinting?

Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization.
Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.
Footprinting helps to 

Know Security Posture

The data gathered will help us to get an overview of the security posture of the company such as details about the presence of a firewall, security configurations of applications etc.


Reduce Attack Area

Can identify a specific range of systems and concentrate on particular targets only. This will greatly reduce the number of systems we are focussing on.

Identify vulnerabilities

We can build an information database containing the vulnerabilities, threats, loopholes available in the system of the target organization.

Draw Network map

 Helps to draw a network map of the networks in the target organization covering topology, trusted routers, presence of server and other information.

During this phase, a hacker can collect the following information −

  • Domain name

  • IP Addresses

  • Namespaces

  • Employee information

  • Phone numbers

  • E-mails

  • Job Information

What is Reconnaissance?

Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible, following the seven steps listed below −

  1. Gather initial information

  2. Determine the network range

  3. Identify active machines

  4. Discover open ports and access points

  5. Fingerprint the operating system

  6. Uncover services on ports

  7. Map the network


We will discuss in detail all these steps in the subsequent chapters of this tutorial. Reconnaissance takes place in two parts − Active Reconnaissanceand Passive Reconnaissance.

Active Reconnaissance

In this process, you will directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities.

Passive Reconnaissance

In this process, you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.                                                                             

                                                                                                     By : MahakaaL

Monday, June 18, 2018

What is Ethics and Hacking????????

hey ,
      I'm MahaKaaL . And i'm black hat hacker. And today i will show you Introduction of Ethical Hacking.............


The term hacking bandied about a great deal in both the industry and in the media. Some stories carry the image of bored tweens, building skills while bragging about tearing up someone else's hard work. Other storied talk more about offshore groups using server farms to mass phish for informatiom . The kinf of damage that hackers can cause is as varied as functions of a computer or device : Lost finances, trade secrets,  and files swapped or erased are only the tip of what could be done to a person or company. Sometimes, just being one of the few people aware that different companies  are talking to each other about business can mean oportunities for the unethical.

So the question gets raised : Can the arts of hacking be used to improve lives on a broader scale, or is it a purely destructive activity?? Below , Forbes Technology Council members weigh in on ethice and hacking..


They 're Essential For Security

An ethical hacker is defined as someone who exploits vulnerabilities without impacting the system they are penetrating. They usually have permission to do this in order to discover weaknesses. It is part of the cyber-security scientific method , as an ethical hacker would work to eradicate vulnerabilities on the individual and global level before a vulnerability is maliciously exploited..


Hackers Help Shore Up Defenses

Cyber criminals are getting smarter every day, and companies must keep security protection up to date. Having researchers who can get into the minds of cyber criminals and look for security vulnerabilities and potential entry point is a crucial part of protecting against an outside breach. We have a number of employees who play this role on our own team, enabling is to better protect customers..


Hacker's Shades Vary By Intent

Anyone looking to break into a system uninvited would never qualify. Individuals contracted to look for vulnerabilities or those who find them accidentally -- often referred to as "white hats" - can certainly qualify as ethical hackers. As for the ones in between (the gray hats), like vigilantes, it is diffcult to see these individuals operating in an ethical way.




4. Look At What They Do Afterwards
A simple way of categorizing hackers is to break down how they require reward and how they disclose issues. For example, are they compensated via a bug bounty program or by selling the information on a "dark web" marketplace? Do they disclose the issue to the impacted party or to a third party, like a business competitor? 


5. Knowledge Has No Morality
Of course there are ethical hackers! Curiosity should not be condemned and knowledge has no morality. If a security hole exists then it exists, and better to know it that than not — then you can prepare yourself for trouble or fix the problem. Think about a parallel case: doctors. If you go to the doctor and they find out that you’re sick, you wouldn't accuse the doctor of causing the illness. 


6. Hackers Help Build Better Products And Services
The original definition of a "hacker" was someone who was extraordinarily good at coding. This term has unfortunately been corrupted by the media. With software being at the heart of everything, there is a critical role for hackers to help companies build better, more secure products and services. 


7. Company Hackers Are Gatekeepers
An ethical hacker is a person that gains hacking skills with the sole purpose of identifying vulnerabilities within system or network, and then bringing them to the notice of the organization so that it can fix the issue in a timely manner, before an unethical hacker could exploit it. Essentially, they're the gatekeepers for the organization, in order to prevent an unethical hacker from inflicting any damage. 

                             
                                                                                                                                 
                                                                   
                                                                 
                                                             By : MahaKaaL

Sunday, June 10, 2018

Introduction of Ethical Hacking................

hey ,
      I'm MahaKaaL. And i'm black hat hacker. And today i will show you Introduction of Ethical Hacking.............


 

What is Hacking?

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.

Who is a Hacker? Types of Hackers

Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
SymbolDescription
What is Hacking ? An IntroductionEthical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetrationTesting and vulnerability assessments.
What is Hacking ? An IntroductionCracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
What is Hacking ? An IntroductionGrey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
What is Hacking ? An IntroductionScript kiddies: A non-skilled person who gains access to computer systems using already made tools.
What is Hacking ? An IntroductionHacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
What is Hacking ? An Introduction
Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.













                                                                                                         By : CBT NUGGETS