Saturday, May 19, 2012

How To Hack A Website With Google?

First step: View the Source

Is to view the source of the page where you can find some useful things which may or may not include hidden directories. Most of lamers argue that there is nothing in the source but you have to look in the comments of the page where some web masters keep there personal data (such as contacts, e-mails….).If you doesn’t find any awesome information just have a quick look on the source for additional clue’s.

Second step : Search for Hidden Tags and Edit Existing values

find out the most abused <INPUT> tag in source make sure that all of them appear on the WEB page.If any extra tag appears then it’s a Hidden Tag. To view these hidden values use
http://insteadof_regular_name  type java script:<command>
java script:alert(“here you have view the HTTP FORM submission to GET or POST)
java script:alert(“hello”)

you get a pop up of hello.To View/change the values use alert/void command respectively.
To view the first form values type
java script:alert(document.forms[0].varname.value)
Note: the first form is always zero not one …
To change the value in the form use void command
java script:void(document.forms[0].varname.value=”new value”

Third step:Common File & Directory Search
check for common files and Directories such as admin.php,passwd.php,login.cgi,index2.php,login.asp,login.php,/Admin,/cg-bin/,/pub/,/images/,/scripts/,they are many common files and directories with which you may hang around for some hot stuff.
lets take a example.
A site may have a link to http://www.testingha...cretfile345.txt
after you pay or access any sensitive data it reports the file to web server. This technique is used by web masters to view the users IP or Location from where they are accessing the pages these are helpful to trace the intruders.
(A script on the web server does this job for a them)
Looking at the URI in the Location bar of the browser you could can access to the (above)file or log on the web server.
Another example of bypassing authorization is the CISCO IOS HTTP authorization vulnerability
The URL of the web based administration interface contains only a two digit number between 16 to 99.

Just you have to guess the value of NN(16-99) to access the device’s administration interface at the highest privelige.

Fourth Step : Directory transversal
If you are familiar with BASIC DOS COMMANDS then you are aware of
in the same way use the web directory transversal as following
the above the sample URL to access the sub directory use the dir transversal
If the web server is vulnerable then you may get access to the directories.
This exploit is almost fixed don’t get disappointed we will go through with other techniques.

Fifth Step: cookie Manipulation

checkout for cookies if the site uses a plain text cookies then you may got some thing interesting..
To view cookie information type
java script:alert(document.cookie)
to change the value of the cookie use this
java script:void(document.cookie=”desired_variable=some value”)
if the cookies are set on your computer then it would pop up with the values few people are afraid of cookies ‘they believe that the cookies may steal valuable data on there systems and these people doesn’t allow sites to set cookies on there browser”
Cookies are small piece of data which are used to identify the user(last visit,date,time). in short you can say client side validation. They are many articles on cookie stealing on and and videos on
PHP Injections
PHP is a server-side language

does the above one need explanation

Sixth step : referrer spoofing

referrer spoofing is another technique to override authentication .
Let take an example :

I have designed a site which has the above vulnerable..
<%@ language =vbscript %>
<% option explicit %>
welcome to the members  </title>
<body bgcolor=pink>
welcome to members page</h1>
<% dim strreferer,bolpermit
if right(strreferer,9) ="login.asp" then
response.redirect “members.asp”
end if 
if not bolpermit then
response.redirect "login.asp"
end if
these poor coding from me coz I am in hurry to just finish the site.. ok lets come to the point
here you may observe the if condition it is checking that the right side( 9 characters) of the url must be login.asp.(checking the tail of the url)

let see how these may be override..

it works becoz we got the right file name as our referrer .it may be any URL .but, the file name should be login.asp

what are you going to tell with that fuckin code??
May be the question arise. Let me explain if you are accessing porn sites they first check for authentication after that they set the values (variables) and they identify only with the referrers
you got some stuff from the site which you want to access but it asks for credentials. To beat that do as follows
just leave blank or use the SQL injections for three or more times until  you can get a warning page or invalid login page and note whether the site has set any cookie on your PC .read the variables carefully . if you toggle the values (variables ) or change the cookies you may access the members area
and they are many articles on referrer spoofing on check it out
:The classical PHF method
since some people are asking questions about the Phf method i will write how to use it here.
first in 95% of the time this method will not work since most people know about it and it has been fixed on most WebPages. all you have to do is to type in the address bar:

Seventh step: Generate Errors

generate error on the page. excluding 404 error. If you get any error except 404 or page not displayed. then it is vulnerable.such as 403,500,501
Note: every vulnerability may be or may not be exploitable

Eighth step: Googling

On this particular forums you might hear the term Google it.
Before asking questions(basic or Advanced ) use google .I will show you How to Use Google with a Hacker’s Point of view
inurl:adminlogin.asp = search’s for adminlogins 

inurl:backup filetype:mdb = looks for old databases with logins 

"index of cgi-bin" = the directory of cgi-bin;)
 intitle:"PHP Shell *" "Enable stderr" filetype:php = a remote php shell
intitle:"network administration" inurl:"nic" = A funny thing to take over networked printers
filetype:pwd pwd inurl:"pwd" intitle:":"  
inurl:".com/accounts/NewAccount " intitle:"google" intext:"password"
intitle:"Powered by Invision" intext:"invision" inurl:"invision"
intitle:”Admin” intext:”password”
for unix type of machines
"" or '?page=/etc/passwd'
using google to scan a website
the above one scans the entire site
looking in the cached (the big buckets of google) pages of configurations or Administrators page intext:500 intext:”Administrator” inurl:login | inurl:config
Google itself warns that it is not responsible …… some stuff to view the links of website
to search a topic in abysmal manner
Google keyword filetype:pdf
Advance hacking filetype:ppt
Spoofing filetype:doc

Ninth step: Tools
Intellitamper : to scan the web
Nmap: port scanner
Stealth HTTP Scanner
WebSleuth : input validation attack
Black Widow : mirroring tool
WebCracker 5.0
Brutus AET2
Due to the Post length the below topics are truncated Google it for more information

Topics Skipped:
SQL Injections,
Unpatched security flaws
Denial of Service
Improper Error Handling
Insertion of Malicious Commands or Command Modifiers,
Buffer Overflows
Active Session Hijacking
Client Side Caching
Forced Browsing

FAQ on the Step By Step Guide

Can I hack using this Guide?
It depends on How you exploit the vulnerablilties.The above guide is just the basics of hacks
First check for version of Browsers,Web Server,SMTP,OS
goto where you can find the latest vulnerabilities and Exploits
Search Exploits for that Version ...

I need more explanation ?

Use google for the below keywords
• Input validation Attacks
• Directory Transversals (Path Truncation )
• Server side Executions
• Cross-site Scripting
• Cookie stealing
• Hidden Web Paths
• Escape Encoding
• NULL Byte
• Register_globals
• Attacking Web services and Data stores
• Common File Checks
• SQL Injection
• Man-in-the-middle Attacks
• Cookie Hijacking
• URL Obfuscation Attacks
• Session Hijacking
• Observing Customer Data
• Link Traversal
• Java Applet reverse engineering
• Parameter Passing
• Client-side Vulnerability Exploitation
• Friendly login URL’s
• Third-party shortened URL’s
• Host name obfuscation
• URL obfuscation
• IDN obfuscation methods

1 comment:

  1. Buy Beats for sale. Buy Beats on Sale. Buy Beats for your album,performance, or mixtape. Buy cheap,affordable and exclusive beats now at Raw 10 Productions.
    hip hop beats