Wednesday 30 January 2013

Resource attaking totorial 2013 by ETHICAL HACKING

When I had the idea to expand our Blog’s topics (not only Apple, iPhone, iPad, little tips on Mac and Windows etc….) and add more hacking information, tutorials etc…. So, today I decided to make a good start by creating this post-tutorial: How to Hack a Server Everything you need to know…. Tools you need: - Backtrack (Backtrack Website) - Firefox (get it from here….) – Included in Backtrack and Ubuntu - Netcat (Included in Backtrack)   — If you are on other linux enviroments get it from here…. - iCon2PHP (Get it from here….) - A good shell (iCon2PHP Archive includes three great shells) - A good VPN or Tor (More explanation below…..) - Acunentix Web Vulnerability Scanner (Search for a cracked version at Hackforums.net) About the Tools: Backtrack – Backtrack is a Linux distribution based on Ubuntu. It includes everything you need to become a good hacker. Apart from this, hacking behind a Linux system is better than a Windows one since most Websites are on Linux Servers. (Just a little tip: To wirelessly connect to a network use the Wicd Network Manager, located under the Applications->Internet) Firefox – Firefox is the best browser for hacking. You can easily configure a proxy and you can download millions of add-ons among which you can find some for Hacking. Find more about “Hacky” addons for Firefox Here…. Netcat – Netcat is a powerful networking tool. You will need this to root the server…. iCon2PHP & Good Shells – iCon2PHP is a tool I created and you will use it if you upload the image to an Image Uploader at a Forum or Image Hosting Service. iCon2PHP Archive contains some of the top shells available. Good VPN or TOR (Proxies are good too…) – While hacking you need to be anonymous so as not to find you (even if you forget to delete the logs….). A VPN stands for Virtual Private Network and what it does is: hiding your IP, encrypting the data you send and receive to and from the Internet. A good VPN solution for Windows Maschines is ProXPN. However, with VPN connections (especially when you are under a free VPN connection) your connection speen is really slow. So, I wouldn’t recommend VPN except if you pay and get a paid account. What I would recommend is Tor. Tor can be used from its bundle: Vidalia, which is a great tool for Windows, Mac and Linux that uses Proxies all over its network around the world so as to keep you anonymous and changing these Proxies every 5-10 minutes. I believe it is among the best solutions to keep you anonymous if you don’t want to pay for a Paid VPN account Apart from Tor, simple Proxies are good but I wouldn’t recommend them as much as I would for Tor.        — If I listed the above options according to their reliability :                                  1. Paid VPN Account at ProXPN 2. Tor 3. Free VPN Account at ProXPN 4. Proxy Connection Acunetix Web Vulnerability Scanner – Acunetix is (maybe the best) Vulnerability Scanner. It scans for open ports, vulnerabilities, directory listing. During the scan it lists the vulnerabilities and says how a hacker can exploit it and how to patch it. It also shows if it is a small or big vulnerability. The Consultant Edition (For unlimited websites) costs about 3000-7000$. ____________________________________________________________ Starting the Main Tutorial: So, here is the route we will follow: Find a Vulnerable Website –> Upload a c100 Shell (Hidden in an Image with iCon2PHP) –> Rooting the Server –> Defacing the Website –> Covering your Tracks - – -  Before we begin – - - -Boot to Backtrack -Connect to your VPN or to Tor. -It would be good to read a complete guide to stay anonymous while hacking here… -Open Firefox. 1. Finding a Vulnerable Website and Information about it: Crack Acunetix (find tutorial at Hackforums.net). Open and scan the  website (use the standard profile – don’t modify anything except if you know what you are doing). For this tutorial our website will be: http://www.site.com (not very innovative, I know….) Let’s say we find a vulnerability where we can upload a remote file (our shell) and have access to the website’s files. Th

1 comment:

  1. The Ultimate Networking Tools is an interesting concept: using mentalism to get the contact information of people you meet. As the name suggests, it is a great way to network, collect and store contact information for prospective clients such as people who you meet at shows that are interested in hiring you for their event.

    ReplyDelete