Posts

Showing posts from December, 2017

fsociety Hacking Tools Pack – A Penetration Testing Framework

Image
Fsociety Contains All Tools Used In Mr Robot Series  A Penetration Testing Framework , you will have every script that a hacker needs.   Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation INSTALL & UPDATE Information Gathering : Nmap Setoolkit Port Scanning Host To IP wordpress user CMS scanner XSStracer Dork - Google Dorks Passive Vulnerability Auditor Scan A server's Users Password Attacks : Cupp Ncrack Wireless Testing : reaver pixiewps Exploitation Tools : Venom sqlmap Shellnoob commix FTP Auto Bypass jboss-autopwn Sniffing & Spoofing : Setoolkit SSLtrip pyPISHER SMTP Mailer Web Hacking : Drupal Hacking Inurlbr Wordpress & Joomla Scanner Gravity Form Scanner File Upload Checker Wordpress Exploit Scanner Wordpress Plugins Scanner Shell and Directory Finder Joomla! 1.5 - 3.4.5 remote code

Extracting Juicy info from an Image using Exif-Metadata

Image
In this post i will show you how can you extract juicy information from an image like when it was created,modified ,what camera were used and lot of other info.This method could be useful for starting a Image forensic even it would not enough for some forensic research but at least it can give a good start.This can also be useful if you want to review your picture like what was the shutter speed , It's copyright information, Camera Model this information can be very useful for photographer if they want to find out what camera or settings were used for some particular photos. What is Metadata Metadata provide information about other data. Its is simply description of data . Metadata contain some elements describe below :  Who created it and when   Who last modified it and when  Tags and its categories Who can access and update What is Exif Metadata Image Source Exif (Exchangable Image file format) data shows what camera model ,camera settings, ISO,expos

Cracking less secure login password for beginners

Image
This is beginner level post for learning how to hack less secured password of login page. For this i am going to use some router for cracking the password and of course Hydra to brute force it . What you need Kali Linux ( or any Linux distribution with Hydra installed ) A good wordlists for brute forcing the password  which you can download from here Login address of the target You need to know whether the service using SSL connection or not  Basic knowledge of HTTP-GET and HTTP-POST form  A lot of patience. Common sense Let the hacking Begin   STEP 1: Fire up your Kali Linux and go to terminal and type hydra , you should see something like this  STEP 2 :  Now type " hydra -V -L C:\Users\HACKETT\Desktop\wordlist.txt -P C:\Users\HACKETT\Desktop\wordlist.txt  192.168.1.2 http-get " Options we used in above commands 192.168.1.2 : This is the login address of the target which we are cracking  - V :  Verbose mode / show login+pass c

Tracking IP info with its Metadata

Image
What is Metadata Metadata provide information about other data. Its is simply description of data . Metadata contain some elements describe below :  Who created it and when   Who last modified it and when  Tags and its categories Who can access and update Let's Get started   First clone in to this GitHub url " https://github.com/ChrisTruncer/Just-Metadata.git "  Now go to Metadata/setup directory and install by typing ./setup.sh  It should start installing dependencies  Now we need to create a text file and insert the IP of our victim , to do this just type cat > victim.txt then press return and input your victim's IP then close it .  Load the program by typing python JustMetadata.py  Now type Load victim.txt to load our vicitm's IP into the framework.  Now type list gather and it will show you all available modules for gathering info ,but we are intrested in gathering every information so type

Track the IP address of your email sender using Email header

Image
We all may get lots of fraud and spam emails on gmail and on other email sites and these days we are  getting these types of email too much.So,i am here to share you the way to get the information about these email sender by getting their IP address.So follow these simple steps given below and you can get the IP address of your email sender . STEP 1 >  Go to  Gmail then open the mail then click on more then select 'Show original' STEP 2> A source page of the mail will be open .Now search for "Received: from" then you will get the ip address of the sender on the same line where you will get your word that you searched for. STEP 3>Now its time to get the information of the ip address,go to  traceip.net  then enter the ip address of the sender.  STEP 4>Now click on "whois" THATS ALL,you will get the maximum detail of the email sender. If you like the post so please share thi

Catching phishing sites with certstream logs

Image
What is certstream CertStream is an intelligence feed that gives you real-time updates from the Certificate Transparency Log network, allowing you to use it as a building block to make tools that react to new certificates being issued in real time. And by using this we are going to catch phishing sites using certstream SSL certificate live streaming. Steps to catch phishing sites First open your terminal and clone into this url with following command:  git clone https://github.com/x0rz/phishing_catcher.git Go to your downloaded directory with cd phishing_catcher Install required dependencies with pip install -r requirements.txt Finally run the program with   python catch_phishinh.py  and it will start showing list of malicious phishing sites by using live certstream SSL certificate  Caught the malicious phishing site And below you can see we got some fake Apple sites with similar looking interface   So by using follow

Advance phishing with IDN Homograph Attack

Image
What is IDN Homograph Attack?  An IDN Homograph Attack is a technique of spoofing a domain name with similar looking character using UNICODE character. For example http://ĝoogle.com -- ĝ not g , http://ḃing.com -- ḃ not b, http://asĸ.com   -- ĸ not k   Steps for the Attack  Clone in to the following github URL : https://github.com/UndeadSec/EvilURL.git   Move to your EvilURL directory and type "python evilurl.py"  In Insert name options insert your target site name for example i am going to use Google ,and in domain level insert what level of domain you want to spoof as i am choosing .com  Now we got our Homograph URL  Above you can see domain name has been spoof with different characters.In MORE EXTENSIVE URL we can see more character has replaced with Unicode characters, let see what happens if i type this URL in my browser. So first I will choose a Unicode URL and will paste it to my browser and see what happens   An