Rabu, 02 September 2015

Information Gathering by google hacking, whatweb, joomscan and wpscan

Information Gathering by google hacking, whatweb, joomscan and wpscan



















GOOGLE HACKING

Intitle
Used to find information on the title or the title of a web pageExample: you type "intitle: blogspot" {without quotes} then results inshow is a title page that uses blogspot

InurlUsed to generate search results that contain the keywordURLs that we are looking forExample: you type "inurl: blogspot" {without quotes} then the results will be in show is the URL / web page which menggandung said blogspot 
SiteUsed to search the keywords that you are looking at only one site alamt andcan be used to find the number of sites in a countryExample: you type "blogspot site: microsoft.com" {without quotes} thenresults to be displayed is associated on blogspot Hanaya andjuuga only on microsoft.com addressTo determine the number of sites in a countryExample: you type "site: id" {without quotes} then google will reportthe number of sites that exist in Indonesia. Id is an extension of an existing site inIndonesiaFiletypeUsed to search for a fle on the internet with a particular ekstensu example:.mp3, .doc, .xls, .mdb, .txt, .pdf .and othersExample: you type "peterpan filetype: mp3" {without quotes} then the result Yagwill be on show from the band peterpan mp3 files that you can directly download

IntextUsed to display search results in the form of words in the body of aituscertain.Example: you type "intext: admin" {without quotes} then the result ispage containing the keyword admin. 
InformationUsed to seek information from a site in searchExample: "info: kompas.com" {without quotes} then the results will be displayedis information of kompas.comWell that all basic sebagan google hacking all the syntax can joinright to get a satisfactory result so long looking for what's notwill kiita search

All basic syntaxabove is the basis of Google Hacking, forproduce the results you want, you just menggambungkansyntax 1 with other syntax.Example: "filetype: mp3 site: shared.com" {without quotes} The combined merupkan2 syntax, the syntax filetype and site .sintak above is used if you want todownload mp3 from 4shared.com

Senin, 31 Agustus 2015

HACK WIFI KALI LINUX

Jumat, 28 Agustus 2015

some commands that can be executed through meterpreter, also maintains contact with the target

1. Open the beef through the terminal with the command beer-xss



2. it will open iceweasel by itself and will ask login password and password beef with beef


 

3. Open a new tab in the terminal and enable apache 2



4. Open a new tab in the terminal and activate exploit



5. create a command in the terminal exploit to attack meterpreter through client service



6. Open windows xp which is in virtualbox



7. run the exploit



8. Open Internet Explorer and go to a web address index.html



9. open on the icebrowser and we have to connect to the target web server



10. of beef we exploit the target to visit a web address that we provide to meterpreter targets.



11. Then, enter -l command session to view the sessions that have been connected with the target



12. The session then type the command -i 1 when the target is connected to session 1



13. then the target has been connected with us through meterpreter











USE SOCIAL ENGINERING TOOLKIT

is an application found on linux for emudahkan we exploit the easy and quick way, for more details ssimaklah existing image below








EXPLOIT WITH CLIENT ATTACK AND BEEF
1. Open the beef through the terminal with the command beer-xss



2. it will open iceweasel by itself and will ask login password and password beef with beef


 

3. Open a new tab in the terminal and enable apache 2



4. Open a new tab in the terminal and activate exploit



5. create a command in the terminal exploit to attack meterpreter through client service



6. Open windows xp which is in virtualbox



7. run the exploit



8. Open Internet Explorer and go to a web address index.html



9. open on the icebrowser and we have to connect to the target web server



10. of beef we exploit the target to visit a web address that we provide to meterpreter targets.



11. Then, enter -l command session to view the sessions that have been connected with the target



12. The session then type the command -i 1 when the target is connected to session 1



13. then the target has been connected with us through meterpreter


3 komentar:

  1. Thanks gan, infonya sangat bermanfaat sekali hihi
    http://varianmusic.com/ Agen Togel Online, Bandar Togel Terpercaya, Situs Togel Pasaran Resmi

    BalasHapus
  2. Agen togel indonesia terbaik dan terpercaya 2020 bagi - bagi bonus deposit setiap hari 5000 rupiah untuk semua member aktif. Main pakai rumus anga 4D jitu yang bikin menang setiap hari. Untuk informasi lebih lanjutnya anda bisa kunjungi langsung blog unsurtoto http://chumbalacachumbala.org

    BalasHapus

  3. http://www.plantage.info/ merupakan Blog Resmi Agen judi bola Online Paling Terpercaya Di Indonesia yang membahas Review Situs Judi Bola, Tips Terbaik menang setiap hari dalam Taruhan Bola Online

    BalasHapus