Tuesday, 14 March 2017

MY FIRST YOUTUBE CHANNEL

links are provided above for my channel go watch share like subscribe
https://www.youtube.com/watch?v=0VeLKzbR0n8&t=2
https://www.youtube.com/watch?v=0VeLKzbR0n8&t=2s

Wednesday, 28 December 2016

How to hack a "web server"

DISCLAIMER :: HACKING IS NOT LEGAL THIS TUTORIAL IS ONLY FOR EDUCATION PURPOSE I AM NOT RESPONSIBLE FOR ANY CRIME ATTENTION ATTRACTION SO PLEASE ITS A HUMBLE REQUEST NOT USE IT AS A CRIME!!!

 for more




How to hack a Web Server
.Most websites store valuable information such as credit card numbers, email address and passwords etc. This has made them targets to attackers. Defaced websites can also be used to communicate religious or political ideologies etc.
In this article, we will introduce you toweb servers hacking techniques and how you can protect servers from such attacks.
Web server vulnerabilities
A web server is program that stores files (usually web pages) and makes them accessible via the network or internet. A web server requires both hardware and software. Attackers usually target the exploits in the software to gain authorized entry to the server. Let’s look at some of the common vulnerabilities that attackers take advantage of.
Default settings– These settings such as default user id and passwords can be easily guessed by the attackers. Default settings might also allow perform certain tasks such as running commands on the server which can be exploited. Reconfiguration of operating systems and networks – certain configuration such as allowing users to execute commands on the server can be dangerous if the user does not have a good password.Bugs in the operating system and web servers– discovered bugs in the operating system or web server software can also be exploited to gain unauthorized access to the system.
In additional to the above mentioned web server vulnerabilities, the following can also led to unauthorized access
Lack of security policy and procedures– lack of a security policy and procedures such as updating antivirus software, patching the operating system and web server software can create security loop holes for attackers.
Types of Web Servers
The following is a list of the common web servers
Apache– This is the commonly used web server on the internet. It is cross platform but is it’s usually installed on Linux. Most PHP websites are hosted on Apache servers.Internet Information Services (IIS)– It is developed by Microsoft. It runs on windows and is the second most used web server on the internet. Most asp and aspx websites are hosted on IIS servers.Apache Tomcat – Most Java server pages (jsp) websites are hosted on this type of web server.Other web servers – These include Nov ell's Web Server and IBM’s Lotus Domino servers.
Types of Attacks against Web Servers
Directory traversal attacks– This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain. Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software.
Denial of Service Attacks– With this type of attack, the web server may crash or become unavailable to the legitimate users.Domain Name System Hijacking – Withthis type of attacker, the DNS setting are changed to point to the attacker’s web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.Sniffing– Unencrypted data sent over the network may be intercepted and used to gain unauthorized access to the web server.Phishing– With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers etc.Pharming– With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.Defacement– With this type of attack, the attacker replaces the organization’s website with a different page that contains the hacker’s name, images and may include background music and messages.
Effects of successful attacks
An organization’s reputation can be ruinedif the attacker edits the website content and includes malicious information or links to a porn websiteThe web server can be used to install malicious software on users who visit the compromised website. The malicious software downloaded onto the visitor’s computer can be a virus, Trojan or botnet software etc.Compromised user data may be used for fraudulent activitieswhich may lead to business loss or lawsuits from the users who entrusted their details with the organization
Web server attack tools
Some of the common web server attack tools include;
Metasploit– this is an open source tool for developing, testing and using exploit code. It can be used to discover vulnerabilities in web servers and write exploits that can be used to compromise the server.MPack– this is a web exploitation tool. It was written in PHP and is backed by MySQL as the database engine. Once a web server has been compromised using MPack, all traffic to it is redirected to malicious download websites.Zeus– this tool can be used to turn a compromised computer into a bot or zombie. A bot is a compromised computer which is used to perform internet based attacks. A botnet is a collection of compromised computers. The botnet can then be used in a denial of service attack or sending spam mails.Neosplit – this tool can be used to install programs, delete programs, replicating it etc.
How to avoid attacks on Web server
An organization can adopt the following policy to protect itself against web server attacks.
Patch management– this involves installing patches to help secure the server. A patch is an update that fixes a bug in software. The patches can be applied to the operating system and the web server system.Secure installation and configuration of the operating systemSecure installation and configuration of the web server softwareVulnerability scanning system– these include tools such as Snort, NMap, Scanner Access Now Easy (SANE)Firewalls can be used to stop simple DoS attacks by blocking all traffic coming the identify source IP addresses of the attacker.Antivirus software can be used to remove malicious software on the serverDisabling Remote AdministrationDefault accounts and unused accounts must be removedfrom the systemDefault ports  & settings (like FTP at port  21) should be changed to custom port & settings (FTP port at 5069)
Hacking Activity: Hack a WebServer
In this practical scenario, we are going to look at the anatomy of a web server attack. We will assume we are targeting www.techpanda.org. We are not actually going to hack into it as this is illegal. We will only use the domain for educational purposes.
What we will need
A target www.techpanda.orgBing search engineSQL Injection toolsPHP Shell, we will use dk shell http://sourceforge.net/projects/icfdkshell/
Information gathering
We will need to get the IP address of our target and find other websites that share the same IP address.
We will use an online tool to find the target’s IP address and other websites sharing the IP address
Enter the URL http://www.yougetsignal.com/tools/web-sites-on-web-server/ in your web browserEnter www.techpanda.org as the target
Click on Check buttonYou will get the following results

Based on the above results, the IP address of the target is 69.195.124.112
We also found out that there are 403 domains on the same web server.
Our next step is to scan the other websites for SQL injection vulnerabilities. Note: if we can find a SQL vulnerable on the target, then we would directly exploit it without considering other websites.
Enter the URL www.bing.com into your web browser. This will only work with bing so don’t use other search engines such as google or yahooEnter the following search query
ip:69.195.124.112 .php?id=
HERE,
“ip:69.195.124.112” limits the search to all the websites hosted on the web server with IP address 69.195.124.112“.php?id=” search for URL GET variables used a parameters for SQL statements.
You will get the following results
As you can see from the above results, all the websites using GET variables as parameters for SQL injection have been listed.
The next logic step would be to scan the listed websites for SQL Injection vulnerabilities. You can do this using manual SQL injection or using tools listed in this article on SQL Injection.
Uploading the PHP Shell
We will not scan any of the websites listed as this is illegal. Let’s assume that we have managed to login into one of them. You will have to upload the PHP shell that you downloaded fromhttp://sourceforge.net/projects/icfdkshell/
Open the URL where you uploaded the dk.php file.You will get the following window
above that following u could easily get the link of ur particular website......!!!!!!!



USUALLY WHAT TO DO TO LOGIN IN A;MOST ANY WEBSITE LOGIN ADMIN PANNEL
 
In admin on page  login just type special charter  say for eg, *#ad'min" and same as password this will crash the system software and automatically you will be entering in the admin login page  of the particular website so this could an easy way of attempt to login in any government  made website which have poor security measures  which has 32  SQL bit security which is easily to be  hacked any  time



so guys as usaal at last just wanna say if u like follow me for more tips and tricks on  hacking and wait for the next blog there is yet more to come


FOLLOW ME ON INSTAGRAM -------" ayush__7" is username and ayush negi is my full name 

Saturday, 24 December 2016

How To Root Android Phone Easily 2016-2017(Latest) - Full Guide

What Is Android Rooting ?
Android Rooting is jailbreaking for Androids and allows users to dive deeper into a phone’s sub-system. Essentially, it’ll allow you to access the entire operating system and be able to customize just about anything on your Android. With root access, you can get around any restrictions that your manufacturer or carrier may have applied. You can run more apps.
Of course, for the average user, rooting sounds like -- and can be -- a scary process. After all, "rooting" around in your smartphone's core software might seem like a recipe for disaster. One wrong move and you could end up with bricked handset.
The process requires users to back up current software and flash (install) a new custom ROM (modified version of Android).
#Benefits Of Android Rooting :-
1. Boost your Phone speed & Battery Life.
2. Remove Pre installed crap ware like System Apps.
3. Remove Bloatwares, Apps like Facebook, Chrome Keep sucking your Ram & battery by running in background So, Among the smartphone geek crowd, applications like these are referred to as “bloatware:” they do nothing but bloat the software by existing as unnecessary applications.
4. Tweak your phone like : Increase Video streaming speed, Increase Wifi Speed, Increase SIM detecting Speed, Increase SD read/write speed.
5. Most Important & Best part, Install Custom Kernel & Custom ROMS ( I will explain about it in Installing Custom ROM section Custom ROM section )
6. Finally, Truly Own your Device, Make it appear in the way you want.

#Preparing your phone for Rooting -
First Open Settings on your device. If  you do not see Developer Options toward the bottom of the Settings screen on your device, follow these steps to activate them.
1. Tap on About Phone and find the Build Number.
2. Tap on the Build Number seven times and the Developer Options will appear on the main page of the Settings.
3. Tap on the Back key to see the Developer Options.
4. Tap on Developer Options.
5. Check to enable USB Debugging.
6. Check to enable OEM Unlocking. 

Root Android Phone With/Without PC Easily
Root Android Phone using KingRoot Android Root App
#What is kingroot Android App?
Kingo Android ROOT is a software, programmed by years of dedicate development, which can help Android users to root their devices in the easiest and safest manner.There are many other softwares to root android devices but here mukeshtricks4u gives you full guide about Kingo Android App.It is free of any charges, risks and preparations.

#Steps To Root Android Phone
   1.  Download KingRoot Free

   2. Enable USB debugging mode on your phone. If it's running Android 4.0 or 4.1, tap Settings, Developer Options, then tick the box for "USB debugging.
Steps To Unable USB debugging - Enable USB debugging mode on your phone. If it's running Android 4.0 or 4.1, tap Settings, Developer Options, then tick the box for "USB debugging.
  
Press OK to Save the setting change.
          
   3. Run Android Root on your PC, then connect your phone via its USB sync cable. After a moment, the former should show a connection to the latter. Your device screen may show an "Allow USB debugging?" pop-up. Tick "Always allow from this computer," then tap OK
   This tutorial is all about KINGOROOT app. bt due to some restrictions i change kingoroot to KINGROOT App. its also easy to use. DOwnload king root from above link.



  4. As the kingo android root is connected with your android phone it will detect your phone automatically

  5. Now Click on ROOT Button to start Rooting.

  6. Its All done , your android phone is rooted successfully.

#How To Check If your Android Phone is rooted or not?
So, to check root in your android mobile, simply download Root Checker app from here & Click on Verify Root.




With Using this app you can easily Check Your phone is rooted or not. 

FOLLOW MEhttps://www.instagram.com/?hl=en ON INSTAGAM !
ANY QUERIES EMAIL ME ayushnegi221@gmail.com

Friday, 23 December 2016

how to hack a wireless network WIFI

wireless network are accessible to anyone  within the router's transmission radius

today in this tutorial we will study how to easily hack wifi..]

  1. wep
  2. wpa/psk
  3. wap
WEP CRACKING TOOLS WHICH CAN EASILY HACK ANY WIFI IN MINUTES..

WARNING  USE AT  UR OWN RISK I AM NOT RESPONSIBLE FOR ANY TROUBLE

GENRAL ATTACK TYPES 
SNIFFING- this involves intercepting packets as they are transmitted over a network  The captured fara can then be  decoded usin tools such as CAIN AND  ABEL ALSO GOOD SOFTWARE TO HACK WPA AND WEP INSTALLE D AT HOME.//
 CRACKING WIRLSS NETWORK WEP/WPA KEYS 



  1. SOME OF THE POPULAR TOOLS THAT BACKTRACK AHS INCLUDES
  2. METASPLOIT
  3. WIRESHARK
  4. NMAP
  5. OPHCRACK

CRACKING wirless network keys requires  patience and resources  mentioned above..




HOW TO SECURE YOUR WIRELESS NETWORK....
  • CHANGING DEFAULT PASSWORD 
  • ENABLING WPA/PKS2
  • INTRUSION DETECTION 
  • FIREWALL
HACKING ACTIVITY CRACK WIRELESS PASSWORD''
 Decoding wireless network password stored in windows

  1. download cain and abel 
  2. open cain and abel
  3.  ensure that the decoder tab is selected  then click on wireless password tab is selected then click on wireless password from the navigation menu on the left hand side 
  4. clock on button with a plus sign
  5. The decoder will shoe you the encrypted type  ..
  6. simply decrypt  it
THANK U GUYS AND ENJOY HACKING
FOLLOW ME ON ISTAGRAM  ayush__7https://www.instagram.com/?hl=en