Friday, March 11, 2011

Google Hacking


Google is an advance search engine. Everybody wants to do google before doing anything. Every time searching on Google provides us lot of information. But now-a-days this information can be harmful for any company. In Wikipedia Google hacking defines as “Google hacking involves using advance operators in the Google search engine to locate specific strings of text within search results”. It is possible to obtain the private and sensitive information from the web sites.

Google has four important technologies that can be used to implement in searching on google site:
·       Google Bots: Crawl websites following hyperlinks to retrieve information which can be used in search requests
·       Google Index: that is listing result of the searching options which is found by web crawlers
·       Google Cache: even company remove data from the websites it could still be found in the google cache
·       Google API: it is a advance option that allows for programmers to use XML to create applications to query google.

Some books/links also available on Google Hacking:
1.    “Google Hacking for penetration testers” by Johnny Long
2.    http://johnny.ihackstuff.com
3.    “Google Hacks” books by Tara Calishain & Real Dornfest

Following are some examples of advance operator use as syntax on Google.
1.    Site: rundle http://www.microsoft.com
2.    Filetype: xls http://www.fanshawec.ca
3.    Link: http://www.cisco.com
4.    Cache: displays the version of a web
5.    Intitle: student http://www.microsoft.com
6.    Inurl:it displays web pages with a name in the URL

Monday, March 7, 2011

Steps of Hacking

Before becoming a ethical hacker, should have knowledge about network, knowledge of protocols (TCP/IP, HTTP, SMTP), windows, UNIX, programming languages, authentication protocols, firewall, wireless, scanning etc.

Following are the five steps for hacking.
1.    Reconnaissance: it is used to gather the information from the different resources (newspapers, company web site, and Google search), how much you can.
2.    Scanning: in this step try to find out the active IP address with the help of ping command etc. and also locate the different TCP/UDP ports.
3.    Gain Access: after the scanning, net target is to gain the access it can be done with the help of buffer overflow and password guess.
4.    Maintain Access: it is very difficult to gaining the access but it is more difficult to maintain the access without leaving any evidence. Try to take the help of backdoor program or Trojan horse.
5.    Cover Tracks: after taking full access of the server, then delete the log file, in his way hackers can hide or disguise from the company. The best way is used the real program name of Trojan virus and copied it to the different directory.  

Tuesday, March 1, 2011

Types of top software tools for Scanning.


Top 10 vulnerabilities scanner

Vulnerability is a kind of weakness in the programming or in the security network system. Following are the some vulnerability scanning technologies that can be used to find the vulnerabilities in your operating system.

·         MBSA: Microsoft Baseline Security Analyzer
·         Sara : Security Auditor's Research Assistant
·         SAINT : Security Administrator's Integrated Network Tool
·         GFI LANguard: A commercial network security scanner for Windows
·         Nessus : Premier UNIX vulnerability assessment tool
·         Core Impact : An automated, comprehensive penetration testing product
·         X-scan : A general scanner for scanning network vulnerabilities
·         QualysGuard : A web-based vulnerability scanner
·         ISS Internet Scanner : Application-level vulnerability assessment
·         Retina : Commercial vulnerability assessment scanner by eEye

Top 4 Application-Specific Scanners

·         THC Amap : An application fingerprinting scanner
·         Nbtscan : Gathers NetBIOS info from Windows networks
·         Ike-scan : VPN detector/scanner
·         SPIKE Proxy : HTTP Hacking

 Top Password Cracker

·         Cain and Abel : The top password recovery tool for Windows
·         John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
·         THC Hydra : A Fast network authentication cracker which supports many different services
·         Aircrack : The fastest available WEP/WPA cracking tool
·         L0phtcrack : Windows password auditing and recovery application
·         Airsnort : 802.11 WEP Encryption Cracking Tool
·         Pwdump : A window password recovery tool
·         RainbowCrack : An Innovative Password Hash Cracker

 Top 4 Port Scanners

·         Superscan : A Windows-only port scanner, pinger, and resolver
·         Angry IP Scanner : IP address and port scanner
·         Unicornscan : Not your mother's port scanner
·         Scanrand : An unusually fast stateless network service and topology discovery system

 Top 3 Vulnerability Exploitation Tools

·         Metasploit Framework : Hack the Planet
·         Core Impact : An automated, comprehensive penetration testing product
·         Canvas : A Comprehensive Exploitation Framework