Monday, October 11, 2010

How To Find Vulnerable Web Apps With Google : Web Application Hacking

Search engines index a huge number of web pages and other resources. Hackers can use these engines to make anonymous attacks, find easy victims, and gain the knowledge necessary to mount a powerful attack against a network. Search engines are dangerous largely because users are careless. Further, search engines can help hackers avoid identification. Search engines make discovering candidate machines almost effortless. Listed here are a few common hacks performed with http://www.google.com (which is our favorite search engine, but you can use one of your own choosing if you'd like, assuming it supports all the same features as Google).

To find unprotected /admin, /password, /mail directories and their content, search for the following keywords in http://www.google.com:
  • "Index of /admin"
  • "Index of /password"
  • "Index of /mail"
  • "Index of /" +banques +filetype:xls (for France)
  • "Index of /" +passwd
  • "Index of /" password.txt













To find password hint applications that are set up poorly, type the following in http://www.google.com (many of these enumerate users, give hints for passwords, or mail account passwords to an e-mail address you specify!):
  • password hint
  • password hint -email
  • show password hint -email
  • filetype:htaccess user







To find IIS/Apache web servers with FrontPage installed, type the following in http://www.google.com (run the encrypted password files through a password cracker and get access in minutes!):

         administrators.pwd index
         authors.pwd index
          service.pwd index
          allinurl:_vti_bin shtml.exe




To find the MRTG traffic analysis page for websites, type the following in http://www.google.com:
  • inurl:mrtg







To get access to unprotected global.asa(x) files or to get juicy .NET information, type the following in http://www.google.com:
  • filetype:config web (finds web.config)
  • global.asax index (finds global.asax or global.asa)






To find improperly configured Outlook Web Access (OWA) servers, type the following in http://www.google.com:
  • inurl:exchange inurl:finduser inurl:root

Sunday, October 10, 2010

How To hack A Computer In A LAN By Creating a Null Session

Today,I will write about hacking computer inside the LAN network.

This technique will be taking advantage of Port 139.

Most of the time,Port 139 will be opened.

First of all,I will do a port scanning at the target computer which is 192.168.40.128.

This computer is inside my LAN network.

I will scan it using Nmap.



I get the result and it shows Port 139 is opened up for me.

Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool

You can get both of them on the Internet.

After you get both of them,put them in the C:\ directory



You now need to create a null session to the target computer.



Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.

We will first using USER2SID to get the ID.



We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.

We take the ID we get from the guest account and modified it become
"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.



Now you will see that you get the username of the Administrator account.

In this case,the Administrator account is Administrator.

Create a text file called user.txt and the content will be the username of the Admin account.



Prepare yourself a good wordlist.

  

Now put both of them in the same directory with the NetBios Auditing Tool.




Press on enter and the tool will run through the passlist.





In this case,I have get the password.

In order to proof that I can get access to the target computer using this password.



After you press enter,it will prompt you for the username and password.



Therefore,just input them inside the prompt and continue.



Target C drive will be on your screen.






In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139

Saturday, October 9, 2010

How To Hide Your Malicious Code Into A Simple Scrap Document

Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications

As Very understood, a simple user would not Open Any malicious file untill or unless he is forced or Phished to do so.
Therefore, Here is The way How to Create a Malicious code Within an scrap document so that A SImple user Cannot Identify It.
  1. Make a copy of Notepad.exe and place it on your desktop.
  2. Open Wordpad.
  3. Click and drag the copy of Notepad.exe you placed on the desktop into the open Wordpad document.
  4. Next, click on Edit, Package Object, Edit Package.
  5. Then click on Edit, Command Line.
  6. At the command-line prompt, type a command such as dir c: /p; then click on OK.
  7. You can now change the icon if so desired.
  8. Exit from the edit window, and the document will be updated.
  9. Click and drag Notepad.exe back to the desktop.
  10. The file will have taken the name Scrap; rename it ImportantMessage.txt.
  11. Click on ImportantMessage.txt and observe the results. You should notice that the scrap produced a directory listing of the C drive. If you were a malicious hacker, you could have just as easily set up the command to reformat the hard drive or erase all the system files.