Methods of Web Application Information Gathering Process with Example in Cyber Security

Methods of Web Application Information Gathering Process with Example in Cyber Security

Methods of Web Application Information Gathering Process with Example in Cyber Security:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners  And why we  use  ethical hacking  to make  more interactive and  secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of  Ethickal and Cyber Security   in the light of  best Hindi  Short tutorial using simple and best possible example. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How  the  Ethical Hacking works in our today’s Technical Field. This is  the best  tutorial/Study Material  very beneficial for beginners  as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!

                                Web Technologies
These are the technologies which are there through which we can design the front end of the website.

and so on..

Scripting Languages
Java Script

What is Digital Foot printing and Information Gathering
Information Gathering : Information gathering is process of extracting as much as information about our target or victim. More information we have more easy we can penetrate the target.

Why info gathering is required
1. Maximum information about there target maximum reliability in the attack.
2. When we have a structured info plan its easy to attack with more accuracy.

Network Information Gathering
Simple Info Gathering
– IP addresses
– MAC address
– Host Name
– Sharing Vulnerability
– Peripheral Devices

Software : Soft-perfect  Network Scanner or Angry IP scanner (Windows)

Requirement : Soft-perfect Network Scanner.

Intelligent Info Gathering: Its a process of gathering information which more deep tech towards the machine or target can be a website can be an network device.

Information we gather in intelligent phase
1. IP Address
2. Operating System
3. Ports (Open Closed Filtered)
4. Services running on each open or filtered port
5. Version of the service running on port

Requirement : nmap and Kali Linux.

Step 1: Open terminal
Step 2: type nmap Victim IP)
Step 3: Wait for the scan to complete.

Vmware : Install Mac or Windows

1. Windows 7
2. Kali Linux -> LIVE
3. Windows XP

Web Application Information Gathering

Target :
Date It was Created
Expiry of the domain
Phone Number
Email Address <—- IMP
Registrar Information <– Who registered this domain service.


Email: abuse@registraradomain
Subject: Report Abuse on Domain ID:1322
Mail Body: Dear Team, as this domain is hosting bad content or data.



People Information Gathering

Remote IP Grabbing

Method 1: Via URL – Home Work

Method 2: IP Grabbing via image

How To Various OS Login Bypassing

Target OS
Windows Platform : Windows XP , WIndows 7 , Windows 8.1 and 10

Linux Platform : Ubuntu 14.5 LTS

Mac OS Platform : L Capital Latest from Apple

How to know or crack Password   in a Mac in 10 Seconds if you have forgotten

Hack A  MacBook Let Us Try

Step 1: Restart
Step 2: Press Command + R
Step 3: Utilities
Step 4: Open Terminal
Step 5: Type reset password
Step 6: select new password and confirm password
Step 7: Click ok and Cheers!!

Windows 7/8 – Ultimate

Windows hold their password in a file known as Sam ( Security Accounts Manager), having hash in nature with custom AES also from microsoft.

SAM file path : c:/windows/system32/config/sam

What is Online Cracking :

When you change the active system’s password without knowing the current password.

What is Offline Cracking:

 When system is switched off mode and os is not in active state then we have to apply offline cracking.

How to Use Hiren Boot For OS login Bypassing:

HirenBootCD – Disaster Recovery Toolkit
– Active Password Changer

System Hacking:
System Hacking is a technique in which we try to change the traditional behaviour of the OS as per our requirements. Via change in settings, firewalls settings, or bypassing login authentication.

-> Windows Password: Windows holds its login password in a file known as SAM(Security Accounts Manager) which is at path.


Online Cracking/Resetting the Password
This we can execute when the  system is in online mode i,e its already logged in. And we try to reset the password of the admin.

Step 1: Right click on my computer and select manage.
Step 2: On left you will see an option known as local users and group expand the + and click on users.
Step 3: Select the admin account or any other account which is password protected and right click.

Offline Cracking / Resetting the password
In this attack we will try to reset the password by resetting the value of SAM file to its origin.

Step 1: Download the iso image HirenBootCD

Now See Only!!

To make bootable pendrive : pendrive linux or unetboot

Others options

->  How to Hack  Kali Linux / Ubuntu Password/Or How to Bypass Kali Linux / Ubuntu Without Knowing the Password

Bypassing Login of Kali Linux

Linux :Bypassing Kali Linux Password
Step 1: Select Recovery MODE Press E
Step 2: Change ro to rw and add init=/bin/bash at the end of line and Press F10
Step 3: Reset password by typing password root and press enter.
Step 4: Type new password and restart the system

Bypassing Ubuntu System Password

Step 1: Go to Safe mode
Step 2: Recover Mode
Step 3: Select the second last option from the list i.e SHELL
Step 4: type password root
Step 6: Give the new password and confirm password and restart the machine.
Step 7: Fill the new password and enjoy 🙂


Leave a Reply

Your email address will not be published. Required fields are marked *