Methods of Web Application Information Gathering Process with Example in Cyber Security
Methods of Web Application Information Gathering Process with Example in Cyber Security:-In this cyberpoint9 tutorial we are going to describe about the concept of ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners And why we use ethical hacking to make more interactive and secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of Ethickal and Cyber Security in the light of cyberpoint9.com best Hindi Short tutorial using simple and best possible example. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How the Ethical Hacking works in our today’s Technical Field. This is the best tutorial/Study Material very beneficial for beginners as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!
These are the technologies which are there through which we can design the front end of the website.
and so on..
What is Digital Foot printing and Information Gathering
Information Gathering : Information gathering is process of extracting as much as information about our target or victim. More information we have more easy we can penetrate the target.
Why info gathering is required
1. Maximum information about there target maximum reliability in the attack.
2. When we have a structured info plan its easy to attack with more accuracy.
Network Information Gathering
Simple Info Gathering
– IP addresses
– MAC address
– Host Name
– Sharing Vulnerability
– Peripheral Devices
Software : Soft-perfect Network Scanner or Angry IP scanner (Windows)
Requirement : Soft-perfect Network Scanner.
Intelligent Info Gathering: Its a process of gathering information which more deep tech towards the machine or target can be a website can be an network device.
Information we gather in intelligent phase
1. IP Address
2. Operating System
3. Ports (Open Closed Filtered)
4. Services running on each open or filtered port
5. Version of the service running on port
Requirement : nmap and Kali Linux.
Step 1: Open terminal
Step 2: type nmap 192.168.235.188(Your Victim IP)
Step 3: Wait for the scan to complete.
Vmware : Install Mac or Windows
1. Windows 7
2. Kali Linux -> LIVE
3. Windows XP
Web Application Information Gathering
Target : snu.edu.in
Date It was Created
Expiry of the domain
Email Address <—- IMP
Registrar Information <– Who registered this domain service.
Subject: Report Abuse on Domain ID:1322
Mail Body: Dear Team, as this domain is hosting bad content or data.
People Information Gathering
Remote IP Grabbing
Method 1: Via URL
www.whatstheirip.com – Home Work
Method 2: IP Grabbing via image
How To Various OS Login Bypassing
Windows Platform : Windows XP , WIndows 7 , Windows 8.1 and 10
Linux Platform : Ubuntu 14.5 LTS
Mac OS Platform : L Capital Latest from Apple
How to know or crack Password in a Mac in 10 Seconds if you have forgotten
Hack A MacBook Let Us Try
Step 1: Restart
Step 2: Press Command + R
Step 3: Utilities
Step 4: Open Terminal
Step 5: Type reset password
Step 6: select new password and confirm password
Step 7: Click ok and Cheers!!
Windows 7/8 – Ultimate
Windows hold their password in a file known as Sam ( Security Accounts Manager), having hash in nature with custom AES also from microsoft.
SAM file path : c:/windows/system32/config/sam
What is Online Cracking :
When you change the active system’s password without knowing the current password.
What is Offline Cracking:
When system is switched off mode and os is not in active state then we have to apply offline cracking.
How to Use Hiren Boot For OS login Bypassing:
HirenBootCD – Disaster Recovery Toolkit
– Active Password Changer
System Hacking is a technique in which we try to change the traditional behaviour of the OS as per our requirements. Via change in settings, firewalls settings, or bypassing login authentication.
-> Windows Password: Windows holds its login password in a file known as SAM(Security Accounts Manager) which is at path.
Online Cracking/Resetting the Password
This we can execute when the system is in online mode i,e its already logged in. And we try to reset the password of the admin.
Step 1: Right click on my computer and select manage.
Step 2: On left you will see an option known as local users and group expand the + and click on users.
Step 3: Select the admin account or any other account which is password protected and right click.
Offline Cracking / Resetting the password
In this attack we will try to reset the password by resetting the value of SAM file to its origin.
Step 1: Download the iso image HirenBootCD :www.hirensbootcd.org/download/
Now See Only!!
To make bootable pendrive : pendrive linux or unetboot
-> How to Hack Kali Linux / Ubuntu Password/Or How to Bypass Kali Linux / Ubuntu Without Knowing the Password
Bypassing Login of Kali Linux
Linux :Bypassing Kali Linux Password
Step 1: Select Recovery MODE Press E
Step 2: Change ro to rw and add init=/bin/bash at the end of line and Press F10
Step 3: Reset password by typing password root and press enter.
Step 4: Type new password and restart the system
Bypassing Ubuntu System Password
Step 1: Go to Safe mode
Step 2: Recover Mode
Step 3: Select the second last option from the list i.e SHELL
Step 4: type password root
Step 6: Give the new password and confirm password and restart the machine.
Step 7: Fill the new password and enjoy 🙂