Saturday, 30 November 2013

Top Open Source Hacking Tools


 

Nmap : 

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.  


Wireshark :

Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. Wireshark homepage.

Nikto2 :

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Nikto2 homepage.

Ettercap :

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. ettercap homepage.
NexPose Community edition :

The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features. Nexpose homepage.
Ncat :

Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses. ncat homepage.

 Kismet :

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. kismet homepage.
w3af :

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. w3af homepage.

Thursday, 28 November 2013

Linux shell commands tips and tricks


Linux shell commands tips and tricks:

 
     Keep in mind that for some commands you will need to install additional software on your Linux distribution.

SSH debug mode:
    $ ssh -vvv user@ip_address   

SSH with pem key:

     $ ssh user@ip_address -i key.pem    

Create war file:

     $ jar -cvf name.war file    

Test disk read speed:

     $ hdparm -Tt /dev/sda    

Get md5 hash from text:

     $ echo -n "text" | md5sum    

Check xml syntax:

     $ xmllint --noout file.xml    

Extract tar.gz in new directory:

     $ tar zxvf package.tar.gz -C new_dir    

Get HTTP headers with curl:

     $ curl -I http://www.example.com      

Modify timestamp of some file or directory (YYMMDDhhmm):

     $ touch -t 0712250000 file    


Download from ftp using wget:

     $ wget -m ftp://username:password@hostname    

Generate random password (16 char long in this case):

     $ LANG=c < /dev/urandom tr -dc _A-Z-a-z-0-9 | head -c${1:-16};echo;    

Quickly create a backup of a file:

     $ cp some_file_name{,.bkp}    

Access Windows share:

     $ smbclient -U "DOMAIN\user" //dc.domain.com/share/test/dir    

Run command from history (here at line 200):

     $ !200    

Unzip to directory:

     $ unzip package_name.zip -d dir_name    

Show free RAM in MB:

     $ free -m | grep cache | awk '/[0-9]/{ print $4" MB" }'    

Git clone specific branch (master):

     $ git clone git@github.com:name/app.git -b master    

Git switch to another branch (develop):

     $ git checkout develop    

Git delete branch (mybranch):

     $ git branch -d mybranch    

Git delete remote branch:

     $ git push origin :branchName    

Git push new branch to remote:

     $ git push -u origin mynewfeature    

List all supported kill signals:

     $ kill -l    

Installing Lua and Luarocks in CentOS

Installing Lua and Luarocks in CentOS:

     There seems to be something wrong with CentOS' lua package (version 5.1.4). After installing lua via yum, compiling luarocks in /usr/local/src/ and running the luarocks command, you will end up with the following error:

The issue seems to persist even in CentOS 6. So we suggest building lua and luarocks directly from the source after some OS library dependencies are met:

     # yum install gcc gcc-c++ kernel-devel    
     # yum install readline-dev                         
     # yum install ncurses-devel.i386               


Proceed to download and compile lua:

     # wget http://www.lua.org/ftp/lua-5.1.4.tar.gz     
     # tar zxvf lua-5.1.4.tar.gz                                     
     # cd lua-5.1.4                                                       
     # make linux                                                        
 

Download and install luarocks:

     # wget http://luarocks.org/releases/luarocks-2.0.6.tar.gz    
     # tar zxvf luarocks-2.0.6.tar.gz                                             
     # cd luarocks-2.0.6                                                               
     # ./configure                                                                          
     # make                                                                                  
     # make install                                                                        


This should help you have luarocks properly installed and ready to fetch lua modules from the repo. Have fun!

Sunday, 17 November 2013

FireFox users can Hack Rapidshare NOW

FireFox users can Hack Rapidshare NOW:

 

       The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors. The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.

Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools. It changes how Web pages look and act by altering the rendering process.

Steps :

1) Install the Greasemonkey extension>>
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi
2) Restart Firefox
3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html
4) Right click on rapidshare.user.js and choose "Install User Script".
5) Run FireFox.
6) From 'File' Menu click on Open File then browse to whereever you saved the 'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.
7) Click on it to install this plug-in then CLOSE FIREFOX.
8) Run FireFox again.
From the File Menu click on Open File then browse to whereever you saved the 'rapidshare.user.js'.
9) Open it.
10) Click the Tools Menu then click on Install User Script then click OK.
11) Close FireFox.

that's it now enjoy multiple file downloads......!!

Tuesday, 12 November 2013

How To Hide Files in JPEG Images

This post will help you to hide files in JPEG images :


In this example we will hide a text message inside a picture. We have choose for this tutorial a text file named foobar.txt and a picture linux.jpg.

1. Move your files you want to combine in a new folder, in our case C:\secret.

2. Add the file you want to hide into a new RAR archive like.Secret.txt .

3. WinRar created the archive in the folder where our files are located.

4. Open Command Prompt (Start -> Run..., type cmd and press Enter)

5. Go to the folder where your files are located, in this case C:\secret by using the cmd command.

6. Now type copy /b linux.jpg + foobar.txt.rar dummy.jpg where linux.jpg is the original picture, foobar.txt.rar is the file that will be hidden, and dummy.jpg is the file which contains both.

7. If you open dummy.jpg you will see the linux.jpg image.

8. Try opening the file with WinRar (select All files).

9. Now you can see the text file that is hidden in the picture.

Wednesday, 6 November 2013

4 Information gathering commands for linux

DIG :

      dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried. Most DNS administrators use dig to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output. Other lookup tools tend to have less functionality than dig.


     # dig google.com    

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> google.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38479
;; flags: qr rd ra; QUERY: 1, ANSWER: 11, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.            IN    A

;; ANSWER SECTION:
google.com.        62    IN    A    74.125.236.73
google.com.        62    IN    A    74.125.236.65
google.com.        62    IN    A    74.125.236.68
google.com.        62    IN    A    74.125.236.78
google.com.        62    IN    A    74.125.236.67
google.com.        62    IN    A    74.125.236.66
google.com.        62    IN    A    74.125.236.72
google.com.        62    IN    A    74.125.236.70
google.com.        62    IN    A    74.125.236.71
google.com.        62    IN    A    74.125.236.69
google.com.        62    IN    A    74.125.236.64

;; Query time: 53 msec
;; SERVER: 192.168.0.1#53(192.168.0.1)
;; WHEN: Thu Nov  7 10:40:52 2013
;; MSG SIZE  rcvd: 204

 

NSLOOKUP :

      Nslookup is a program to query Internet domain name servers. Examples of issueing a simple query: nslookup name nslookup IP_address nslookup name server nslookup IP_address server 


     # nslookup google.com    

Server:        192.168.30.50
Address:    192.168.30.50#53

Non-authoritative answer:
Name:    google.com Address: 74.125.236.70
Name:    google.com Address: 74.125.236.65
Name:    google.com Address: 74.125.236.73
Name:    google.com Address: 74.125.236.69
 

HOST :

     host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. 
When no arguments or options are given,host prints a short summary of its command line arguments and options.

     # host google.com    

google.com has address 74.125.236.35
google.com has address 74.125.236.46
google.com has address 74.125.236.38
google.com has address 74.125.236.39
google.com has address 74.125.236.33
google.com has address 74.125.236.37
google.com has address 74.125.236.32
google.com has address 74.125.236.34
google.com has address 74.125.236.41
google.com has address 74.125.236.36
google.com has address 74.125.236.40
google.com has IPv6 address 2404:6800:4007:800::1004
google.com mail is handled by 30 alt2.aspmx.l.google.com.
google.com mail is handled by 20 alt1.aspmx.l.google.com.
google.com mail is handled by 40 alt3.aspmx.l.google.com.
google.com mail is handled by 10 aspmx.l.google.com.
google.com mail is handled by 50 alt4.aspmx.l.google.com.

 

PING :

    ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of ``pad'' bytes used to fill out the packet.

     # ping -c 5 google.com    

PING google.com (74.125.236.67) 56(84) bytes of data.
64 bytes from maa03s05-in-f3.1e100.net (74.125.236.67): icmp_seq=1 ttl=54 time=29.4 ms
64 bytes from maa03s05-in-f3.1e100.net (74.125.236.67): icmp_seq=2 ttl=54 time=28.7 ms
64 bytes from maa03s05-in-f3.1e100.net (74.125.236.67): icmp_seq=3 ttl=54 time=29.3 ms
64 bytes from maa03s05-in-f3.1e100.net (74.125.236.67): icmp_seq=4 ttl=54 time=29.2 ms
64 bytes from maa03s05-in-f3.1e100.net (74.125.236.67): icmp_seq=5 ttl=54 time=28.8 ms

--- google.com ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4030ms
rtt min/avg/max/mdev = 28.757/29.136/29.442/0.348 ms

Start or stop Network manager in CentOS

Start or stop Network Manager in Cent OS :

Login with root access

To Stop Network Manager Service

     # service NetworkManager stop      

Configure chkconfig so that the Network Manager Service cannot start at Startup

     # chkconfig NetworkManager off    

Now Add default Net Manager

     # chkconfig network on    

Start default Manager

     # service network start    


or You try with nm-applet command aslo


     # login as root     

The following command will force start Network manager

     #nm-applet