Posts

SOME COOL GOOGLE DORK

Symlink dork. Code: inurl:/sym/root/ & intext:"Parent Directory" c99shell dork. Code: inurl:(shell.php | c99.php) Encoder Bind Proc. FTP brute Sec. SQL PHP-code Feedback Self remove Logout c99shell dork(2). Code: inurl:(shell.php | c99.php) intitle:c99shell Encoder Bind Proc. FTP brute Sec. SQL PHP-code Feedback Self remove Logout WordPress MySQL details. Code: inurl:(wp-config.conf | wp-config.txt) ext:(conf | txt | config) Databases username && passwords. Code: inurl:/includes/ & ext:inc & inurl:connect | inurl:dbconnect & -site:phpkode.com Phish The Phisher Code: filetype:txt & intext:"email=" & intext:"pass=" & intext:"charset_test=" phpmyadmin exploit Code: allinurl:index.php?db=information_schema Here is list of other google dork.  Download here .

HOW TO CRACK MD5 HASH IN UBUNTU?

Image
If you have an password in md5 hash and you need password in plain text for this there is lot of tool and online websites too but they wont crack all md5 hash if your hash exist in thier database they will give u plain text password but if not than u have to use some tool like here. We are using a perl script to crack an hash so we had encrypted an text "r2/." into a md5 hash which is "5d28a1f53e24a8b0a85d0a53348d49ad" so here we will try to decrypt it again with perl in a plain text. So first of all here we already know the length of text is 4 and it is included with specail characters like ". /" etc so our job will be easy but if we dont know the length and what kind of character included in hash then what? no problem we have some solution for that too ok lets began with first step if u are using linux here we are using back track for this first of all you need perl script so donalod and follow the steps to crack a hash i will try to explain each part

HOW TO CRACK ANY HASH WITH HELP OF ONLINE SERVICES?

How to crack any hash with help of online services? findmyhash.py try to crack different types of hashes using free online services. (1)Download it from  here  . (2)Open terminal & change directory where you download tool , if we download tool in download folder then type in following command in terminal cd Downloads (3)python findmyhash.py Accepted algorithms are: MD4, MD5, SHA1, SHA256, RMD160, LM, NTLM, MYSQL, CISCO7 & JUNIPER NOTE: for LM / NTLM it is recommended to introduce both values with this format: python findmyhash.py LM -h 9a5760252b7455deaad3b435b51404ee:0d7f1f2bdeac6e574d6e18ca85fb58a7 python findmyhash.py NTLM -h 9a5760252b7455deaad3b435b51404ee:0d7f1f2bdeac6e574d6e18ca85fb58a7 Valid OPTIONS are: -h If you only want to crack one hash, specify its value with this option. -f If you have several hashes, you can specify a file with one hash per line. NOTE: All of them have to be the same type. -g If your hash cannot be cracked, search it in Google and show all t

HOW TO EXPLOIT ROBOTS.TXT?

Image
What Is Robots.Txt? Robots.txt is a file that contain path which cannot crawled by bot most of time search-engine bots like google bot or etc. It tells search-engine that this directory is private & can not be crawled by them. If yo are site owner & want to make robots.txt file , then go following link , it will create robots.txt file for you. http://www.mcanerin.com/EN/search-engine/robots-txt.asp so just for now , robots.txt is pretty much what websites use to block certain pages from search engines. Here is a sample :  http://www.whitehouse.gov/robots.txt First Method Now this method is very rare & the web-master would have to be stupid to do this, but you'll be surprised how many stupid people there are in the world. This one is simple, go to one of the disallowed directories & look in the source. Sometimes web-master leave comments there to give hints like passwords/ or user-names. You never know you might find something juicy. :] With this info you could

HOW TO HACK TARGETED WEBSITE(BASIC)?

Today is the age of computer and internet. More and more people are creating their own websites to market their products and earn more profit from it. Having your own website will definitely help you in getting more customer purchasing your products but at the same time you can also also attract hackers to play around with your site. If you have not taken enough care to protect your site from hackers then your business can even come to an end because of these hackers. Before you hack into a system, you must decide what your goals are. Are you hacking to put the system down, gaining sensitive data, breaking into the system and taking the 'root' access, screwing up the system by formatting everything in it, discovering vulnerabilities & see how you can exploit them, etc ... ? The point is that you have to decide what the goal is first. The most common goals are: 1. Breaking into the system & taking the admin privileges. 2. Gaining sensitive data, such as credit cards, i