Posts

Showing posts from June, 2016

Complete Basic Tutorial on DNS Hijacking

Image
Complete Basic Tutorial on DNS Hijacking DNS hijacking (sometimes said as DNS redirection) could be a style of malicious attack that overrides a computer’s TCP/IP settings to purpose it at a scallywag DNS server, thereby unsupportive the default DNS settings. In alternative words, once AN assaulter takes management of a laptop to change its DNS settings, in order that it currently points to a scallywag DNS server, the method is said as DNS hijacking. As we have a tendency to all grasp, the “Domain Name System (DNS)” is especially answerable for translating a user friendly name like “google.com” to its corresponding science address “69.134.227.26”. Having a transparent plan of DNS and its operating will assist you higher perceive what DNS hijacking is all concerning. If you're fairly unaccustomed the thought of DNS, i'd advocate reading my previous post on however name System Works. How DNS Hijacking Works? As mentioned before, DNS is that the one that'

Top 6 Web Vulnerability Scanner Tools

Image
Top 6 Web Vulnerability Scanner Tools Web Vulnerability Scanner Tools: Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement.  So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant tools and find vulnerabilities and fix it. There are so many tools available for both Windows and Linux platform and commercial and open source tool. Below is the best web vulnerability scanner tool that we have discussed before. OWASP Zed Attack Proxy- ZAP OWASP or Open Web Application Security Project is a non profit organisation world wide that are focusing on improving the security of web application, for more about OWASP click  here .  The Zed Attack P

How To Find Uploaded shell and Passwords By Google dorks (priv8 dorks)

How To Find Uploaded shell and Passwords By Google dorks (priv8 dorks) How To Find Uploaded shell By Google dork (priv8 dorks) Go to Google.com and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !! Dorks for finding shells  inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"  "Shell" filetype:php intext:"uname -a:" "EDT 2010" intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ] inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update  Dorks for finding Passwords filetype:htpasswd htpasswd intitle:"index of" ".htpasswd" -intitle