Hacking a Website - Exploiting Webserver (Old Method)
Note: This guide is only for knowledge purpose
Old Trick but many works...Try to have local website.
This method uses website vulnerability to hack it through PHP,Python,Perl,C++ exploits.
First of all you need a target website. (Google & find one)
Step1
Next thing you need to do is find out is, it online or offline. (Ping)
Go to https://ping.eu/ & ping the target website.
Observe the results from ping. (Okay means online).
Step 3
Now, we need to gather information about the website. (Whois lookup)
Go to http://whois.domaintools.com & plug up the IP or the website.
You’ll see a large amount of information about the website.
Use Google to find even more information about the website.
Step 4
Once you’re done download, install & open Nmap.
Once you have done that, do a –sT –sV scan of the website.
[That is put, nmap –sT –sV, in Nmap’s command bar & scan website.]
Once done, observe open OS, ports, services running on the website server.]
Step 5
Once done, you’ll need to find banner of the software.
[Banner: It shows the software & version running on ports.]
Methods depend on the OS of the server.
Step 6
For WIN VISTA & 7:
You need to download & Open Netcat.
[Because Telnet is disabled in WIN VISTA & 7]
Once done type, nc <IP> <PORT>
Ex: nc 127.0.0.1 21
Once you’ve done that, you’ll get a banner.
This will be displaying all the details of the software running on port.
Step 7
For other OS:
Open Telnet
[Start > RUN > telnet]
Once done type, O <IP> <PORT>
Ex: O 127.0.0.1 21
Once you’ve done that, you’ll get a banner.
This will be displaying all the details of the software running on port.
If this doesn’t work you can try the first method.
Once you’ve got the banner, you need to search for vulnerability matching with banner.
Exploit databases:
Security Focus: https://www.securityfocus.com/
Cve Mitre: http://cve.mitre.org/
Metasploit: https://www.metasploit.com/
Once you’ve got the matching exploit of the same version software.
[If you haven’t got, try another port.]
You need to edit values, compile & run it.
Most common exploit Coders:
Perl
For perl exploits, Copy the exploit in notepad & save it with .pl extension.
Download & Install, Active Perl: https://www.activestate.com/products/activeperl/
Once done, edit the exploit with notepad & double click to run it.
PHP
For PHP exploits, copy & save it in .php extension.
Download & Install WAMP: http://www.wampserver.com/en/
Once done, edit the exploit with notepad & execute it from CMD.
Python
For python exploits, copy & save it in .py extension.
Download & Install python: https://www.python.org/downloads/
Once done, edit the exploit with notepad & double click to run it.
C/C++
For C/C++ exploits, copy & save it in notepad.
Download & Install Blood Shed. (Google the link)
Once done, edit the exploit, compile & double click to run it.
If your exploit is successful you will get access to server,
You’ll be able to edit every part of the website.
If your exploit wasn’t successful try with different port, services & software.
You can also use Metasploit web to search exploits.
First of all you need a target website. (Google & find one)
Step1
Next thing you need to do is find out is, it online or offline. (Ping)
Go to https://ping.eu/ & ping the target website.
Observe the results from ping. (Okay means online).
Step 3
Now, we need to gather information about the website. (Whois lookup)
Go to http://whois.domaintools.com & plug up the IP or the website.
You’ll see a large amount of information about the website.
Use Google to find even more information about the website.
Step 4
Once you’re done download, install & open Nmap.
Once you have done that, do a –sT –sV scan of the website.
[That is put, nmap –sT –sV, in Nmap’s command bar & scan website.]
Once done, observe open OS, ports, services running on the website server.]
Step 5
Once done, you’ll need to find banner of the software.
[Banner: It shows the software & version running on ports.]
Methods depend on the OS of the server.
Step 6
For WIN VISTA & 7:
You need to download & Open Netcat.
[Because Telnet is disabled in WIN VISTA & 7]
Once done type, nc <IP> <PORT>
Ex: nc 127.0.0.1 21
Once you’ve done that, you’ll get a banner.
This will be displaying all the details of the software running on port.
Step 7
For other OS:
Open Telnet
[Start > RUN > telnet]
Once done type, O <IP> <PORT>
Ex: O 127.0.0.1 21
Once you’ve done that, you’ll get a banner.
This will be displaying all the details of the software running on port.
If this doesn’t work you can try the first method.
Once you’ve got the banner, you need to search for vulnerability matching with banner.
Exploit databases:
Security Focus: https://www.securityfocus.com/
Cve Mitre: http://cve.mitre.org/
Metasploit: https://www.metasploit.com/
Once you’ve got the matching exploit of the same version software.
[If you haven’t got, try another port.]
You need to edit values, compile & run it.
Most common exploit Coders:
Perl
For perl exploits, Copy the exploit in notepad & save it with .pl extension.
Download & Install, Active Perl: https://www.activestate.com/products/activeperl/
Once done, edit the exploit with notepad & double click to run it.
PHP
For PHP exploits, copy & save it in .php extension.
Download & Install WAMP: http://www.wampserver.com/en/
Once done, edit the exploit with notepad & execute it from CMD.
Python
For python exploits, copy & save it in .py extension.
Download & Install python: https://www.python.org/downloads/
Once done, edit the exploit with notepad & double click to run it.
C/C++
For C/C++ exploits, copy & save it in notepad.
Download & Install Blood Shed. (Google the link)
Once done, edit the exploit, compile & double click to run it.
If your exploit is successful you will get access to server,
You’ll be able to edit every part of the website.
If your exploit wasn’t successful try with different port, services & software.
You can also use Metasploit web to search exploits.
You have Shared great content here about Website Hacker. I am glad to discover this post as I found lots of valuable data in your article. Thanks for sharing an article like this. Website Hacker
ReplyDeleteYou are providing good knowledge. It is really helpful and factual information for us and everyone to increase knowledge. Continue sharing your data. Thank you. Hire A Verified Hacker
ReplyDeleteIt is a proficient post that you have shared here about Hire A Professional Hacker. I got some unique and valuable information from your post. Thankful to you for sharing this post here.
ReplyDeleteYou have a genuine capacity to compose a substance that is useful for us. You have shared an amazing post about Hire Expert Hackers Online.Much obliged to you for your endeavors in sharing such information with us.
ReplyDeleteIt is a proficient article that you have shared here. I got some different kind of information from your article which I will be sharing with my friends who need this info. Thankful to you for sharing an article like this.Ethical Hacker For Hire in Usa
ReplyDeleteIncredibly accommodating which you have shared here. I'm intrigued by the subtleties and furthermore it is a critical article for us. Keep conferring this kind of data, Thank you.Genuine hackers for hire
ReplyDelete