Monday 12 December 2011

Hack websites that are not vulnerable

If your target website is not vulnerable, but you really want to hack it, you could do a IP lookup on this website: Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server. How to get the IP of your target? Open up cmd (Run->cmd.exe or in Vista/7 press 'Start button' and in the search bar enter cmd, then click it) and type 'ping targethost.com'. Targethost.com is your target of course. You will see something like this: Pinging it-sec.biz [204.236.239.5] with 32 bytes of data:. In the brackets ([]) you can see the remote IP. Now enter it on the given website (above). You will get every website that is hosted on the server (same hosting). It makes you the job much easier, because the chances of hacking your target website are much bigger. You need to exploit only one of them to get to your target. If you managed to upload a shell to one of these websites, you can be 80% sure that you got your target, of course if it uses a SQL Database (Uses every Forum, Blog and other CMS's.)

After you uploaded a shell, upload this great php script coded by the UrduHack Team called 'symlink_urduhack.php' Download here. It creates a symlink to your target website. Read more about symlink here.

So you need to know what CMS your target is running and you need to know where the config file is located. For example in MyBB it is located in 'inc/config.php', in vBulletin it is located in 'includes/config.php'. In the uploaded shell (not on your target host, on the website you did it) run a command: cat /etc/passwd

This Unix command will display you the contents of the passwd file located in the etc folder. That means, every user on the system. If your target's website is 'forumpowered.com' (example) you need to search in the /etc/passwd file something with 'forum' or 'forumpow'. If you find something like this, you can be sure it is your target. Use CTRL+F for fast search.

Once you found it, go to the shell home (to the directory where the shell was uploaded) and look for the path in the top. It will be something like this: /home/[namehere]/public_html/. Copy it to notepad, and replace your username with your targets one, 'forumpow' (example). Open the uploaded file 'symlink_urduhack.php' in your browser and paste there the path from notepad. It will create a symlink to the target website. Click the symlink0 hyperlink. If everything worked fine, you will be able to see all files on the target site. (Even read). But it does not work always, so let's create a direct symlink to the configuration file, so you can connect to the database and read the contents.

Let's imagine, the target forum is running vBulletin and you need to get the content of the config files. You would enter this: /home/forumpow/public_html/includes/config.php. Would create a direct symlink to this file. Now you can use your SQL Manager on your shell to connect to the database.

Now, maybe the most hard part is decrypting the passwords... You can follow this tutorial or you can simply update the password and salt with already cracked ones and login with it.

19 comments:

  1. Can you please give a video tutorial to hack wizard101.com
    Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please Please
    Just send it to my gmail account mangeshv99@gmail.com
    Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou Thankyou

    ReplyDelete
    Replies
    1. ❤Hackersconect❤


      I am frank Costello!


      One of the top agent in hackersconect.

      We usually don't give advert as our website is in serious upgrade so most of you that are having issues signing up for a hacker and haven't gotten a response from our site you can always mail us for continuity of you job taken or job deals.


      We take jobs of all kinds!!



      Very important question you ask yourself when you need a hacker.


      "Does this hacker own a website??


      If they do, fine you good to go.

      But do not message any hacker who don't or can't even provide you a website at least to be sure they are real,


      BE WISE!!



      ❤ OUR TARGET FOR YOU ❤

      Are:



      1:to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.


      2: to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!


      Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.


      We are real and currently of serious upgrade like I

      Said,

      Check on our website for viewing as to be sure and certain that we are real,


      http://hackersconnect.com


      For those who are having issues understanding the site you can easily mail us through;


      ❤ Hackersconect@gmail.com.


      We only have one email.


      We are legion of good hackers!

      Delete
  2. Can you please give me video tutorial just send me on gmail npankaj096@gmail.com

    ReplyDelete
  3. Please send me a tutorial on ahmadhaseeb31@gmail.com

    ReplyDelete
  4. Could you please send me a tutorial on harshil.bisht@rediffmail.com

    ReplyDelete
  5. This comment has been removed by the author.

    ReplyDelete
  6. Can you please send me a video tutorial?..thanks..my email is osborndushie@gmail.com

    ReplyDelete
  7. Can you please send me a video tutorial?..thanks..my email is adefri2016@gmail.com

    ReplyDelete
  8. Hello. Are you in need of a Hacker .I recommend (Worldcyberhackers@gmail.com) via Email. I have used them and they are the best. They render services such as:

    -Facebook hack 
    -Gmail hack
    -Twitter hack
    -WhatsApp hack
    -Mobile phone hack
    -Database Hack
    -Retrival of lost files
    -Viber hack 
    -Untraceable IP 
    -University grades changing 
    -Bank account hack 
    -Bypassing of Icloud 
    -Verified Paypal account.

    They are reliable, contact them via Email(WORLDCYBERHACKERS@GMAIL.COM)

    ReplyDelete
  9. I sincerely didn't like the idea, but this is my way of saying thank
    you to the Quora user that recommended a hacker establishedhacker@gmail.com
    I hired him for a very private and difficult matter of helping me hack
    a my spouse's phone and social networks and some other personal stuffs
    and he far exceeded my expectations. which Jeremie, helped me get the
    info(whats-app, Facebook, text messages, call logs etc) faster and
    cheaper than I had imagined. The first time we spoke, we had a very
    long phone consultation in he gave me all my options that he could
    think of to resolve my case, and he even recommended I try other
    options before hiring him, which shows that he is honest. I decided to
    hire him and I am glad I did. he is a fantastic investigator and a
    great person. If you need a professional, reliable and efficient
    hacker, then you should contact this guy ;establishedhacker@gmail.com
    You could text them on +18722215721.

    ReplyDelete

  10. ★ HACKING is a broad term Engagement.
    It depends on what you want to hack. Mobile device,PC or Website, emails etc
    I will brief you through the process of hacking and securing Website since most of the Hackers are after it. All the startup owners or aspirants should know.
    In order to hack you need Information hell of alot.📂📔📗📘📖

    Wanna hack website Or A Database ?

    • You need to get it’s Ip addresses, Open Ports,file transfer medium (FTP or SSH),Email addresses,Detecting Insecure code(SQLi & SSH),System architecture ( 64 bit, 32 bit).🔍🔍

    • Ok so why do we need these informations???❓❓❓

    • Open Ports : If there is an open port that means website is ready to listen to connection . Take example of FTP open ports. If it’s open then it can be bruteforced ).🔆🔆

    • Tip: Use SSH instead of ftp, it’s secure and encrypted mean when you send files over SSH first thing it does is encrypts your files So even if hacker gain access to your files they will see encrypted files not plain texts.✅✅

    • Emails? Email is needed for social engineering. With just a one click a backdoor will be installed in your system/browser. There is incredibly powerful software for exploiting that is BEEF pre-installed in kali All you need is to do is send hook.js file to your victim and trick him to click(Which is easy) and BAM start doing evil things.⏯⏯

    • Tip : if you type whois http://yourdomain.com in Linux you will find details like Domain registrar email address,phone number his address etc . So when you register your domain and purchase hosting do buy icann protection with it, it does not cost that much. in this way you will be able to protect your info.

    • Detecting SQLi vulnerability is easy just write single inverted comma after url php?id=1 Like php?id=1′ if it returns an error .Then It’s ready to be hacked.

    • TIP Use PDO instead of Mysqli or Mysql. If you are not familiar with PDO(can also be used with MYSQLi) then make sure you use htmlspecialchars and htmlentities. Example: Lets say you are getting value from browser. Do below thing to make your code secure
    if(isset($_POST[“Name”])
    {
    $name=htmlentities($_POST[“Name”]);
    }

    This is the least you can do to protect yourself from hackers agianst SQLi.

    Sorry i cant go into details here.😷😷

    Kindly Contact Us For More Details And For ALL Kinds Of Hacking services you desire via Compositehacks @ gmail . com 👌🏽👌🏽

    However Let Me Quickly Brief You About My Team:

    • COMPOSITE HACKS is a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) whose system is a very strong and decentralized command structure that operates on ideas and directives.✅✅✅

    ★ COMPOSITE HACKS offers BEST quality professional hacking services that can't be matched with other hacker for hire company. Our professional hackers have most advanced hacking technique to hack Facebook, Twitter, Instagram, Email accounts, SmartPhone, Website, Database and many more. Also you can request for customized hack. These days hiring a Legit hacker is difficult. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scammers that are advertising false professional hacking services.❌❌❌❌

    * What Exactly is your Desire? Have you been hacked? Need to recover your deleted Files or your stolen password? You Wanna Clear Your Criminal Records? Want to monitor your kids,wife/husband,girlfriend/boyfriend by Hacking into their mobile phones? Even something to do with Database ? Hundreds to a large number of individuals have their phones, social media account, email accounts, servers, and PCs hacked consistently. Our professional hackers for hire team is highly qualified and can hack anything without notifying the Target ‼️

    ★ Contact Us For Your Desired Hacking Services Via : compositehacks @ gmail . com

    * You Can Also Check Our Blog For Helpful Tips: www.compositehacks.blogspot.com ‼️

    ★We Treat Every Request With Utmost Confidentiality★ 🙌🏽

    ReplyDelete
  11. Hello everyone! i want to publicly appreciate the effort of spytechenterprise@ gmail.com for helping me hack my partner’s
    phone without access to the phone and my partner did not figure or suspect anything, he his also reliable with all social media account hack such as facebook and lots morei want to recommend him for you all,
    he is fast and highly reliable…He would be willing to help you….or call +1 315 355 0337 you can contact us on instagram @privatespyhacker

    ReplyDelete
  12. We are a group of professional HACKERS and we offer the best hacking services you can find (for sure!). - Get any password from any E-Mail address. - Get any password from any social network such as Facebook, Instagram or Twitter. - Spy any cell phone (Whatsapp, Messenger, etc). - Change your and improve your college grades. These are just few of our services, but there are much more! Anything you need, we can do it. Visit our webite and learn more about us and our services. Or send us a message and explain us what you need and how can we help you. EMAIL: ETHICALHACKERS009@GMAIL.COM
    WHATSAPP +1 845 643 6145 We are always online. 24 hours a day. Every day. We're waiting for your message!

    ReplyDelete
  13. Beware of scammers i have been scammed 3 times because i was trying to know if my husband was cheating until i met this hacker named; cyberghost475 AT gmail DOT com who helped me hack into my spouse phone for real this great hacker hacked into my spouse whats-app messages,Facebook messages.text messages,call logs,deleted text messages,bitcoin account and many more i was impressed with his job and he brought me results under 24 hours believe me he is real and his services are cheap and affordable.: +1 929 359 3547

    ReplyDelete
  14. I never knew it was possible until a friend of my who is studying computer science in Massachusetts Institute of Technology told me about these Chinese computer geniuses he knew Soft tech geeks. They helped me clone my partner’s phone and I was able to spy on him . Contact them for any tech job@[anonymous00fileshacker@gmail.com

    ReplyDelete
  15. He is no scam,i tested him and he delivered a good job,he helped me settle bank loans,he also helped my son upgrade his scores at high school final year which made him graduate successfully and he gave my son free scholarship into the college,all i had to do was to settle the bills for the tools on the job,i used $500 to get a job of over $50000 done all thanks to brillianthackers800@gmail.com,he saved me from all my troubles,sharing this is how i can show gratitude in return for all he has done for me and my family.

    ReplyDelete
  16. i was lost with no hope for my wife was cheating and had always got away with it because i did not know how or always too scared to pin anything on her. with the help a friend IN PERSON OF PAIGE who recommended me to who help hack her phone, email, chat, sms and expose her for a cheater she is. I just want to say a big thank you to HACKINTECHNOLOGY@GMAIL.COM . am sure someone out there is looking for how to solve his relationship problems, you can also contact him for all sorts of hacking job..he is fast and reliable. you could also text +1 669 225 2253

    ReplyDelete
  17. 🖥️MEET THE PROFESSIONAL HACKERS FOR HIRE
    (THE BIOHACKERS)
    You often wonder what the secret to breakthrough is. We all know information is key. The involvement to convey a profitable information System is the majoy factor of success. It's no denial that Information leads individuals to a prominent encounter. Although, people strive, trying to find that easy life. This isn't more of a technical hustle on a Hackers path. As there are all sorts of hackers out there and the more you learn about them, the more you realize that they are regular people like you.
    Who are the BIOSHACKER?
    The BIOSHACKER is the most iconic and anonymous hacking group. A decentralized hacking group primarily known for DDoS cyber attacks. These attacks are often launched against specified figures like scammer websites, Cheaters Mobile computing gadgets, Etc.
    Various efficient jobs done by the BIOSHACKER will be listed below.
    This Hackers are designed to fix victims cyber problems, Mostly people who are victims of the internet scam by BROKE HACKERS. They are called BROKE HACKERS because They are similar to the incompetent infiltrators but are much smarter. However, they are not smart enough to keep their hard-stolen money away from Cyber securities Hackers such as the BIOHACKERS.
    The BIO-HACKTIVIST Company distinguished itself as a content to render High profile services and rectifying numerous victims financial losses in the Internet Cyber production. It's impossible to underestimate our dexterity to help you resolve your financial situation, relationship issues, and business scam.
    Are you face with Cyber problems such as
    •RECOVERY OF LOST FUNDS (Bitcoins, PayPal, Bank Dept etc)
    This is a strong profile job. I would elaborate more on this at (thebioshacker@gmail.com) The Hacking Company would definitely help you recover every penny you lost to forgeries.This particular Hack comes down to a cognitive computing. Aiming to track scammer's operative SQ-web fund reserve or emails to refund back victims stolen funds.
    •MOBILE PHONE HACK. ( Catching A Cheating spouse): The BIO-Hackers are strictly bent on helping you use a cloning malware to monitor every movements made by the cheater. You will be priviledged to spy on target calls, texts and social media mesaages on your personal mobile phone for concrete evidence.
    •EMAIL HACK:
    NOTE: Most targeted emails hacked by the BIOHACKERS are fraudulent emails.
    • CREDIT SCORE UPGRADE: Upgrading of credit score is done using an Equifax tracking system.
    For more information and help,
    Visit: thebioshacker@gmail.com
    Copyright ©️
    The bios hackers 2020.
    All rights reserved.

    ReplyDelete
  18. Blue Titanium - Titanium Art - TITanium Art
    Blue babylisspro nano titanium hair dryer Titanium. Custom titanium granite countertops designs, titanium bmx frame icons, backgrounds, pictures, soundtracks, and titanium septum jewelry more. titanium wedding ring T-T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.T.

    ReplyDelete