Methods of Web Application Information Gathering Process with Example in Cyber Security

Methods of Web Application Information Gathering Process with Example in Cyber Security

Methods of Web Application Information Gathering Process with Example in Cyber Security:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners  And why we  use  ethical hacking  to make  more interactive and  secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of  Ethickal and Cyber Security   in the light of cyberpoint9.com  best Hindi  Short tutorial using simple and best possible example. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How  the  Ethical Hacking works in our today’s Technical Field. This is  the best  tutorial/Study Material  very beneficial for beginners  as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!

                                Web Technologies
—————-
These are the technologies which are there through which we can design the front end of the website.

PHP
ASP
JAVA
HTML
and so on..

Scripting Languages
——————-
Java Script
RUBY
PYTHON
PERL

What is Digital Foot printing and Information Gathering
———————————————-
Information Gathering : Information gathering is process of extracting as much as information about our target or victim. More information we have more easy we can penetrate the target.

Why info gathering is required
—————————–
1. Maximum information about there target maximum reliability in the attack.
2. When we have a structured info plan its easy to attack with more accuracy.

Network Information Gathering
—————————–
Simple Info Gathering
– IP addresses
– MAC address
– Host Name
– Sharing Vulnerability
– Peripheral Devices

Software : Soft-perfect  Network Scanner or Angry IP scanner (Windows)

Requirement : Soft-perfect Network Scanner.

Intelligent Info Gathering: Its a process of gathering information which more deep tech towards the machine or target can be a website can be an network device.

Information we gather in intelligent phase
——————————————-
1. IP Address
2. Operating System
3. Ports (Open Closed Filtered)
4. Services running on each open or filtered port
5. Version of the service running on port

Requirement : nmap and Kali Linux.

Step 1: Open terminal
Step 2: type nmap 192.168.235.188(Your Victim IP)
Step 3: Wait for the scan to complete.

Vmware : Install Mac or Windows

1. Windows 7
2. Kali Linux -> LIVE
3. Windows XP

Web Application Information Gathering
————————————-

Target : snu.edu.in
Name
Date It was Created
Expiry of the domain
Address
Phone Number
Email Address <—- IMP
Registrar Information <– Who registered this domain service.

Example: whois.domaintools.com

Email: abuse@registraradomain
Subject: Report Abuse on Domain ID:1322
Mail Body: Dear Team, as this domain is hosting bad content or data.

Regards
Anonymous

Send

People Information Gathering
—————————-
www.jantakhoj.com

Remote IP Grabbing
——————

Method 1: Via URL
www.whatstheirip.com – Home Work

Method 2: IP Grabbing via image
http://fuglekos.com/ip-grabber


How To Various OS Login Bypassing
——————

Target OS
Windows Platform : Windows XP , WIndows 7 , Windows 8.1 and 10

Linux Platform : Ubuntu 14.5 LTS

Mac OS Platform : L Capital Latest from Apple

How to know or crack Password   in a Mac in 10 Seconds if you have forgotten

Hack A  MacBook Let Us Try

————————-
Step 1: Restart
Step 2: Press Command + R
Step 3: Utilities
Step 4: Open Terminal
Step 5: Type reset password
Step 6: select new password and confirm password
Step 7: Click ok and Cheers!!

Windows 7/8 – Ultimate
———————

Windows hold their password in a file known as Sam ( Security Accounts Manager), having hash in nature with custom AES also from microsoft.

SAM file path : c:/windows/system32/config/sam

What is Online Cracking :

When you change the active system’s password without knowing the current password.

What is Offline Cracking:

 When system is switched off mode and os is not in active state then we have to apply offline cracking.

How to Use Hiren Boot For OS login Bypassing:

HirenBootCD – Disaster Recovery Toolkit
– Active Password Changer

System Hacking:
System Hacking is a technique in which we try to change the traditional behaviour of the OS as per our requirements. Via change in settings, firewalls settings, or bypassing login authentication.

-> Windows Password: Windows holds its login password in a file known as SAM(Security Accounts Manager) which is at path.

c:/windows/system32/config/sam

Online Cracking/Resetting the Password
This we can execute when the  system is in online mode i,e its already logged in. And we try to reset the password of the admin.

Step 1: Right click on my computer and select manage.
Step 2: On left you will see an option known as local users and group expand the + and click on users.
Step 3: Select the admin account or any other account which is password protected and right click.

Offline Cracking / Resetting the password
In this attack we will try to reset the password by resetting the value of SAM file to its origin.

Requirements
————–
Step 1: Download the iso image HirenBootCD :www.hirensbootcd.org/download/

Now See Only!!

To make bootable pendrive : pendrive linux or unetboot
https://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/

Others options
————–
L0phtcrack
Kon-BOot

->  How to Hack  Kali Linux / Ubuntu Password/Or How to Bypass Kali Linux / Ubuntu Without Knowing the Password

Bypassing Login of Kali Linux

Linux :Bypassing Kali Linux Password
Step 1: Select Recovery MODE Press E
Step 2: Change ro to rw and add init=/bin/bash at the end of line and Press F10
Step 3: Reset password by typing password root and press enter.
Step 4: Type new password and restart the system

Bypassing Ubuntu System Password

Step 1: Go to Safe mode
Step 2: Recover Mode
Step 3: Select the second last option from the list i.e SHELL
Step 4: type password root
Step 6: Give the new password and confirm password and restart the machine.
Step 7: Fill the new password and enjoy 🙂


 

Tagged with: , , , , ,
10 comments on “Methods of Web Application Information Gathering Process with Example in Cyber Security
  1. The bingo presupposes utilization of of random number generator for number selection. You can play 3, 10, 52 or
    100 hand to a time. Inside mind mind with the structure is receiving worked on the way to. https://slashdot.org/journal/3199440/what-are-the-well-known-facts-about-ntc33-download

  2. The bingo presupposes utilization of of random number generator for number selection. You can play 3, 10, 52 or 100 hand to a time.
    Inside mind mind with the structure is receiving worked on the way to. https://slashdot.org/journal/3199440/what-are-the-well-known-facts-about-ntc33-download

  3. So I think for the seo work we have to go with good post.
    The online blogging industry has grown by extreme measures in then everything else decade.
    Link exchanging with other blogs have got in pertaining to market as
    yours. http://www.opmservices.com/__media__/js/netsoltrademark.php?d=jom.fun

  4. Trish Goff says:

    Invite You to Review Our Product

    Hi,
     
    My name is Trish from the American Beauty Association.

    I’m reaching out to you because we are looking for beauty enthusiasts like you to test product. Would you be willing to test the Mieoko Flat Top Brush?

    You can visit https://www.centtip.com/perfect-skin/ if you are interested.

    Thanks for your time,

    Trish

  5. I found your blog web site on google and verify a few of your early posts. Proceed to maintain up the very good operate. I simply further up your RSS feed to my MSN News Reader. In search of forward to reading more from you afterward!…

  6. Joey Addicks says:

    A formidable share, I just given this onto a colleague who was doing a little bit evaluation on this. And he in reality purchased me breakfast as a result of I found it for him.. smile. So let me reword that: Thnx for the deal with! But yeah Thnkx for spending the time to discuss this, I really feel strongly about it and love reading extra on this topic. If attainable, as you change into experience, would you thoughts updating your blog with extra particulars? It’s extremely useful for me. Huge thumb up for this weblog publish!

  7. john Darer says:

    Spot on with this write-uρ, I really feel this site needs far more attention. I’ll probably be returning to read through
    more, thanks foг the informаti᧐n!

  8. Good – I should certainly pronounce, impressed with your website. I had no trouble navigating through all tabs as well as related information ended up being truly easy to do to access. I recently found what I hoped for before you know it at all. Quite unusual. Is likely to appreciate it for those who add forums or something, site theme . a tones way for your customer to communicate. Excellent task.

  9. MaureenBig says:

    Hello. I have checked your cyberpoint9.com and i see you’ve got some duplicate content so probably it is the
    reason that you don’t rank high in google. But you can fix this
    issue fast. There is a tool that generates articles like human, just search in google:
    miftolo’s tools

Leave a Reply

Your email address will not be published. Required fields are marked *

*