Clickbank Products

Wednesday, May 31, 2023

CEH: Gathering Host And Network Information | Scanning

Scanning

It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed.
During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.

Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.

Types Of Scanning 

Network Scanning Identifies IP addresses on a given network or subnet
Port Scanning Determines open, close, filtered and unfiltered ports and services
Vulnerability Scanner Detect the vulnerability on the target system

Port Scanning ​

Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:
  • Well-Known Ports: 0-1023
  • Registered Ports: 1024-49151
  • Dynamic Ports: 49152-6553

Network Scanning

Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.

Vulnerability Scanning

This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.

The CEH Scanning Methodology

As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.



More articles
  1. Hack Tools For Windows
  2. Hacking Tools Mac
  3. Pentest Tools Bluekeep
  4. Hack Tools
  5. Best Hacking Tools 2020
  6. Hacker Hardware Tools
  7. Hack Tools Online
  8. Pentest Tools Alternative
  9. Pentest Tools Tcp Port Scanner
  10. Hacker Tools List
  11. Tools For Hacker
  12. Pentest Tools Android
  13. Hacker Tools Linux
  14. Hacking Tools Free Download
  15. Hacking Tools For Pc
  16. Pentest Tools Windows
  17. Hacking Tools Windows 10
  18. Bluetooth Hacking Tools Kali
  19. Hack Tools
  20. Termux Hacking Tools 2019
  21. Hacks And Tools
  22. Top Pentest Tools
  23. Hacker Tools 2019
  24. Best Hacking Tools 2020
  25. Hacker Techniques Tools And Incident Handling
  26. Hacking Tools 2020
  27. Hacker Tools Windows
  28. Pentest Tools Framework
  29. Pentest Reporting Tools
  30. Hacking Tools Software
  31. Hacking Tools 2019
  32. Hack Tool Apk No Root
  33. Bluetooth Hacking Tools Kali
  34. Hacker Tools Linux
  35. Easy Hack Tools
  36. Kik Hack Tools
  37. Pentest Tools For Android
  38. Hacker Tools Free
  39. Pentest Tools Subdomain
  40. Pentest Tools
  41. Computer Hacker
  42. Hacking Tools Online
  43. Tools 4 Hack
  44. Nsa Hack Tools
  45. Easy Hack Tools
  46. Hacking Tools Usb
  47. Pentest Tools Download
  48. Hack Tools Mac
  49. Pentest Tools Alternative
  50. Hacker Hardware Tools
  51. Pentest Tools For Windows
  52. Pentest Tools Subdomain
  53. Pentest Tools Nmap
  54. Hacker Tool Kit
  55. Free Pentest Tools For Windows
  56. Pentest Tools Alternative
  57. Pentest Reporting Tools
  58. Pentest Tools Tcp Port Scanner
  59. Physical Pentest Tools
  60. Hacker Tools
  61. Pentest Tools Bluekeep
  62. Hacking Tools Mac
  63. Hacker Tools For Ios
  64. Hacking Tools Kit
  65. Hackrf Tools
  66. Hacker Search Tools
  67. Nsa Hack Tools
  68. Nsa Hacker Tools
  69. Best Hacking Tools 2019
  70. Hacking Tools Pc
  71. Pentest Tools Find Subdomains
  72. Hacker Tools Free
  73. Hacker Search Tools
  74. Hacking Tools Windows
  75. Hacker Tools Windows
  76. Pentest Tools For Mac
  77. Hack Rom Tools
  78. Hacking Tools
  79. Hackrf Tools
  80. New Hacker Tools
  81. Hack Tools For Mac
  82. Hacking Tools For Beginners
  83. Hackrf Tools
  84. Hacker Tools 2020
  85. Pentest Tools Nmap
  86. Hackers Toolbox
  87. Pentest Tools Apk
  88. Hack Tools Download
  89. Hacker Tools Github
  90. Hack Tools Download
  91. Physical Pentest Tools
  92. Hacking Tools Github
  93. Hack Tools For Windows
  94. Hacking Tools Mac
  95. Hacking Tools Free Download
  96. Hacking Tools For Games
  97. Pentest Tools Tcp Port Scanner
  98. Best Pentesting Tools 2018
  99. Hacker Tools Apk Download
  100. Pentest Tools Linux
  101. Hacker Tools Linux
  102. Black Hat Hacker Tools
  103. Hack Tool Apk
  104. Hacking Tools Kit
  105. New Hack Tools
  106. Tools Used For Hacking
  107. Hack Tool Apk No Root
  108. Blackhat Hacker Tools
  109. Hacking Tools Github
  110. Hacker Tools Online
  111. Hacker Tools List
  112. Hacker
  113. Kik Hack Tools
  114. Hacker Search Tools
  115. Github Hacking Tools
  116. Hacking Tools 2019
  117. Pentest Tools Github

HOW TO HACK WHATSAPP ACCOUNT? – WHATSAPP HACK

In the last article, I have discussed a method on WhatsApp hack using SpyStealth Premium App. Today I am gonna show you an advanced method to hack WhatsApp account by mac spoofing. It's a bit more complicated than the last method discussed and requires proper attention. It involves the spoofing of the mac address of the target device. Let's move on how to perform the attack.

SO, HOW TO HACK WHATSAPP ACCOUNT?                                                          

STEP TO FOLLOW FOR WHATSAPP HACK

Here I will show you complete tutorial step by step of hacking WhatsApp account. Just understand each step carefully so this WhatsApp hack could work great.
  1. Find out the victim's phone and note down it's Mac address. To get the mac address in Android devices, go to Settings > About Phone > Status > Wifi Mac address. And here you'll see the mac address. Just write it somewhere. We'll use it in the upcoming steps.
  2. As you get the target's mac address, you have to change your phone's mac address with the target's mac address. Perform the steps mentioned in this article on how to spoof mac address in android phones.
  3. Now install WhatsApp on your phone and use victim's number while you're creating an account. It'll send a verification code to victim's phone. Just grab the code and enter it here.
  4. Once you do that, it'll set all and you'll get all chats and messages which victims sends or receives.
This method is really a good one but a little difficult for the non-technical users. Only use this method if you're technical skills and have time to perform every step carefully. Otherwise, you can hack WhatsApp account using Spying app.
If you want to know how to be on the safer edge from WhatsApp hack, you can follow this article how to protect WhatsApp from being hacked.

Related word


OWASP API Security Project Media Coverage



A list of must read articles on OWASP API Security Project

More info


Tuesday, May 30, 2023

Linux Command Line Hackery Series - Part 4




Welcome back to Linux Command Line Hackery, hope you have enjoyed this series so far. Today we are going to learn new Linux commands and get comfortable with reading text files on Linux.

Suppose that you wanted to view your /etc/passwd file. How will you do that? From what we have learned so far what you'll do is type:

cat /etc/passwd

And there you go, but really did you see all the output in one terminal? No, you just ended up with last few lines and you'll have to cheat (i,e use graphical scroll bar) in order to see all the contents of /etc/passwd file. So is there a command line tool in linux with which we can see all the contents of a file easily without cheating? Yes, there are actually a few of them and in this article we'll look at some common ones.

Command: more
Syntax:  more [options] file...
Function: more is a filter for paging through text one screenful at a time. With more we can parse a file one terminal at a time or line by line. We can also go backward and forward a number of lines using more.

So if we're to use more on /etc/passwd file how will we do that? We'll simply type

more /etc/passwd

now we'll get a screenful output of the file and have a prompt at the bottom of terminal. In order to move forward one line at a time press <Enter Key>. Using enter we can scroll through the file one line at a time. If you want to move one screen at a time, you can press <Space Key> to move one screen at a time. There are more functions of more program, you can know about them by pressing <h key>. To exit out of more program simply type <q key> and you'll get out of more program.

Command: less
Syntax: less [options] file...
Function: less is similar to more but less has more functionality than more. less is particularly useful when reading large files as less does not have to read the entire input file before starting, so it starts up quickly than many other editors.

less command is based on more so what you've done above with more can be done with less as well. Try it out yourself.

Command: head
Syntax: head [OPTION]... [FILE]...
Function: head command prints the head or first part of a file. By default head prints out first 10 lines of a file. If more than one file is specified, head prints first 10 lines of all files as a default behavior.

If we want to see only first 10 lines of /etc/passwd we can type:

head /etc/passwd

We can also specify to head how many lines we want to view by using the -n flag. Suppose you want to see first 15 lines of /etc/passwd file you've to type:

head -n 15 /etc/passwd

Ok you can view the first lines of a file what about last lines, is there a tool for that also? Exactly that's what our next command will be about.

Command: tail
Syntax: tail [OPTION]... [FILE]...
Function: tail is opposite of head. It prints the last 10 lines of a file by default. And if more than one file is specified, tail prints last 10 lines of all files by default.

To view last 10 lines of /etc/passwd file you'll type:

tail /etc/passwd

and as is the case with head -n flag can be used to specify the number of lines

tail -n 15 /etc/passwd

Now one more thing that we're going to learn today is grep.

Command: grep
Syntax: grep [OPTIONS] PATTERN [FILE...]
Function: grep is used to search a file for lines matching the pattern specified in the command.

A PATTERN can simply be a word like "hello" or it can be a regular expression (in geek speak regex). If you aren't familiar with regex, it's ok we'll not dive into that it's a very big topic but if you want to learn about it I'll add a link at the end of this article that will help you get started with regex.

Now back to grep say we want to find a line in /etc/passwd file which contains my user if we'll simply type:

grep myusername /etc/passwd

Wohoo! It gives out just that data that we're looking for. Remember here myusername is your username.
One cool flag of grep is -v which is used to look in file for every line except the line containing the PATTERN specified after -v [it's lowercase v].

Take your time practicing with these commands especially grep and more. We'll learn a lot more about grep in other upcoming articles.

References:
https://en.wikipedia.org/wiki/Regular_expression
http://www.regular-expressions.info/
Awesome website to learn Regular expressions - http://www.regexr.com/
More info