This is Virus Community

Your Ultimate Tech Destination On My Web.

This is Virus Community

Your Ultimate Gadgets Destination On My Web.

This is Virus Community

Your Ultimate Technology Updates Destination On My Web.

This is Virus Community

Your Ultimate Tech Articles Destination On My Web.

This is Virus Community

Your Ultimate Virus and Malware updates Destination On My Web.

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Monday, 30 July 2018

Google Hacking

Google Queries for Locating Various Web Servers

“Apache/1.3.28 Server at” intitle:index.of
Apache 1.3.2
“Apache/2.0 Server at” intitle:index.of
Apache 2.0
“Apache/* Server at” intitle:index.of
any version of Apache
“Microsoft-IIS/4.0 Server at” intitle:index.of
Microsoft Internet Information Services 4.0
“Microsoft-IIS/5.0 Server at” intitle:index.ofMicrosoft Internet Information Services 5.0
“Microsoft-IIS/6.0 Server at” intitle:index.of
Microsoft Internet Information Services 6.0
“Microsoft-IIS/* Server at” intitle:index.of
any version of Microsoft Internet Information Services
“Oracle HTTP Server/* Server at” intitle:index.of
any version of Oracle HTTP Server
“IBM _ HTTP _ Server/* * Server at” intitle:index.of
any version of IBM HTTP Server
“Netscape/* Server at” intitle:index.of
any version of Netscape Server
“Red Hat Secure/*” intitle:index.of
any version of the Red Hat Secure server
“HP Apache-based Web Server/*” intitle:index.of
any version of the HP server
Queries for discovering standard post-installation
intitle:”Test Page for Apache Installation” “You are free”
Apache 1.2.6
intitle:”Test Page for Apache Installation” “It worked!” “this Web site!”
Apache 1.3.0 – 1.3.9
intitle:”Test Page for Apache Installation” “Seeing this instead”
Apache 1.3.11 – 1.3.33, 2.0
intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!”
Apache SSL/TLS
intitle:”Test Page for the Apache Web Server on Red Hat Linux”
Apache on Red Hat
intitle:”Test Page for the Apache Http Server on Fedora Core”
Apache on Fedora
intitle:”Welcome to Your New Home Page!”
Debian Apache on Debian
intitle:”Welcome to IIS 4.0!”
IIS 4.0
intitle:”Welcome to Windows 2000 Internet Services”
IIS 5.0
intitle:”Welcome to Windows XP Server Internet Services”
IIS 6.0
Querying for application-generated system reports
“Generated by phpSystem”

Operating system type and version, hardware configuration, logged users, open connections, free memory and disk space, mount points
“This summary was generated by wwwstat”
web server statistics, system file structure
“These statistics were produced by getstats”
web server statistics, system file structure
“This report was generated by WebLog”
web server statistics, system file structure
intext:”Tobias Oetiker” “traffic analysis”
systemperformance statistics as MRTG charts, network configuration
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
server version, operating system type, child process list, current connections
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
web server activity, lots of visitor information
intitle:”Multimon UPS status page”
UPS device performance statistics
intitle:”statistics of” “advanced web statistics”
web server statistics, visitor information
intitle:”System Statistics” +”System and Network Information Center”

System performance statistics as MRTG charts, hardware configuration, running services
intitle:”Usage Statistics for” “Generated by Webalizer”
web server statistics, visitor information, system file structure
intitle:”Web Server Statistics for ****”
web server statistics, visitor information
nurl:”/axs/ax-admin.pl” -script
web server statistics, visitor information
inurl:”/cricket/grapher.cgi”
MRTG charts of network interface performance
inurl:server-info “Apache Server Information”
web server version and configuration, operating system type, system file structure
“Output produced by SysWatch *”
operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs.

Dorks for Finding Admin Page


admin1.php
admin1.html
admin2.php
admin2.html
yonetim.php
yonetim.html
yonetici.php
yonetici.html
admin/account.php
admin/account.html
admin/index.php
admin/index.html
admin/login.php
admin/login.html
admin/home.php
admin/controlpanel.html
admin/controlpanel.php
admin.php
admin.html
admin/cp.php
admin/cp.html
cp.php
cp.html
administrator/
administrator/index.html
administrator/index.php
administrator/login.html
administrator/login.php
administrator/account.html
administrator/account.php
administrator.php
administrator.html
login.html
modelsearch/login.php
moderator.php
moderator.html
moderator/login.php
moderator/login.html
moderator/admin.php
moderator/admin.html
account.php
account.html
controlpanel/
controlpanel.php
controlpanel.html
admincontrol.php
admincontrol.html
adminpanel.php
adminpanel.html
admin1.asp
admin2.asp
yonetim.asp
yonetici.asp
admin/account.asp
admin/index.asp
admin/login.asp
admin/home.asp
admin/controlpanel.asp
admin.asp
admin/cp.asp
cp.asp
administrator/index.asp
administrator/login.asp
administrator/account.asp
administrator.asp
login.asp
modelsearch/login.asp
moderator.asp
moderator/login.asp
moderator/admin.asp
account.asp
controlpanel.asp
admincontrol.asp
adminpanel.asp
fileadmin/
fileadmin.php
fileadmin.asp
fileadmin.html
administration/
administration.php
administration.html
sysadmin.php
sysadmin.html
phpmyadmin/
myadmin/
sysadmin.asp
sysadmin/
ur-admin.asp
ur-admin.php
ur-admin.html
ur-admin/
Server.php
Server.html
Server.asp
Server/
wp-admin/
administr8.php
administr8.html
administr8/
administr8.asp
webadmin/
webadmin.php
webadmin.asp
webadmin.html
administratie/
admins/
admins.php
admins.asp
admins.html
administrivia/
Database_Administration/
WebAdmin/
useradmin/
sysadmins/
admin1/
system-administration/
administrators/
pgadmin/
directadmin/
staradmin/
ServerAdministrator/
SysAdmin/
administer/
LiveUser_Admin/
sys-admin/
typo3/
panel/
cpanel/
cPanel/
cpanel_file/
platz_login/
rcLogin/
blogindex/
formslogin/
autologin/
support_login/
meta_login/
manuallogin/
simpleLogin/
loginflat/
utility_login/
showlogin/
memlogin/
members/
login-redirect/
sub-login/
wp-login/
login1/
dir-login/
login_db/
xlogin/
smblogin/
customer_login/
UserLogin/
login-us/
acct_login/
admin_area/
bigadmin/
project-admins/
phppgadmin/
pureadmin/
sql-admin/
openvpnadmin/
wizmysqladmin/
vadmind/
ezsqliteadmin/
hpwebjetadmin/
newsadmin/
adminpro/
Lotus_Domino_Admin/
bbadmin/
vmailadmin/
ccp14admin/
irc-macadmin/
banneradmin/
sshadmin/
phpldapadmin/
macadmin/
administratoraccounts/
admin4_account/
admin4_colon/
radmind-1/
Super-Admin/
AdminTools/
cmsadmin/
phpSQLiteAdmin/
server_admin_small/
database_administration/
system_administration/

Update Important Dorks


Dork: “inurl:dettaglio.php?id=”

Exploit :
www.victim.com/sito/dettaglio.php?id=[SQL]

Example :
http://www.cicloposse.com/dettaglio.php?id=61′

Dork: inurl:prodotto.php?id)

Exploit:
www.victim.com/prodotto.php?id=[SQL]

Example:
http://www.poderimorini.com/en/prodotto.php?id=14′

Sql Injection Dorks


allinurl: \”index php go buy\”
allinurl: \”index.php?go=sell\”
allinurl: \”index php go linkdir\”
allinurl: \”index.php?go=resource_center\”
allinurl: \”resource_center.html\”
allinurl: \”index.php?go=properties\”
allinurl: \”index.php?go=register\”

Error Message Queries

“A syntax error has occurred”filetype:ihtml
Informix database errors, potentially containing function names, filenames, file structure information, pieces of SQL code and passwords

“Access denied for user” “Using password”

authorization errors, potentially containing user names, function names, file structure information and pieces of SQL code

The script whose uid is ” “is not allowed to access”

access-related PHP errors, potentially containing filenames, function names and file structure information

“ORA-00921: unexpected end of SQL command”

Oracle database errors, potentially containing filenames, function names and file structure information

“error found handling the request” cocoon filetype:xml

Cocoon errors, potentially containing Cocoon version information, filenames, function names and file structure information

“Invision Power Board Database Error”

Invision Power Board bulletin board errors, potentially containing function names, filenames, file structure information and piece of SQL code

“Warning: mysql _ query()” “invalid query”

MySQL database errors, potentially containing user names, function names, filenames and file structure information

“Error Message : Error loading required libraries.”

CGI script errors, potentially containing information about operating system and program versions, user names, filenames and file structure information

“#mysql dump” filetype:sql

MySQL database errors, potentially containing information about database structure and contents

Dork for locating passwords

http://*:*@www” site

passwords for site, stored as the string “http://username:password@www…”

filetype:bak inurl:”htaccess|passwd|shadow|ht users”

file backups, potentially containing user names and passwords

filetype:mdb inurl:”account|users|admin|admin istrators|passwd|password”

mdb files, potentially containing password information

intitle:”Index of” pwd.db

pwd.db files, potentially containing user names and encrypted passwords

inurl:admin inurl:backup intitle:index.of

directories whose names contain the words admin and backup

“Index of/” “Parent Directory” “WS _ FTP.ini”

filetype:ini WS _ FTP PWD

WS_FTP configuration files, potentially containing FTP server access passwords

ext:pwd inurl:(service|authors|administrators |users) “# -FrontPage-”

files containing Microsoft FrontPage passwords

filetype:sql (“passwd values ****” | “password values ****” | “pass values ****” )

files containing SQL code and passwords inserted into a database

intitle:index.of trillian.ini

configuration files for the Trillian IM

eggdrop filetype:user

user configuration files for the Eggdrop ircbot

filetype:conf slapd.conf

configuration files for OpenLDAP

inurl:”wvdial.conf” intext:”password”

configuration files for WV Dial

ext:ini eudora.ini

configuration files for the Eudora mail client

filetype:mdb inurl:users.mdb

Microsoft Access files, potentially containing user account information

Searching for personal data and confidential documents

filetype:xls inurl:”email.xls”

email.xls files, potentially containing contact information

“phone * * *” “address *” “e-mail” intitle: “curriculum vitae”

CVs

“not for distribution”

confidential documents containing the confidential clause

buddylist.blt

AIM contacts list

intitle:index.of mystuff.xml

Trillian IM contacts list

filetype:ctt “msn”

MSN contacts list

filetype:QDF

QDF database files for the Quicken financial application

intitle:index.of finances.xls

finances.xls files, potentially containing information on bank accounts, financial summaries and credit card numbers

intitle:”Index Of” -inurl:maillog maillog size

maillog files, potentially containing e-mail

Network Vulnerability Assessment Report”
“Host Vulnerability Summary Report”
filetype:pdf “Assessment Report”
“This file was generated by Nessus”

reports for network security scans, penetration tests etc

Dork for locating network devices

“Copyright (c) Tektronix, Inc.” “printer status”

PhaserLink printers

inurl:”printer/main.html” intext:”settings”

Brother HL printers

intitle:”Dell Laser Printer” ews

Dell printers with EWS technology

intext:centreware inurl:status

Xerox Phaser 4500/6250/8200/8400 printers

inurl:hp/device/this.LCDispatcher

HP printers

intitle:liveapplet inurl:LvAppl

Canon Webview webcams

intitle:”EvoCam” inurl:”webcam.html”

Evocam webcams

inurl:”ViewerFrame?Mode=”

Panasonic Network Camera webcams

(intext:”MOBOTIX M1? | intext:”MOBOTIX M10?) intext:”Open Menu” Shift-Reload

Mobotix webcams

inurl:indexFrame.shtml Axis

Axis webcams

intitle:”my webcamXP server!” inurl:”:8080?

webcams accessible via WebcamXP Server

allintitle:Brains, Corp.

camera webcams accessible via mmEye

intitle:”active webcam page”.

Thursday, 5 July 2018

Airgeddon – A Swiss Army WiFi Hacking Tool


Airgeddon – A Swiss Army WiFi Hacking Tool

Today Virus Community have been looking at Airgeddon, on initial inspection it seems to be a multi purpose all-in-one Swiss army knife tool for hacking WiFi, the tool is pretty extensive, with over 11 thousand lines of bash goodness. This tool is free to download from GitHub and supports multiple Linux based platforms.

So what does it do?

The tool supports multiple methodologies for hacking WiFi, some of which include:
  • WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.)
  • Evil Twin attacks (Rogue AP) with Hostapd + DHCP + DoS + Ettercap + Sslstrip and also BEEF support
  • Multiple WPS cracking modes – Pixie Dust, Bully and Reaver
  • Offline password decryption for WPA/WPA2/WPA3 captured handshakes (dictionary, bruteforce and rule based) based on aircrack, crunch and hashcat tools.

Other features?

Cool!, any Other notable features include:
  • upport for 5GHZ and 2.4GHZ bands
  • Assisted Handshake file capturing
  • Drag and drop files on console window for entering file paths
  • Controlled Exit. Cleaning tasks and temp files. Restoring iptables after an attack that require changes on them. Option to keep monitor mode if desired on exit.

Platforms can it run on?

The tool is compatible on any Linux distribution that has the necessary tools installed needed to run. ideally Kali would be the best candidate for running it out of the box, but it can be run on Arch if you enjoy a challenge, the script will check for any tool dependencies it is missing when first run.

s you might expect with any bash script related tool, it offers intuitive menus and options that could allow even the most harebrained skid a way to easily perform a wide range of Wifi attacks.

Source code?

Source code link attach here you can also download from my private server.

Download from GitHub server
Download from my Private server

Saturday, 17 June 2017

Israeli Spies Hacked ISIS Computers, Exposed Their Plans For “Laptop Bomb”


Israeli Spies Hacked ISIS Computers, Exposed Their Plans For “Laptop Bomb”

Israeli government spies have hacked into the operations of ISIS. The group is inventing a laptop computer bomb that could have blasted the commercial aircraft to the US. However, Israeli cyber researchers have hacked into the operations of ISIS months ago and revealed their plans.


Recently, Israeli government spies have hacked into the operations of ISIS. The group is inventing a laptop computer bomb that could have blasted the commercial aircraft to the US. However, Israeli cyber researchers have hacked into the operations of ISIS months ago and revealed their plans.

Experts David Sanger and Eric Schmitt along with two of the American officials have stated that the process of bomb encryption and protection is what supported them to analyze how such bombs works.

A ban was also executed by the Department of Homeland Security on allowing electronic devices onto aircraft which are larger than the smartphones. The ban was implemented in ten countries in the Middle East and Africa.

After U.S laptop ban, Britain announced a similar prohibition for flights originating from six countries. The reports from The New York Times states that the laptop bomb was developed in such a way that it can cross through airport X-ray machines without detection.

The bomb was intelligently placed in the place of laptop battery which is capable of tricking the X-ray detectors in the airport. The reports also said that Israel had shared this information with U.S. in the past two years. Israel and U.S are working together against cyber terrorism. Most of their cooperating have been against Iran.

President Donald Trump made this information on this bomb attack public, which exposes it to Russia. This event has been the source of a trouble for Israeli officials. Trump had also tweeted that he did share the information with Russia and that he has full right to do so.

Friday, 1 July 2016

Five Common Mistakes That Fresh Hackers Make


Five Common Mistakes That Fresh Hackers Make

Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker.

1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work.

2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these.

3. Don’t use key loggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker.

4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to use software only then you would also be limited by the software’s functionalities.

5. A good hacker is a good programmer, security expert, developer and good script writer. It is usually not the other way around. You must know this for cross site scripting.




So, hacking is not simply about making your way into websites and leaving your mark. You have a great set of talents a can also get the best jobs in the industry.

Tuesday, 17 November 2015

How To Track Who Visited My Facebook Profile?

Find someone’s IP Address

  1. Its easy to do. Just follow these steps and you’ll succeed in finding out who visited your Facebook Profile!
  2. Go To Your Facebook timeline- facebook.com/xyz
  3. Right click on your timeline and hit “View page Source”.
  4. Now, you’ll be redirected to a new page with lots codes.
  5. Hold CTRL+F on your keyboard, a text box appears at the right corner, in that box, type- “InitialChatFriendsList” (Don’t include Quotes)
  6. Next to that word, you’ll see a list of numbers, these are the profile ID’s of people who visit your timeline.
  7. Just go to “facebook.com”  and paste the ID number beside it with a “\” . For example, if the ID is abcd, you have to put it as- facebook.com/abcd.
  8. The first ID shows the one who visits profile more often while the last ID never visits your profile!

Find someone’s IP Address

Find someone’s IP Address


I often see these kinds of messages, someone calling you/your friends “fat” and “racist”? Big deal. It’s the Internet, the most public of public places. It’s completely your fault for adding some “random dude” that you don’t know. You must understand how web applications work. Anyways here’s the way of finding someone’s IP address on Facebook.


Using NETSTAT to find IP address of that User


To do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd)

note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.

When command prompt opens Type the following command and hit Enter.

netstat -an



And you will get all established connections IP addresses there. Note down all the suspicious IP’s


The Next Step is to Trace that user using his IP address.


To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. It will show you the location of the user.

Only works on chrome  


http://www.ip-adress.com/ip_tracer/


It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.

How To Disable/crash/destroy Someone Facebook

How To Disable/crash/destroy Someone Facebook


This is very simple & 101% Working
http://34255353309

Just ask your victim or friend to copy this link & comment it to his profile pictureIf victim do this his id was temporary locked & asking photo verification
It's 101% working method.

don't try this for illegal purposes.