Skip to main content

Posts

Showing posts with the label Vulnerability

Server Rooting With NGROK(Web Hacking) Best Tutorial

SUBSCRIBE LULZSEC INDIA New Security Comes with New vulnerability SERVER ROOTING WITH NGROK 2017 Hie  very welcome to Lulzsec blog  Today we will talk about ROOTING of server using NGROK   ============================================ Dedicated to my indian friends who has problem with rooting the server  Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon , vampire kid and all the supporters of lulzsec india  Lets start ... =========================================== * SEE MY LAST POST ABOUT NGROK THEN CONTINUE WITH THIS POST * Link here    .. For that few things are required  ______________________ | 1) Ngrok                           |  | 2) Netcat                           | | 3) webshell on server     | | 4) Root exploit                 | --------------------------------- We can use any shell , if you dont have one download it from Github , I suggest you t

RAT VULNERABILITIES(Hackers got Hacked)

RAT Vulnerabilities Turn Hackers into Victims A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors. Threat actors using certain Remote Administration Tools (RATs) may find themselves on the receiving end of malware. Newly discovered vulnerabilities in these tools may enable cybercriminals' targets to turn the tables on their attackers and deliver malware. Targeted cyberattacks hit thousands of businesses each year. Oftentimes victims label these threats as "advanced and persistent" to suggest they were inevitable, as though attackers are too sophisticated for defenders to protect themselves. In many cases this is far from the truth, argues Waylon Grange, senior threat researcher at Symantec. Vulnerabilities in multiple hacker tools can be used against threat actors. In looking at APT reports over the years, he says, there is a pattern of common RATS used in multiple campaigns. Frequentl

SMTP over XXE Exploits

hi guys...today m going to tell u xxe vulneribility... h so lets start....... M4X: SMTP OVER XXE::::SENDING EMAILS USING JAVA's XML PARSER I regularly find XML eXternal Entitiy (XXE) vulnerabilities while performing penetration tests. These are particularly often present in Java-based systems, where the default for most XML parsers still is parsing and acting upon inline DTDs, even though I have not seen a single use case where this was really neceassary. While the vulnerability is useful for file disclosures (and Java is nice enough to also provide directory listings) or even process listings (via /proc/pid/cmdline), recently I stumbled over another interesting attack vector when using a Java XML parser. Out of curiosity, I looked at what protocols would be supported in external entities. In addition to the usual such as http and https, Java also supports ftp. The actual connection to the FTP server is implemented in sun.net.ftp.impl.FtpClient. It supports authentica

GOOGLE DORKS FOR LOCAL FILE INCLUSION VULNERABILITY

GOOGLE DORKS FOR LOCAL FILE INCLUSION VULNERABILITY inurl:/view/lang/index.php?page=?page= inurl:/shared/help.php?page= inurl:act= inurl:action= inurl:API_HOME_DIR= inurl:board= inurl:cat= inurl:client_id= inurl:cmd= inurl:cont= inurl:current_frame= inurl:date= inurl:detail= inurl:dir= inurl:display= inurl:download= inurl:f= inurl:file= inurl:fileinclude= inurl:filename= inurl:firm_id= inurl:g= inurl:getdata= inurl:go= inurl:HT= inurl:idd= inurl:inc= inurl:incfile= inurl:incl= inurl:include_file= inurl:include_path= inurl:infile= inurl:info= inurl:ir= inurl:lang= inurl:language= inurl:link= inurl:load= inurl:main= inurl:mainspot= inurl:msg= inurl:num= inurl:openfile= inurl:p= inurl:page= inurl:pagina= inurl:path= inurl:path_to_calendar= inurl:pg= inurl:qry_str= inurl:ruta= inurl:safehtml= inurl:section= inurl:showfile= inurl:side= inurl:site_id= inurl:skin= inurl:static= inurl:str= inurl:strona= inurl:sub= inurl:tresc=

Web Application Vulnerability Scanners free

14 Best Open Source Web Application Vulnerability Scanners In the past, many popular websites have been hacked. Hackers are now active and always try to hack websites and leak data. This is why security testing of web applications is very important. And here comes the role of web application security scanners. Web Application Security Scanner is a software program which performs automatic black box testing on a web application and identifies security vulnerabilities. Scanners do not access the source code, they only perform functional testing and try to find security vulnerabilities. Various paid and free web application vulnerability scanners are available. In this post, we are listing the best free open source web application vulnerability scanners. I am adding the tools in random order. So please do not think it is a ranking of tools. I am only adding open source tools which can be used to find security vulnerabilities in web applications. I am not adding tools to find serve