ββFOOTPRINTINGββ
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system
======= @HackWorm =======
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system
======= @HackWorm =======
ββ Footprinting : Google Hacking ββ
Description: we are going to take a look at the Google Hacking Database. Google hacking (sometimes called Google Dorking) allows us to use specific strings to narrow down search results and potentially locate usernames, passwords, and other data. One thing to keep in mind is that Google frequently disables some of these, so the Google Hacking Database site is going to be a great long-term resource of what still works.
Requirements for the lab: Web Browser
Step 1: Open a Web browser
Step 2: Search for Google Hacking Database (https://www.exploit-db.com/google-hackingdatabase/ )
Step 3: Open the site
Step 4: Search for the word Excel in the search box
Step 5: This will show several commands you can use based on the data you are seeking.
Step 6: Open Google search and either type the command or just copy/paste
Description: we are going to take a look at the Google Hacking Database. Google hacking (sometimes called Google Dorking) allows us to use specific strings to narrow down search results and potentially locate usernames, passwords, and other data. One thing to keep in mind is that Google frequently disables some of these, so the Google Hacking Database site is going to be a great long-term resource of what still works.
Requirements for the lab: Web Browser
Step 1: Open a Web browser
Step 2: Search for Google Hacking Database (https://www.exploit-db.com/google-hackingdatabase/ )
Step 3: Open the site
Step 4: Search for the word Excel in the search box
Step 5: This will show several commands you can use based on the data you are seeking.
Step 6: Open Google search and either type the command or just copy/paste
ββ Footprinting : theHarvester ββ
Description: we are going to to use a tool called theHarvester. This tool is useful for gathering information on subdomains, employee names, emails, open ports, and banners. It gathers the information from public sources, like regular search engines and Shodan. You can read more about it here: https://tools.kali.org/information-gathering/theharvester
Requirements for the lab: Kali Linux
Step 1: Launch you Kali machine and login (Username is normally: root and the password is normally: toor )
Step 2: Open a Terminal window
Step 3: At the prompt, type theharvester -h to view the help file for the tool.
Step 4: We are just going to use one of the example statements from the help section. Please type this command: theharvester -d microsoft.com -l 50 -b google -h myresults.html
-d is the domain or company name to search. In this case, we are searching microsoft.com
-l is used to limit the results. In this case, we are limiting to just 50 results.
-b is used to define our data source. In this case, we are just using google.
-h allows us to use the Shodan database to query any discovered hosts.
βββ @HackWorm βββ
Description: we are going to to use a tool called theHarvester. This tool is useful for gathering information on subdomains, employee names, emails, open ports, and banners. It gathers the information from public sources, like regular search engines and Shodan. You can read more about it here: https://tools.kali.org/information-gathering/theharvester
Requirements for the lab: Kali Linux
Step 1: Launch you Kali machine and login (Username is normally: root and the password is normally: toor )
Step 2: Open a Terminal window
Step 3: At the prompt, type theharvester -h to view the help file for the tool.
Step 4: We are just going to use one of the example statements from the help section. Please type this command: theharvester -d microsoft.com -l 50 -b google -h myresults.html
-d is the domain or company name to search. In this case, we are searching microsoft.com
-l is used to limit the results. In this case, we are limiting to just 50 results.
-b is used to define our data source. In this case, we are just using google.
-h allows us to use the Shodan database to query any discovered hosts.
βββ @HackWorm βββ
Kali Linux
theharvester | Kali Linux Tools
theharvester Usage Example
Search from email addresses from a domain (-d kali.org), limiting the results to 500 (-l 500), using DuckDuckGo (-b duckduckgo):
root@kali:~# theHarvester -d kali.org -l 500 -b duckduckgo
***************************************β¦
Search from email addresses from a domain (-d kali.org), limiting the results to 500 (-l 500), using DuckDuckGo (-b duckduckgo):
root@kali:~# theHarvester -d kali.org -l 500 -b duckduckgo
***************************************β¦
[@HackWorm] How To Hack Facebook Account.pdf
578.9 KB
π° Exclusive π°
Find out the exact step by step methods hackers use to hack Facebook & how you can defend yourself.
Find out the exact step by step methods hackers use to hack Facebook & how you can defend yourself.
**Day 2**
π° What is Tor & How to Configure it with Kali Linux π°
π° What is Tor & How to Configure it with Kali Linux π°
Media is too big
VIEW IN TELEGRAM
What is Tor & How to Configure it with Kali Linux
Part 1
Part 1
Media is too big
VIEW IN TELEGRAM
What is Tor & How to Configure it with Kali Linux
Part 2
Part 2
π° Proxychains: π°
are using multiple proxy servers to obscure or hide your original IP.
Terminologies
Proxy: the idea of a proxy, in general, is directing traffic from your system (computer) to another system (computer or server) before reaching the targeted destination.
Proxy Server: is the midpoint between the client/hacker computer (your computer) and the targeted computer or server.
are using multiple proxy servers to obscure or hide your original IP.
Terminologies
Proxy: the idea of a proxy, in general, is directing traffic from your system (computer) to another system (computer or server) before reaching the targeted destination.
Proxy Server: is the midpoint between the client/hacker computer (your computer) and the targeted computer or server.
Media is too big
VIEW IN TELEGRAM
Configure Proxychains in Kali Linux
Part 1
Part 1
Media is too big
VIEW IN TELEGRAM
Configure Proxychains in Kali Linux
Part 2
Part 2
Media is too big
VIEW IN TELEGRAM
Configure Proxychains in Kali Linux
Part 3
Part 3
π° VPNπ°
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
=======================
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
ββ @HackWorm ββ
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
=======================
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
ββ @HackWorm ββ
π° MAC Changer π°
In some situations you need to fake / change / spoof a MAC address of your network interface. macchanger Linux command does this job in no time. With this tool you can change your mac address of any Ethernet network device wired or wireless. Here is a small example:
In some situations you need to fake / change / spoof a MAC address of your network interface. macchanger Linux command does this job in no time. With this tool you can change your mac address of any Ethernet network device wired or wireless. Here is a small example:
Most of you sent me a message regarding the videos to upload on Google Drive
Here is the link π
https://clk.ink/LWoJs0
π° I will daily Upload tutorial on GDrive and on telegram also π°
Here is the link π
https://clk.ink/LWoJs0
π° I will daily Upload tutorial on GDrive and on telegram also π°
π° Knowledge π°
π’ FORMJACKING π’
A type of virtual ATM skimming, the Cyber criminals inject malicious code into retailersβ websites to steal shoppersβ payment card details. An average more than 4800 websites are compromised with formjacking attack in a month.
βFormjacking represents a serious threat for both businesses and consumers,β Greg Clark, CEO of Symantec, said in a statement. βConsumers have no way to know if they are visiting an infected online retailer without using a comprehensive security solution, leaving their valuable personal and financial information vulnerable to potentially devastating identity theft.β
β @HackWorm β
π’ FORMJACKING π’
A type of virtual ATM skimming, the Cyber criminals inject malicious code into retailersβ websites to steal shoppersβ payment card details. An average more than 4800 websites are compromised with formjacking attack in a month.
βFormjacking represents a serious threat for both businesses and consumers,β Greg Clark, CEO of Symantec, said in a statement. βConsumers have no way to know if they are visiting an infected online retailer without using a comprehensive security solution, leaving their valuable personal and financial information vulnerable to potentially devastating identity theft.β
β @HackWorm β
π° Footprinting π°
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.
π° NMap π°
Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.
π° NMap π°
Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.