Attacks on Web servers



• Web Ripping
• Google Hacking
• SQL Injection
• PHP Remote Code Execution
• Cross Site Scripting
• Directory Transversal Attacks


THIS IS FOR EDUCATIONAL PURPOSE ONLY,  I AM NOT RESPONSIBLE FOR ANY  ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY

Web Ripping:
• Web Ripping is finding and extracting pictures and other media files from specified website URLs and save them to your hard drive.
• Web Ripping is the ability to copy the structure of a Web site to a local disk and obtain a complete profile of the site and all its files and links.

• We can use Black Windows Web ripper for web ripping.




Google Hacking:
• As we all know, Google is a Search Engine.
• Google keeps snapshots of pages it has crawled that we can access via the Cached link on the search results page.
• Google hacking involves using Advance Search Operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of Vulnerable Web Applications.
• You can look for the particular File types, Password files and Directories. Even you can find out the IP based CCTV Cameras.


Intitle: Search For the Text In The title of the websites
This Search



This Search will give you the List of all the websites with Title Hacking


This Search will give you the List of all the website link containing the MS Word Document of the name hacking.





SQL Injection:

• A SQL injection attack exploits vulnerabilities in a web server database that allow the attacker to gain access to the database and read, modify, or delete information.
• An example of a SQL injection attack is making the condition true by giving the identical value to a web page. These values can be inserted into a login as follows:
• Login: 1' or '1'='1 and Password= 1' or '1'='1
• Login: 1' or '1'='1';--
• When the Username argument is evaluated, ‘1’=’1’ will assess to TRUE, and an authentic username will be returned. The Systematic Execution of SQL injection is explained in the image below



Input validation on the SQL Injection:

• There are measures that can be applied to mitigate SQL injection attacks.
• Web developer can check whether some suspicious characters are sent from the Login Page like , , ;, -- , etc
• Always store the Passwords in the Database server in the Encrypted Form.
• Use of these practices does not guarantee that SQL injection can be completely eliminated, but they will make it more difficult for Hackers to conduct these attacks.





Input Validation can help prevent :







PHP Injection: Placing PHP backdoors:

This attack provides the means for a Hacker to execute his or her system level code on a target web server. With this capability, an attacker can compromise the web server and access files with the same rights as the server system  software.
• For example, a number of PHP programs contain a vulnerability that could enable the transfer of unchecked user commands to the eval ( ) function.


So what is PHP Eval() function:




PHP Remote code Execution:







How Attackers Hide Them While Attacking:


Proxy Servers
• A Proxy Server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control and caching service.
• Hackers generally use the Proxy server on the Internet to make their Identity invisible to the target.
• So They hide their IP address by using the proxy server and make an anonymous brousing over internet.
• Please See the diagram for better understanding.







Types of Proxy Servers

• Web Proxy
• Anonymous Proxy Server

Web Proxy Server

• A Proxy site is a web page which allows a user to browse other web sites.
• If an Attacker finds that he is blocked from accessing a Website, he will use any of web proxy sites to get bypass the block.




Types of Proxy Servers

• Web Proxy
• Anonymous Proxy Server

Web Proxy Server

• A Proxy site is a web page which allows a user to browse other web sites.
• If an Attacker finds that he is blocked from accessing a Website, he will use any of web proxy sites to get bypass the block.







“Do not use this hack trick in any criminal activities and please do not destroy any ones account
this is for educational purpose only”.


==========    Hacking Don't Need Agreements     ==========
Just Remember One Thing You Don't Need To Seek Anyone's Permission To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
            Thank You for Reading My Post, I Hope It Will Be Useful For You


I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At BhanuHacks@gmail.com


Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Security Analyst, Blogger, Web Developer and a Mechanical Engineer. He Enjoys writing articles, Blogging, Debugging Errors and Capture the Flags. Enjoy Learning; There is Nothing Like Absolute Defeat - Try and try until you Succeed.

No comments:

Post a Comment