Skip to main content

Posts

Showing posts from April 14, 2017

how to Banner grabbing with netcat

nmap  banner grabing define other tool Welcome back, my greenhorn hackers! For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat , and although well known in hacking circles, it's virtually unknown outside. It's so powerful and useful, that many people within the hacking community refer to it as the "Swiss Army knife of hacking tools." In this tutorial, we'll look at the capabilities of this simple tool and how the aspiring hacker can use it. What Is Netcat, Really? Netcat—like so many hacker tools—was created to be a network analysis tool. Developed by a fellow only known as "Hobbit," he gave away this tool to the IT community without compensation, but has received scores of accolades. Thanks, Hobbit! As such, you can use it to open up TCP and UDP connections between two machines over any port your heart desires. It can als

Banner Grabbing and Port Scanning using Scanline

Hello Friends, In our previous post,we saw how to grab the banner of a  particular port of the target machine using simple TELNET utility. In this tutorial, we are going to use the advanced windows based tool for grabbing the banner. With this tool,we can grab the banners of all the open ports in one stroke! So…The tools works as follows:- 1. Scanline scans our target for all the open ports (TCP as well as UDP). 2. Once all the open ports are identified, it grabs the banner of these individual ports and displays it! Amazing! You can download this tools here: http://b2b-download.mcafee.com/products/tools/foundstone/scanline.zip (google it for latest version) Ok….So…let’s grab the banner of our target! Our target:192.168 1.Extract scanline.zip in ‘C:’ drive or whichever drive you wish to! 2. Open command prompt. 3. Navigate to the directory in which you extracted scanline.zip 4. Type the following command sl  -v -b [your-target-ip-a

HTTP Banner Grabbing using TELNET

Hello Folks, This is a very new post on “Banner Grabbing”.  The idea is…. We will try to grab the banner hosted by the HTTP protocol on target system! Now what do we get??? Let’s see! Step 1: Boot up your kali linux Step 2: Identify the IP address of target machine. (In my case it happens to be 192.168.56.102). Step 3: Invoke your shell( terminal). Step 4:  Type the following command:- telnet  [target-ip address]   [port no]. WELL, since we are doing HTTP banner grabbing, port no is 80 and target IP is 192.168.56.102 (this ip will not work becouce i open this ip for showing this tut now it was close ... and plzz dont try to there ip ..it is iillgel) Let us see what we get:—> Interesting….! Now Vital inference that we can draw from the output of the command is the type of Server that the target machine has. In this case it happens to be MICROSOFT IIS 5.1 server!!! Now if you just search on google what vulnerabilities and exploits does IIS Server 5.1 ha

wifi detail scanning tool for mobile

How to Enable Nvidia NVENC for OBS in Linux

OBS on Linux supports using the Nvidia NVENC for H.264 encoding. To get this working, one must compile ffmpeg wtih nvenc support. Check it out! Requirements: – nvidia proprietary driver installed – kepler or maxwell (or later) nvidia GPU – OBS Studio 0.14 or later Step 1: Grab the nvEncoder header FFmpeg 3.1.3 and later includes this header so one does not need to download any nvenc sdk from nvidia if building FFmpeg 3.1.3+. Otherwise: Download and extract Nvidia nvenc sdk from: https://developer.nvidia.com/nvidia-video-codec-sdk From that download, copy the file /Video_Codec_SDK_7.0.1/Samples/nvEncoder/NvEncoder.h to /usr/local/include Step 2: Download and extract the Nvidia cuda sdk from: https://developer.nvidia.com/cuda-downloads Copy cuda.h to /usr/local/include Step 3: Configure and the install ffmpeg with: --enable-nonfree --enable-nvenc This may vary wildly by distro, or you may have your own preferred way to compile and bui

nmap UDP Port Scan Example

By default nmap performs a TCP scan only. I’ll show you how to scan for UDP ports with nmap! The syntax is $ sudo nmap -sU -p port target Example: $ sudo nmap -sU -p 3478 192.168.1.25 Starting Nmap 6.00 ( http://nmap.org ) at 2012-06-13 20:43 EDT Nmap scan report for example.com (192.168.1.25) Host is up (0.096s latency). PORT STATE SERVICE 3478/udp open|filtered unknown Nmap done: 1 IP address (1 host up) scanned in 1.17 seconds Note that UDP scanning is problematic because of the lack of a confirming SYN-ACK or other packet as with TCP. As such, many false positives can occur from UDP port scan

Network Scanning with HPING3

Network Scanning with HPING3 BELOW are the commands that one can use to scan any network with HPING3 . Bydefault hping3 is loaded with Kali Linux distros. 1) Command to check port no. hping3 -S http://www.neelpathak.in -p 80 -c 2    (SYN Req, -c = count) 2) Command to check series of ports hping3 -S 192.168.1.7 -p ++50 -c 5     (SYN req, starting with port 50 as a destination port, -c = count ) Giving the destination ports if they are open then they will reply on our ports..:P, If the flags we get are RA then the ports are closed. 3) hping3 -1 192.168.1.x –rand-dest -I eth0   (-1 == ICMP service, -I = interface, –rand-dest = Random destination ) To check which hosts have blocked ICMP, if the device replies then the ICMP is not blocked. 4)   hping3 -1 192.168.1.1 –icmp-ts -c 2 (Icmp echo timestamp) 5) hping3 -1 192.168.1.1 –icmp-addr -c 2    (To know the netmask) (Generally no replies will get, as machines are intelligent nowadays \ )

How to Hack CCTV Private Cameras

rock star devil Now a days CCTV cameras are used many place like shops, malls, offices, warehouse etc and more. for security reason and for many more purposes. This articles show you how to hack CCTV cameras. If search on Google for CCTV camera hacking , you will be find tricks for public CCTV camera hacking tricks. But here you will be hack private CCTV cameras . Step 1 Download Angry Ip Scanner Angry Ip scanner is powerful GUI Port scanner . Angry Ip scanner available for all major OS. Download and Install Angry ip scanner Step 2 Choose Ip Address Range Its important that how to choose proper ip address range for CCTV camera hacking. CCTV cameras are connected with broadband internet connection. If your accessing broadband router then find your public ip address. Just type 'My IP' in Google or Bing search bar. Google will show your public ip address Here 77.247.181.165 is my public ip . So ip range can be 77.247.181.1 o 77.247.18

top footprinting tool 2017

tool are recommended by ceh v9 book byrockstardevil