Group Assignment by Wakuma Tasisa and Gizework
Group Assignment by Wakuma Tasisa and Gizework
Group Assignment by Wakuma Tasisa and Gizework
GROUP ASSIGNMEMT
BY:
NAME IDNO
1. WAKUMA GELANA…………………….……….IT-PGR/015/14
2. TASISA NIGUSSIE…………………………….…IT-PGR/014/1
3. GIZEWORK MOGES…………………………..………………..IT-PGR/004/14
Page | i
NMAP and ZenMAP
NMAP and ZenMAP are useful tools for the scanning phase of Ethical Hacking in Kali Linux.
NMAP and ZenMAP are practically the same tool, however NMAP uses command line while
ZenMAP has a GUI.
To open, go to application 01-information gathering nmap or zenmap
Scanning single IP using nmap 10.9.37.125
Page | 1
dnsenum
To open, go to application 01-information gathering DNS Analysis dnsenum
Page | 2
Page | 3
dnsmap
To open, go to application 01-information gathering DNS Analysis dnsmap
Page | 4
Port scan
To open, go to application 01-information gathering Port scan
Page | 5
Page | 6
Page | 7
Page | 8
Nikto
To open, go to application 02-vulnerability analysis nikto
Page | 9
metasploit
Exploitation Tools Using Metasploit
Metasploit is a product of Rapid7 and most of the resources can be found on their web
page www.metasploit.com. It is available in two versions - commercial and free edition. The
differences between these two versions is not much hence, in this case we will be using the
Community version (free).
To open the Metasploit, go to Applications → Exploitation Tools → Metasploit.
Page | 10
Page | 11
Page | 12
Page | 13
Page | 14
SQL Injection
SQL Injection on a Live Website Using Sql map
Page | 15
Page | 16
Page | 17
Page | 18
Page | 19
Page | 20
Social engineer for phishing toolkit
The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed
for social engineering. SET has a number of custom attack vectors that allow you to make a
believable attack in a fraction of time. These kinds of tools use human behaviors to trick them to
the attack vectors.
Step 1 − To open SET, go to Applications → Social Engineering Tools → Click “SET” Social
Engineering Tool.
Page | 21
Page | 22
Page | 23
Page | 24
Denial of Service (DOS) Attacks using wireshark
Page | 25
Page | 26
Burpsuite password attack
Burpsuite can be used as a sniffing tool between your browser and the webservers
to find the parameters that the web application uses.
To open Burpsuite, go to Applications → Web Application Analysis → Burpsuite.
Page | 27
Page | 28
Page | 29
Page | 30
Page | 31
Page | 32
Page | 33
Page | 34
Page | 35
Page | 36
Reverse engineering using dex2jar
To open it, go to Applications → Reverse Engineering → dex2jar
Page | 37
Page | 38
Page | 39
Page | 40
Page | 41
Page | 42
MITM (Man in the Middle) Attack using Bettercap
Page | 43
Page | 44
Page | 45
Page | 46
Password attacks John the Ripper
To open it, go to Applications → Password Attacks → John the Ripper
Page | 47
Password attacks using cewl
To open it, go to Applications → Password Attacks → Cewl
Page | 48
Cain and Abel Gathering Hashes
Page | 49
Page | 50
Page | 51
Spoofing
Page | 52
Page | 53
Page | 54
Maintaining Access Tools
Or
Page | 55
Page | 56
Page | 57
Forensic Analysis with Autopsy
Page | 58
Page | 59
Page | 60
Page | 61
Page | 62
Page | 63
Gmail id sniffing and spoof
Page | 64
Page | 65
Or hack other person Gmail account
Page | 66
Page | 67
Page | 68