Ethical - Hacking - Lab - Practicals
Ethical - Hacking - Lab - Practicals
Step -:
Step 1: check your IP address(Kali Linux)
Default gateway
Broadcast ip
Command: Setoolkit
Then click on
5) Web Jacking Attack Method
Then on
2) Site Cloner
After this it will ask you for an ip address (put your kali linux
machine ip address)
After this it will ask you to enter the URL of the website you want to
clone.
In this let's clone the facebook website
Paste the url in the set tool kit terminal and it will start cloning it.
Now url has been cloned. you have to send the cloned website
to the victim so that he can click on the link and you will get his
credentials in your Kali Linux.
Once the victim will click on click on the link victim will be
redirected to the login page.
Password:123456
Now go to you Kali Linux and go to the location :
root/.set//reports/2018–12–27 08:03:52.640607.html
Here in this file, you will get all the credentials in clear text.
This is how we can get the credentials of the victim.
Experiment – 4
Step 1: To install the tool first go to the desktop directory and then install the
tool using the following commands.
cd Desktop
git clone git://github.com/htr-tech/zphisher.git
cd zphisher
Step 2: Now you are in zphisher directory , use the following command to run
the tool.
bash zphisher.sh
Step 3: The tool has started running successfully. Now you have to choose the
options from the tool for which you have to make the phishing page.
Step 4: From these options, you can choose the number for which you have to
create a phishing page. Suppose you want to create a phishing page for
Instagram then choose option 2.
Step 5: Now you can see that to attract the victim , it’s giving 4 different web
templates. You can choose any option from here. Suppose you want to choose
the first option then type 1.
You can see the link we have opened is ezlikers. This is the phishing page we
have opened. Now the user has to enter his/her id password.
EXPERIMENT 5
Active reconnaissance using “sam spade” tool.
Step 1:
open same space tool into this on the top left corner there's a
search bar enter domain name .
example -www.oracle.com and then select who is icon.
now all the details of the website will be displayed on the
screen.
Step 2:
now on the same page using the same domain name ( example
www.oracle.com )now click on ping icon .
ping send a series of packet to the indicated host to determine
if that system is reachable via the network and provides an
estimate of the round trip packet time.
Step 3:
on the same page using same domain name ( for example
www.oracle.com) and click on trace route icon.
Traceroute choose the route packets taken from the host to the
hosts you are looking at.
Step 4:
on the same page using same domain name ( www.oracle.com ) and click on web icon .
z
EXPERIMENT 6
Performing password cracking using john-the-ripper tool.
Step 1:
install join the report tools using the get up cloning technique
step 2:
step 3:
now create a zip of the creative text file and set password in it.
Step 4:
now find the hash value of the zip file created above and run zip2john command.c
step 5:
now copy the hash value of the zip file to a new text file .
step 6:
this command will break the password and will displayed that password.
EXPERIMENT 7
Performing sqlmap tool to access database and tables.
step 1:
open browser and search for a website ( example- vulnweb.com) and then copy the link of that
website .
site: URL_copied/artist.php?artist=1
step 2:
this will fetch and then display all the database presented in that site.
Step 3:
now type
now type
this will display all the columns present in users table of accuard database.
Step 5:
now type
this will show data of pass column of users table in acuart database.
now type
this will show data of uname column of users table in acuart database.
In this way we got the user name from the users table.
Step 7:
now open browser and type URL of website on which you performed sqlmap attack and then login
into that page using credentials you got by using SQL map attack.