Ethical Hacking Journal
Ethical Hacking Journal
Dhuri
CERTIFICATE
1
Ethical Hacking
Abhishek Sem III
Dhuri
INDEX
Sr.
Practical Name Date Signature
No.
1 BASIC COMMANDS
6 SQL INJECTION
2
Ethical Hacking
Abhishek Sem III
Dhuri
1. Basic Commands
-ipconfig-
-ping
-tracert
3
Ethical Hacking
Abhishek Sem III
Dhuri
WEBSITE INFORMATION
Website foot printing is the technique which is used to extract the details
related to website. When we are browsing any website or any target
website, we may provide this information
When hacker or any user wants to archived website or history of website,
they can use www.archieve .org
Step 1: Type www.archieve.org in Google
Step 3: You can enter Domain name in the search box.
Step 5: For how the website was looking and are the pages are present on
that website with different dates.
4
Ethical Hacking
Abhishek Sem III
Dhuri
NS Lookup:
Step 1: Type nslookup command in cmd
5
Ethical Hacking
Abhishek Sem III
Dhuri
Nmap Tool: Nmap is a free, open source and multi-platform network security scanner used
for network discovery and security auditing. Nmap can be extremely useful for helping you
get to the root of the problem you are investigating, verify firewall rules or validate your
routing tables are configured correctly.
6
Ethical Hacking
Abhishek Sem III
Dhuri
Host Scan
Syntax:nmap -sP <target IP Range>
If you see anything unusual in this list, you can then run a DNS query on a
specific host, by using
Syntax: namp -sL <IP Address>
UDP Scan
syntax: nmap -sU <target>
7
Ethical Hacking
Abhishek Sem III
Dhuri
OS Detection Scan
Syntax: nmap -O <target>
Version Scan
syntax: nmap -sV <target>
Protocol Scan
syntax: nmap -sO <target>
Snort:
Snort is a free open-source network intrusion detection system (NIDS) and
intrusion prevention system (IPS). Snort IPS uses a series of rules that
help define malicious network activity and uses those rules to find packets
that match against them and generates alerts for users.
8
Ethical Hacking
Abhishek Sem III
Dhuri
Once you press enter after writing the command you will start receiving
packet information as shown below:-
9
Ethical Hacking
Abhishek Sem III
Dhuri
The following command runs Snort as a packet sniffer with the verbose
switch, outputting TCP/IP packet headers to the screen. Press Ctrl+C keys
to stop the output. Snort/WinPcap summarizes its activities, as shown in
the following screenshot.
Command: Snort -v -i3
After pressing ctrl +c Key you will get the report as follows:
1
Ethical Hacking 0
Abhishek Sem III
● HTTP
● SMTP
● NNTP
● POP
● FTP
● IMAP
The above protocols are vulnerable if login details are sent in plain text
1) Wireshark userinterface:
Once you doble click on the inface you will start getting packet detail
entering and leaving the network as shown below:
4) Filtering Packets:
10
Ethical Hacking
Abhishek Sem III
11
Ethical Hacking
Abhishek Sem III
Step 2:
∙ Click Encrypt/Decrypt Tab
∙ Select Symmetric (Modern)
∙ Using RC4.
12
Ethical Hacking
Abhishek Sem III
3:- Enter the password to convert into hash Paste the value into the field you have converted
e.g(MD5)
4:- Right Click on the hash and select the dictionary attack.
13
Ethical Hacking
Abhishek Sem III
5:- Then right click on the file and select (Add to List) and then select the Wordlist
6:- Select all the options and start the dictionary attack
14
Ethical Hacking
Abhishek Sem III
15
Ethical Hacking
Abhishek Sem III
Hacking a website by Remote File Inclusion, Disguise as Google Bot to view hidden content
of a website, to use Kaspersky for Lifetime without Patch
File inclusion attack simulation using dvwa, lamp stack in debian 11.
16
Ethical Hacking
Abhishek Sem III
17
Ethical Hacking
Abhishek Sem III
6. SQL INJECTION
SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute
malicious SQL statements. These statements control a database server behind a web
application. Attackers can use SQL Injection vulnerabilities to bypass application security
measures.
SQL Injection Attack Performed
SQL is a query language that was designed to manage data stored in
relational databases. You can use it to access, modify, and delete data.
Many web applications and websites store all the data in SQL databases.
Successful SQL Injection attack can have very serious consequences.
❖ Attackers can use SQL Injections to find the credentials of other users in the database.
❖ An SQL Injection vulnerability could allow the attacker to gain complete access to all data
in a database server.
❖ An attacker could use SQL Injection to alter balances, void transactions, or transfer money
to their account.
❖ Attacker can delete records from a database or even drop tables.
❖ An attacker could use an SQL Injection as the initial vector and then attack the internal
network behind a firewall.
SQL Injection can be classified into three major categories –
1. In-band SQLi (Classic SQLi)
In-band SQL Injection occurs when an attacker is able to use the same communication
channel to both launch the attack and gather results. The two most common types of in-band
SQL Injection are
2. Inferential SQLi (Blind SQLi)
Inferential SQL Injection, unlike in-band SQLi, may take longer for an attacker to exploit,
however, it is just as dangerous as any other form of SQL Injection. In an inferential SQLi
attack, no data is actually transferred via the web application and the attacker would not be
able to see the result of an attack in-band (which is why such attacks are commonly referred
to as “blind SQL Injection attacks”). Instead, an attacker is able to reconstruct the database
structure by sending payloads, observing the web application’s response and the resulting
behavior of the database server.
3. Out-of-band SQLi
Out-of-band SQL Injection occurs when an attacker is unable to use the same channel to
launch the attack and gather results. Out-of-band techniques, offer an attacker an alternative
to inferential time-based techniques, especially if the server responses are not very stable
(making an inferential time-based attack unreliable).
18
Ethical Hacking
Abhishek Sem III
19
Ethical Hacking
Abhishek Sem III
Dhuri
20
Ethical Hacking
Abhishek Sem III
21
Ethical Hacking
Abhishek Sem III
Output:
22
Ethical Hacking