Some Examples Related to Ethical Computer Networking Hacking - Dr. Hedaya Alasooly - E-Book

Some Examples Related to Ethical Computer Networking Hacking E-Book

Dr. Hedaya Alasooly

0,0
12,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

The objective of this work is to provide some quick tutorials in computer networking hacking.

The work includes the following tutorials:

  • Tutorial 1: Setting Up Penetrating Tutorial in Linux.
  • Tutorial 2: Setting Up Penetrating Tutorial in Windows.
  • Tutorial 3: OS Command Injection:
  • Tutorial 4: Basic SQL Injection Commands.
  • Tutorial 5: Manual SQL injection using order by and union select technique.
  • Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.
  • Tutorial 7: Uploading Shell in the Site having LFI.
  • Tutorial 8: Advanced Way for Uploading Shell
  • Tutorial 9: Uploading shell Using Sqli Command.
  • Tutorial 10: Uploading Shell Using SQLmap
  • Tutorial 11: Post Based SQL Injection
  • Tutorial 12: Cracking the Hashes Using
  • Tutorial 13: Hacking windows 7 and 8 through Metasploite
  • Tutorial 14: Tutorial on Cross Site Scripting
  • Tutorial 15: Hacking Android Mobile Using Metasploit
  • Tutorial 16: Man of the middle attack:
  • Tutorial 17: Using SQLmap for SQL injection
  • Tutorial 18: Hide Your Ip
  • Tutorial 19: Uploading Shell and Payloads Using SQLmap
  • Tutorial 20: Using Sql Shell in SQLmap
  • Tutorial 21: Blind SQL Injection
  • Tutorial 22: Jack Hridoy SQL Injection Solution
  • Tutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit.
  • Tutorial 25: How to root the server using back connect
  • Tutorial 25: How to root the server using back connect
  • Tutorial 26: HTML Injection
  • Tutorial 27: Tutuorial in manual SQl Injection
  • Tutorial 28: Venom psh-cmd-exe payload
  • Tutorial 29: Cross site Request Forgery (CSRF)
  • Tutorial 30: Disable Victim Computer
  • Tutorial 31: Exploit any firefox by xpi_bootstrapped addon
  • Tutorial 32: Hack android mobile with metasploit
  • Tutorial 33: PHP Code Injection to Meterpreter Session
  • Tutorial 34: Basic google operators
  • Tutorial 35: Hacking Credit Cards with google
  • Tutorial 36: Finding Vulnerable Websites in Google
  • Tutorial 37: Using the httrack to download website
  • Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper
  • Tutorial 39: Using burp suite to brute force password

 

 

 

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Veröffentlichungsjahr: 2020

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Dr. Hedaya Alasooly

Some Examples Related to Ethical Computer Networking Hacking

BookRix GmbH & Co. KG81371 Munich

Some Examples Related to Ethical Computer Networking Hacking

Some Examples Related to Ethical Computer Networking Hacking

 

 

 

 

 

 

By

Dr. Hedaya Mahmood Alasooly

 

 

 

 

 

 

 

 

 

 

 

 

1) Abstract

1) Abstract

 

The objective of this work is to provide some quick tutorials in computer networking hacking.

The work includes the following tutorials:

Tutorial 1: Setting Up Penetrating Tutorial in Linux.Tutorial 2: Setting Up Penetrating Tutorial in Windows.Tutorial 3: OS Command Injection: Tutorial 4: Basic SQL Injection Commands. Tutorial 5: Manual SQL injection using order by and union select technique.Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.Tutorial 7: Uploading Shell in the Site having LFI.Tutorial 8: Advanced Way for Uploading ShellTutorial 9: Uploading shell Using Sqli Command.Tutorial 10: Uploading Shell Using SQLmapTutorial 11: Post Based SQL InjectionTutorial 12: Cracking the Hashes Using Hashcat. Tutorial 13: Hacking windows 7 and 8 through Metasploite Tutorial 14: Tutorial on Cross Site Scripting Tutorial 15: Hacking Android Mobile Using MetasploitTutorial 16: Man of the middle attack:Tutorial 17: Using SQLmap for SQL injectionTutorial 18: Hide Your IpTutorial 19: Uploading Shell and Payloads Using SQLmap Tutorial 20: Using Sql Shell in SQLmapTutorial 21: Blind SQL InjectionTutorial 22: Jack Hridoy SQL Injection SolutionTutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit. Tutorial 25: How to root the server using back connect Tutorial 25: How to root the server using back connectTutorial 26: HTML InjectionTutorial 27: Tutuorial in manual SQl InjectionTutorial 28: Venom psh-cmd-exe payload Tutorial 29: Cross site Request Forgery (CSRF)Tutorial 30: Disable Victim ComputerTutorial 31: Exploit any firefox by xpi_bootstrapped addonTutorial 32: Hack android mobile with metasploitTutorial 33: PHP Code Injection to Meterpreter SessionTutorial 34: Basic google operatorsTutorial 35: Hacking Credit Cards with googleTutorial 36: Finding Vulnerable Websites in GoogleTutorial 37: Using the httrack to download websiteTutorial 38: Getting the credit cards using sql injection and the SQLi dumperTutorial 39: Using burp suite to brute force password

Note: a lot of tutorials taken from the Pentesting with spirit! Youtube web site https://www.youtube.com/channel/UC_bzikURwRp3Vdbl3VL959Q

 

 

 

 

 

 

 

2) Tutorial 1: Setting Up Penetrating Testing in Linux

2) Tutorial 1: Setting Up Penetrating Testing in Linux

 

Download the files from the following linksThe downloaded files are the following: Unzip all files using the command unzipMove all extracted folders to the directory /var/www. But rename the folders firstIf you get problem in mysql console, reset the root user

sudo /etc/init.d/mysql stop

mysqld_safe --skip-grant-tables &

mysql -uroot

update user set password=PASSWORD("mynewpassword") where User='root';

flush privileges;

quit

sudo /etc/init.d/mysql stop

...

sudo /etc/init.d/mysql start

mysql -u root -p

 

Check the configuration files of of the labs. Browse the owasp (mutillidae).

# cd owasp

#cd webservices

It is configured

7. Go to dvwa directory

# cd dvwa

# gedit config.inc.php

Change the db_password to be empty

8. Start the services

# service apache2 start

# service mysql start

9. Go to 127.0.0.1/sqli and build the databases

10. Go to 127.0.0.1/dvwa and logon with user admin and password password. Create the databases from setup section

11. Go to 127.0.0.1/bwapp/install.php and logon with user bee and password bug. Create the databases.

 

 

3) Tutorial 2: Setting Up Penetrating Testing in Windows

3) Tutorial 2: Setting Up Penetrating Testing in Windows

 

We need the following in the penetrating testing lab: Xampp, Penterating labs, Python for windows, Sqlmap.Download and install xampp . Better to change the listening port in httpd.conf to be 8888 and the listening port in httpd-ssl.conf to be 4443 so there is no conflict with other applications. But I did not change them in my labs.Start the apache and mysql services.Copy the downloaded applications in xampp/htdocs folder.

 

Go to 127.0.0.1/sqli and build the databasesGo to 127.0.0.1/dvwa and logon with user admin and password password. Create the databases from setup sectionGo to 127.0.0.1/bwapp/install.php and logon with user bee and password bug. Create the databases.