Skip to main content

Posts

theHarvester – Advanced Information Gathering Tool for Pentesters & Ethical Hackers

The objective of this Information Gathering Tool is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers, and SHODAN computer database.This tool is intended to help Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization. This tool is designed to help the penetration tester on an earlier stage; it is effective, simple and easy to use. The sources supported are:Google – emails, subdomainsGoogle profiles – Employee namesBing search – emails, subdomains/hostnames, virtual hostsPgp servers – emails, subdomains/hostnamesLinkedIn – Employee namesExalead – emails, subdomains/hostnamesNew features:Time delays between requestsXML results export.How it works – Information Gathering Tool#theHarvester -d [url] -l 300 -b [search engine n…
Recent posts

Security Check: http://f.vision/

BETA General  IP4   WEBRTC95.179.133.24095.179.133.240  USERAGENT 0.0      Ubuntu  SCREEN1366x768 (1037x594)  ZIPN/A  ISPCosmoline Telecommunication Services S.A.   LOCATIONGreece (GR), AthensBasic  BROWSER 0%  IP 50%  TIMEZONEGMT -0400 (America/New_York)GMT +0300  LANGUAGEen-US, enen-US,en PLATFORMUbuntuN/AHASHES    HSTSa4c03c   WEBGLd4817dbccd6f1fc6   CANVAS-1150815518   PLUGINSN/A   AUDIO9c7dadf21d9a995a   CLIENT RECTSfa4310248d882938   FONTSffa651e5d7de18dbStart advanced tests

Security Check: https://browserleaks.com/

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.IP AddressThe main tool that illustrates server-side capabilities to reveal the user's identity. It has basic features such as showing Your IP Address and HTTP Headers, IP-based geolocation (GeoIP) determines your Country, State, City, ISP/ASN, Local Time. There's also TCP/IP OS Fingerprinting, WebRTC Leak Tests, DNS Leak Test, IPv6 Leak Test. JavaScriptYou can get a large amount of data abo…

Security Check: IPLEAK.NET

powered by This is the kind of information that all the sites you visit, as well as their advertisers and any embedded widget, can see and collect about you. Your IP addresses95.179.133.240Netherlands - North Holland  No forwarded IP detected. If you are using a proxy, it's a transparent proxy. IPv6 test not reachable. (timeout)
Browser default: IPv4 (205 ms) Fallback: Fail (timeout) Your IP addresses - WebRTC detectionIf you are now connected to a VPN and you see your ISP IP, then your system is leaking WebRTC requests DNS Addresses - 4 servers 2a03:b0c0:1:e0::2e3:e001United Kingdom - England  139.59.200.116United Kingdom - England  95.216.24.230Finland - Uusimaa  2a01:4f9:2a:1919::9301Germany  If you are now connected to a VPN and between the detected DNS you see your ISP DNS, then your system is leaking DNS requests Torrent Address detectionActivate Geolocation detectionActivate (may prompt an user permission on the browser) IP DetailsIP: 95.179.133.240AirVPN Exit Node: No

Country: Nethe…

How to Crack Passwords, Part-2 (making wordlist)

As we had seen in the previous part that, to hack any passwords we should make a good wordlist, for that we can use social engineering or any guessing method, but offcourse guessing works in very few cases or even if it works it can take weeks or months to get the passwords. So here we will see how to make a wordlist to crack passwords.In many of our password cracking methods, we often need to use a wordlist that will essentially attempt thousands of potential passwords per second. This is often referred to as a dictionary attack.Despite of the fact that it is slow, you have to learn brute-force attack if you want to be a hacker as in many stages it will help you a lot and for that you need a good wordlist.Using Pre-build DictionaryThe good thing about kali linux is – it will give you some pre build wordlists which can help you at tough times. One of the main such wordlist is rockyou.txt , you can find this wordlist inside cd /usr/share/wordlists/ . Rockyou.txt is a word…

How to crack passwords easily (Part-1)

Passwords are the most widely used form of authentication throughout the world. A username and password are used on computer systems, bank accounts, ATM’s, and more. The ability to crack passwords is an essential skill for hackers. So here we will see how to crack passwords by brute forcing.In brute forcing we basically try different passwords or usernames on any account or file, and if anyone matches then we can log into victim’s account/file.There are many tools present inside kali linux through which you can perform brute forcing. You just have to make a good password or username list and put it inside the tool.Brute forcing depends on how the victim is and how tough his/her password is, That’s why social engineering is important here as we can get some hint regarding to victim’s password. To learn social engineering see our what is social engineering section.Although some passwords are very easy to crack, some are very difficult. In those cases, the hacker can eithe…

How to Hack Windows (step-by-step)

Many of the people doubt that whether their laptop or desktop can be hacked by a hacker.So the answer is yes, it can be easily hacked by a person having knowledge in ethical hacking or any kind of hacking. So here we will see how to hack windows, so that you should be aware of such attacks.Before we begin this section ensure that you have kali linux installed in your system. You can check our how to install kali linux section for installing kali.you can easily hack anyone’s windows if you have physical contact with it, like if it’s your friend’s computer or anyone you know.Mainly social engineering works here in which you should be very good if you are serious about hacking.Social engineering can give you access to many systems which even do not have vulnerability in it. It uses people as a vulnerability as every person is vulnerable at some point.Here we will see hacking windows with the help of metasploit and fatrat which we had seen earlier in our android hacking section …