Post: How to find vulnerable websites (For beginners)
04-12-2011, 09:11 PM #1
Curt
Former Staff
(adsbygoogle = window.adsbygoogle || []).push({}); I thought i'd post this because using a tool like this is much quicker than doing manual SQLI (unless you prefer doing it old school.:tongueSmile This tool is a little like havij but in my opinion better. I will only be showing you howto find vulnerable websites with this tutorial as their's plenty of tutorials on how to deface an sql vulnerable site.

First off you need to download the actual tool itself (No this is not my own tool)
Download (Survey free);

You must login or register to view this content.

Once you've downloaded the program itself from the above download link, you need to extract it to a place you will know where to find it. You can find a picture of the programme itself, once opened, below.

You must login or register to view this content.

NOTE- Make sure you don't extract the tool away from the folder because that's where the dorks are.

Ok so now for the tutorial, this is a little long but who ever said hacking was easy? just simply follow these steps bellow and then you will be successful in "hacking" your opponent.

Step 1 -First you will need to click the "Scanner" tab and then the little "+" icon on the "All dorks". Once done you will see a list like below.
You must login or register to view this content.
this is called a "dork" you can pick any dork you want via clicking the little "+" icon, again.

Step 2 - Next you will need to pick a specific "dork" I'm going to be using ASP with dork ; ".asp?bookID=" you can (enter it into the search box the type of dork you're looking for. This tutorial doesn't require this specific dork, you can chose one to your own preference. So now our stage process should be as shown below.
You must login or register to view this content.

Step 3 - Now you will need to press the scan button, make sure to press "Remove duplicates". See the below picture.
You must login or register to view this content.

Step 4 - Once you've completed "Step 3" the next thing you will need to do is right click your list (the white part) and press "Send to SQLI Crawler" as so.
You must login or register to view this content.

Step 5 - Once in the SQLI Crawler you will need to press "Crawl" this will find you the vulnerable links from the ones you just just imported, this didn't work for me as good as I was hoping. It should look like the following.
You must login or register to view this content.

Step 6 - Once your list is populated you have now got yourself some vulnerable sites to SQL inject.

I would of continued the tutorial into more depth of executing SQL injection with this tool but there's already tutorials around that you can use. If you need any help with SQL injecting/uploading a shell just PM me, I'll be more than happy to help. I know you might think this tutorial is well pointless but it's a simple way of finding vulnerable websites whilst using some of the best dorks. Oh and before you guys say isn't it better just using "Google" well in my opinion no, this method tells you if its vulnerable and gives you over +50 sites at a time which will keep you busy.

I hope you liked this tutorial and remember whenever hacking/exploiting sites always use a proxy to hide yourself, here's a few proxy's that I use.

You must login or register to view this content.
You must login or register to view this content.
You must login or register to view this content. (best in my opinion)



Remember all my tutorials I do myself from my own personal knowledge. Here's some other tutorials I made ;
You must login or register to view this content.
You must login or register to view this content.


Virus scan.
You must login or register to view this content.
Last edited by Toxic ; 05-02-2016 at 01:25 PM. Reason: New pictures + virus scan + new text.

The following 79 users say thank you to Curt for this useful post:

_Daz_, --Ben-, -Ginge, -Hazz-, -SuperMan, -Syed-, .JiampyPotter, .Mitch, <Jimbo>, Midnight.eGo, Albani310, Algebra, Axiom, Bang Tidy, Callum., Chief Keef Sosa, Chronos, consolaman, Eggy551, I Like Turtles, Epic?, SweatyMidgets, Febreze, frag06, Grezinn, HonuCinema, Hurldoh, I Got Cookies, Hawk, Beats, JamieMaCc, Jannis96, Jared, JoeD232, johnw6619, joni_djESP, Josh_ox3, jvideogamefreek, Khemz, lbalancel, legitmod, LordOlliee, Luxify, Lydey, MegaMister, MidgetGangBang, MODZ4FUN420, Mr. Aimbot, Mudkip, Nickm0117, Night Wolf, Ninja, Pimp, Playst4tion.com, Proboscis, Rath, Reay, Recto, Refusing, Relevant, RGB, Rip The Jacker, Rokiz, Scouser94, Stx, TehMerkMods, TehMike, The_Switch, TryCatchMe, Tupac, tylerallmighty, UNLIMITED G@M3R, Valence2point0, Xanadu, xGunz, xMurphyBoiix
04-15-2011, 06:56 PM #38
Curt
Former Staff
Thanks, Bark :y:
04-16-2011, 01:27 AM #39
Mrs.Drake
GOAL: 1000 POSTS
Originally posted by Curt View Post
Ok so.. I've seen recently people have been making threads with SQL injection tutorials so I thought i'd make a thread on how to find vulnerable sites the easy way. I thought i'd post one using a tool I like to use when I simply cant be bothered to do it the manual way. This tool is a little like havij but in my opinion better.

Ok so enough of me talking, lets get down to it. First off you need to download the actual tool itself (No this is not my own tool)
Download ; virus scan is at the bottom.
You must login or register to view this content.

Once you've downloaded the file above you need to extract it to a place you will know where to find it. The programme itself looks like this ;
You must login or register to view this content.
NOTE (make sure you don't extract the tool away from the folder because its got the dorks in there)

Ok so now for the tutorial, this is a little long but who ever said hacking was easy?, just simply follow these steps bellow and then you will be successful in "hacking" your opponent.

Step 1)First you will need to click the "Scanner" tab and then the little "+" icon on the "All dorks". Once done you will see a list like this ;
You must login or register to view this content.
this is called a "dork" you can pick anyone you want by clicking the little "+" icon again.

Step 2)Next you will need to pick a specific "dork" i'm going to be using ASP with dork ; ".asp?bookID=" you can use any....it really doesn't matter. So now our stage process should look like this ;
You must login or register to view this content.

Step 3)Now you will need to press the scan button, I can't really explain this part so I got a picture for you You must login or register to view this content.
once that's done press "Remove duplicates" and it should take away a few links for you.

Step 4)Once completed "Step 3" the next thing you will need to do is right click your list (the white part) and press "Send to Sqli crawler" as so ;
You must login or register to view this content.

Step 5)Once in the sqli crawler you will need to press "Crawl" this will find you the vulnerable links from the ones you just just imported, this didn't work for me as good because I used basically a dork that's not really good use, I just wanted to get this tutorial out there.

Step 6) Following on from "Step 5" the list takes a while because the tool itself is finding if its vulnerable or not. It should look a little like this You must login or register to view this content.

Step 7) Once your list is populated you have now got yourself some vulnerable sites to SQL inject/upload shell.

I would of continued the tutorial into more depth of executing SQL injection with this tool but there's already tutorials around that you can use. If you need any help with SQL injecting/uploading a shell just PM me, I'll be more than happy to help. I know you might think this tutorial is well pointless but it's a simple way of finding vulnerable websites whilst using some of the best dorks. Oh and before you guys say isn't it better just using "Google" well in my opinion no, this method tells you if its vulnerable and gives you over +50 sites at a time which will keep you busy.


I hope you liked this tutorial and remember whenever hacking sites always use a proxy, here's a few proxy's that I use.

[url=www.Hidemyass.com]www.hidemyass.com[/url]
You must login or register to view this content.
You must login or register to view this content. (best in my opinion)


Remember all my tutorials I do myself from my own personal knowledge. Here's some other tutorials I made to do with hacking ;
You must login or register to view this content.
You must login or register to view this content.

-Curt

EDIT: VIRUS SCAN FOR THE DOWNLOAD
    
Antivirus Version Last update Result
AhnLab-V3 2011.04.12.01 2011.04.12 -
AntiVir 7.11.6.66 2011.04.12 -
Antiy-AVL 2.0.3.7 2011.04.12 -
Avast 4.8.1351.0 2011.04.12 -
Avast5 5.0.677.0 2011.04.12 -
AVG 10.0.0.1190 2011.04.12 -
BitDefender 7.2 2011.04.12 -
CAT-QuickHeal 11.00 2011.04.12 -
ClamAV 0.97.0.0 2011.04.12 -
Commtouch 5.2.11.5 2011.04.06 -
Comodo 8317 2011.04.12 -
DrWeb 5.0.2.03300 2011.04.12 -
Emsisoft 5.1.0.5 2011.04.12 -
eSafe 7.0.17.0 2011.04.12 -
eTrust-Vet 36.1.8268 2011.04.12 -
F-Prot 4.6.2.117 2011.04.12 -
F-Secure 9.0.16440.0 2011.04.12 -
Fortinet 4.2.254.0 2011.04.12 -
GData 22 2011.04.12 -
Ikarus T3.1.1.103.0 2011.04.12 -
Jiangmin 13.0.900 2011.04.12 -
K7AntiVirus 9.96.4360 2011.04.11 -
Kaspersky 7.0.0.125 2011.04.12 -
McAfee 5.400.0.1158 2011.04.12 -
McAfee-GW-Edition 2010.1C 2011.04.12 -
Microsoft 1.6702 2011.04.11 -
NOD32 6037 2011.04.12 -
Norman 6.07.07 2011.04.12 -
Panda 10.0.3.5 2011.04.12 -
PCTools 7.0.3.5 2011.04.12 -
Prevx 3.0 2011.04.12 -
Rising 23.53.01.06 2011.04.12 -
Sophos 4.64.0 2011.04.12 -
SUPERAntiSpyware 4.40.0.1006 2011.04.12 -
Symantec 20101.3.2.89 2011.04.12 WS.Reputation.1
TheHacker 6.7.0.1.171 2011.04.12 -
TrendMicro 9.200.0.1012 2011.04.12 -
TrendMicro-HouseCall 9.200.0.1012 2011.04.12 -
VBA32 3.12.14.3 2011.04.12 -
VIPRE 8999 2011.04.12 -
ViRobot 2011.4.12.4406 2011.04.12 -
VirusBuster 13.6.301.0 2011.04.12 -
MD5: bfcb8c5408fe750e431f2e843b8b85b8
SHA1: 8107304ee63d3a41952f31f05094c26dc231ac9d
SHA256: 4dd2985a1940f0cafdb92da4bf569edc29dbd614a4a2bd34c4082d759dc5ab7e
File size: 5599232 bytes
Scan date: 2011-04-12 20:05:29 (UTC)


Super nice thread! Dancing why would anybody want to grown this! :megusta:
04-16-2011, 04:20 AM #40
GBish
Banned
Curt FTW Happy
04-16-2011, 04:26 AM #41
Curt
Former Staff
I don't know Obama, haters gonna hate. Thanks Envy Smile
04-16-2011, 03:30 PM #42
Very nice thread Curtis.
04-16-2011, 06:14 PM #43
Curt
Former Staff
Thanks Darryn =D
04-16-2011, 08:46 PM #44
Wow this looks actually kinda easy =D
04-16-2011, 09:24 PM #45
Curt
Former Staff
Originally posted by Recharge View Post
Wow this looks actually kinda easy =D


Yeah its pretty easy, if you get stuck just lemme know:y:
04-16-2011, 09:29 PM #46
Wow curt nicely set out bro, will be trying this later. Winky Winky

Copyright © 2024, NextGenUpdate.
All Rights Reserved.

Gray NextGenUpdate Logo