Ethical Hacking Journal - Final
Ethical Hacking Journal - Final
PRACTICAL 1
Aim: Use Google and Who.is for Reconnaissance
Registrar Info
Name
Whois Server
whois.ca.fury.ca
Referral URL
Markmonitor.com
Status
clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
clientTransferProhibited https://icann.org/epp#clientTransferProhibited
clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
serverDeleteProhibited https://icann.org/epp#serverDeleteProhibited
serverTransferProhibited https://icann.org/epp#serverTransferProhibited
serverUpdateProhibited https://icann.org/epp#serverUpdateProhibited
Important Dates
Expires On
2023-04-28
lOMoARcPSD|312 691 02
Registered On
2000-10-04
Updated On
2022-09-01
Phone
+1.4162146034
Email
Phone
+1.4162146034
Email
PRACTICAL 2 A
Aim: Use CrypTool to encrypt and decrypt passwords using RC4 algorithm
Choose Encrypt/Decrypt from Toolbar and under Symmetric(modern) you will find RC4
Click on Encrypt and you will get the Encrypted text in a new window
Now with this window open, again go back to RC4 window and click on Decrypt. We will get
our original plain text back.
lOMoARcPSD|312 691 02
PRACTICAL 2B
Aim: Use Cain and Abel for cracking Windows account password using Dictionary attack and to
decode wireless network passwords
Prerequisites :
Cain and Abel, Internet
Steps :
1. Open the software, click on Cracker tab >> Hash Calculator tool as shown in the image.
2. A dialogue box appears after clicking on hash calculator, Add the text >> Calculate hash
code >> Copy MD5 hash value
lOMoARcPSD|312 691 02
4. Click on hash code right click, Dictionary Attack>>Add to list(Add the default Wordlist or
create your own with the Password>>Start
lOMoARcPSD|312 691 02
PRACTICAL 3A
Aim: Run and analyze the output of following commands in Linux – ifconfig, ping, netstat,
traceroute
Prerequisites :
KALI Linux, Internet
Steps :
1) In Kali Linux, open terminal and enter ifconfig
PRACTICAL 3 B
Aim: Perform ARP Poisoning in Windows
Steps:
We will use Cain and Abel for ARP Poisoning
Step 1 : Open Cain
Step 11 : Go to password option in the cain & abel and see the visited site password.
lOMoARcPSD|312 691 02
PRACTICAL NO. 4
Aim: Use NMap scanner to perform port scanning of various forms – ACK, SYN, FIN, NULL,
XMAS
Prerequisites :
KALI Linux, Internet
Steps :
NOTE: For using Nmap for Kali. open Terminal and type the below commands.
1) ACK -sA (TCP ACK scan)
It never determines open (or even open|filtered) ports. It is used to map out firewall rulesets,
\determining whether they are stateful or not and which ports are filtered.
Command: nmap -sA -T4 scanme.nmap.org
SYN scan is the default and most popular scan option for good reason. It can be performed
quickly, scanning thousands of ports per second on a fast network not hampered by intrusive
firewalls.
Command: nmap -p22,113,139 scanme.nmap.org
lOMoARcPSD|312 691 02
Sets the FIN, PSH, and URG flags, lighting the packet up like a Christmas tree.
Command: nmap -sX -T4 8.8.8.8
lOMoARcPSD|312 691 02
PRACTICAL 5
Aim: Use Wireshark (Sniffer) to capture network traffic and analyze
Steps:
Go to Capture -> Options -> Select Ethernet with Traffic and click on Start
Now, go to browser and open http://techpanda.org. This is a sitewith a dummy login for us to
test the traffic analysis.
lOMoARcPSD|312 691 02
Now stop the trafic analysis by clicking on Stop Capturing packets option at top left corner
Now look up http in the display filter and click on POST request with index.php
Now expand HTML form URL encoded to see the login credentials we posted using the HTML
form in the above website
END
lOMoARcPSD|312 691 02
PRACTICAL 6
Aim: Simulate persistent cross-site scripting attack
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected
into otherwise benign and trusted websites.
Steps:
Go to browser and open http://techpanda.org. This is a sitewith a dummy login for us to test
the traffic analysis.
Now click on Add New Contact option and while entering the details, we will enter HTML
anchor tag with a link to an website as an input as shown below
Now click on save changes and go back to the site’s dashboard. You will see your record added
but instead of a text you will see a hyperlink text Subiksh.
Once we click on this link, it will route to the website we mentioned in the anchor tag.
lOMoARcPSD|312 691 02
PRACTICAL 7
Aim: Session impersonation using Firefox and Tamper Data add-on
We will be using EditThisCookie Add on for Session Impersonation and Tampering the Data.
Steps:
4) Now to the the Addon and Export the Cookie information and paste into a notepad
5) Once copied, close the browser window and go to http://techpanda.org website again. It
will again ask you to login with a new session.
6) Go to the Add on, delete the new cookie and replace with our previously copied cookie
using Import option.
7) Now refresh the page and your previous session will be impersonated giving you the access
without Login.
2) Then navigate to the cart option for further processing. You can see your order with
quantity set to 1.
3) No using EditThisCookie, copy the cookie and paste to your notepad. After this, edit the
cookie information, set "value": "10", for p_nr1 and nTotalUnits. Save the cookie and replace
with your existing cookie on the site.
4) Now refresh the page and your cart quantity data will be updated
lOMoARcPSD|312 691 02
PRACTICAL 8
Aim: Create a simple keylogger using python
Steps:
1) Run below Python file in IDLE :-
Listenerimport logging
# if no name it gets into an empty
stringlog_dir = ""
librarydef
on_press(key):
logging.info(str(ke
listener is on
with Listener(on_press=on_press) as
listener:listener.join()
2) Enter a text in the output window and open the text file to see the logs of all the
keyboardinput done.
lOMoARcPSD|312 691 02
PRCTICAL 9
Aim: Using Metasploit to exploit (Kali Linux)
Prerequisites:
KALI Linux, Internet, HOST PC with MySQL 5.1.59 version
Steps:
1) Download and install MySQL 5.1.59 on your HOST PC to be attacked. Set a username – root and password –
root123
2) On your PC, using Oracle VirtualBox – Open Kali Linux. Open terminal and enter command msfconsole
3) Now search for mysql_login exploit using search mysql_login command and use the auxiliary
lOMoARcPSD|312 691 02
4) set RHOSTS as your Target IP address using command set RHOST 192.168.1.100
5) set USER_FILE as user.txt (this file needs to have some sample username to be tested in brute attack, if file not
created create one using following command – nano user.txt and then enter few usernames and save the file)
8) Finally run the exploit using the run command. Output will show Success and failed as results.
lOMoARcPSD|312 691 02