Today i will show you how hackers find Vulnerabilities of targeted
websites. Hacker would take that information and search a numerous
vulnerability databases for the exploit it may be malicious app. If
there’s an exploit available, he will run it against the websites server
and would take the whole complete control. If there isn’t any exploit,
hacker would move onto another available port and try again on a
different method.
Popular exploit databases are:
• Milw0rm
• SecurityFocus
• osvdb
Popular exploit databases are:
• Milw0rm
• SecurityFocus
• osvdb
How to Find Vulnerabilities of Websites?
By searching “filezilla” on application milw0rm, the hacker would not find any exploits due to current version of the FTP program. Every hacker would move on to another available port to try and find another possible vulnerability attack, but this doesn’t mean professional hacker will do this thing. If a skillful hacker has given the opportunity, he may try to path a vulnerability in the current software version and will make an exploit for it. In every hacker's community, this new vulnerability attack would be called a “0-day”. These vulnerabilities are very important in the hacker community for some reasons.1) Nobody knows about the vulnerability, so the hacker could start cracking hundreds of websites before the vulnerability is patched.
2) Mostly some hackers sell the vulnerability for thousands of dollars to enemies of the targeted sites.
3) Patching vulnerabilities and creating the exploit for it shows that hacker is very skillful and is the member of hacker community.
You might be confused why 0-days are worth so much. I’ll explain it with a simple formulae.
Hackers + (0-Day )+ Agency Servers = Worst Reputation = Loss of Dollars
Now before we get into the actual hacking, I will discuss a some of the common type of attacks used against patched vulnerabilities.
Denial-of-Service (DoS)
There are many types of DoS attacks, but they all have one concept: to make the target website server unavailable for users. The most common type of DoS attack is when the hacker sends a software full of malicious information to the server causing it to use up all of its sources, and in return pushing it offline from the network, or causing it to deny requests from unknown users who are trying to reach the web.
Buffer Overflow (BoF)
This happens when an application attempts to store more data into a FTP buffer, or in a data storage area. Because the buffer was only meant to keep the particular amount/storage of data, the extra information overflows into other folders causing them to be removed with malicious scripting published by the hacker. Once the code is executed by the user, the hacker can receive each and every information and can access full control of the server.
Types of Exploits
If you see the Milw0rm exploit database list, you will see that in many exploit it reads local pc exploit or remote exploit.
Local Exploit – For running local exploit, you must first have access and control on the machine. Local exploits are usually used to control users to admin or root. In other words, it allows an ordinary user to gain admin role.
Remote Exploit – A remote exploit is as good exploit just roles the same thing as a local exploit except that what isn’t running locally means admin access, but can be launched or run from anywhere across the internet.
A hacker mosly has to use a combination of both exploits remote and local exploits to gain full control of a system through websites.
Enjoy Hacking!
No comments:
Post a Comment