Category Hacking

PHP Infected

At a certain point as a Security Consultant / Ethical Hacker you may find that some other hackers are aiming at you and you domain.

Well it happend. They where able to place some files on the shared hosting environment of my Internet Site Hoster. I found out that files where placed as I recieved mails from SIDN that thier “Netcraft Takedown Service” had found infected files inside my domain.
(my domain is located on other servers.)

OK… Domain down.. Darn..
Looking at the folder at my hosted site I see the files and copy the content to my system for future investigation.

Lets put the script to the test:

Password protected Encrypted File Password request

OK. Password. Lets try to decrypt the file.

The site: did a neat job...

Read More

The Five Phases of Hacking

The five phases of Hacking are as follow:

  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

This is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target’s IP Address Range, Network, DNS records, etc.

It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.

Gaining Access:
After scanning, the hacker designs ...

Read More