How to hack a web server






yela lrkjd lshkafka fudloao@ wo mdvu yelska .ek
fudloao fï yelska (o.O)

ir,j fjk;a moaO;shlg fyda cd,hlg wkjirfhka we;=,;a ùu yelska f,i yÿkajhs’ kuq;a iuyre fuh Cracking hkqfjka kï lrhs, m%Odk jYfhka WHITE HATS hkqfjka kï lrkakka BLACK HAT jre CRACKERS jYfhka yeoskaúh hq;= hhs ;¾l lrhs’ ljqo fï yel¾jre ir,j f;areï .kak fï ,smsh ilia lr,d ;sfhkjd’

WHITE HAT HACKERS
mß.Kl iy cd, wdrlaIl m%uqlhka f,i yeosk fõ’
(Computer and Network Experts) fudjqka ydkslr fkdue;s fya;=ka ioyd moao;shl we;=¿ jkakka fõ’
(breaks security for non-malicious reasons)

BLACK HAT HACKERS

ydkslr fya;=ka ioyd cd,hlg fyda mß.Kl mèo;shlg we;=¿ jkakka (Breaks security for malicious reasons)

GRAY HAT HACKERS

by; fomd¾Yjfhau tl;=jla f,i yeoskafõ’ wka;¾cd,h ;=, ießirñka wfkla cd, ;=, we;=,a fõ’ fndfyda ÿrg iq¿ uqo,la ioyd moaO;s iy cd, j, wkdrlaIs; ia:dk w¨;a jeäh lrhs’

wOHmk wjê

Elite hacker
úIfha oejeka;fhda fuu kñka yÿkajhs’ kj wkdrlaIs; ia:dk fidhkakka kj we;=¿ jk l%u fidhkakka fuu >kfha ,d ie,fla’

Script kiddie
lsisu yelsx ms,sn| oekqula ke;s wjfndaohla ke;s wh fõ’ wks;a mqoa.,hka úiska ks¾udKh lrk ,o Application wdOdrfhka jev .kafkda fj;s’

Neophyte
iuyr fmdrj,a hhs is; isákakka lsisÿ fohla fkdokakd wkh wduka;%Kh lrkafka fujeks kñks’ (Noob, Newbie)

Blue hat
moao;s j, wdrlaIdj fidhd n,kakka fï kñka yeoskafõ’

Hacktivist
iudc, wd.ñl, foaYmd,k wjYH;d ioyd we;=¿ jkakka’

fudkjo wjYH iqÿiqlï......
ld,h, wjfndaoh, lshùu, m%fhda.sl w;a yod ne,Su’


Ndú;d jk l%u

Client Side Hacking

Server Side Hacking

Client Side Hacking

Social Engineering

yelska j, Nhdklu iy m%n,u f,i i,lkak mq¿jka, ;u nqoaêh iy wfkla mqoa.,hdj /jàfï olaI;djh u; fuh rod mejf;a’

Wod - uqKq fmdf;a .eyeKq <ufhlaf.a fm%d*hs,a tllska ;udg Hack lsÍug wjYH mqoa.,hd iu. ñ;% ù Tyq .ek úia;r oek .ekSu ;=,ska ryia m%Yakh ioyd ms<s;=re fidhd.ekSu’

Social Engineering Expert flfkl= idkafhka osk .dkla ;dudg wjYH mqoa.,hd foi n,d isáñka Tyq wOkh lrhs, Tyqf.a ðjk rgdj, leu;s hqj;shka j¾., fldkav ú,dis;. jeks foa, uf.a ;SrfKa yeáhg fïl ;rï wks;a tllaj;a jeo.;a keye’ fldákau lsfjd;a fudldj yß f.dkdg wekaoùu .

Shoulder Surfing
fïl;a álla f,ais iy wkjYH jevla, fldfydu;a wfma jf.a tjqkag f,ais fohla’ wfkldf.a uqr moh foi wei fldfkka fyda, n,d isàu’ b;ska ,`. mdGl fudfllaj;a bkakjd kï uqr moh we;=,a fkdlr isàu w.g .=Khs’

Guessing
hy¿fjla kï, Social Engineering okakdjkdkaï fïl f,aishs, “ is;Su ta ksid fl,a,f.a, wïuf.a ku jf.a fudav uqr mo we;=,a lrkak tmd’

Keylogging
uq,slju fuh u.ska wks;a mqoa.,hd úiska ghsma lrk ish¨u wl=re yel¾ jrhd fj; ,efí’.
Wod - RapZo Logger , Accuracy Logger , Keystork Dante

Cookies Stealing
hï wvúhlg we;=,a ùfïoS ;u mß>klfha ;ekam;a jk l=lsia fidr .ekSu ;=,ska f,d.a jk hqi¾ fku iy ryia mo fidr.ksuq’

Remote Administration tools - aka (RAT)
yel¾ jrekaf.a m%n,u wúhls, yel¾ jrhdg wjYH mqoa.,hdf.a mß.Klh wjYH mßos yeisßúh yelsh, fjk;a tajd nd.; l, yelsh.
Wod - Pro RAT , Dark_Comet , BS , Spy Net , Cyber gate

Password Stealing
Keylogging j,g idudk Wõj;a fuysoS kshñ; Apps j, User Names and Password muKla yel¾ lrejdf.a Bfï,a .sKqug fyda Tyqf.a wod< wvúhlg tjhs’ Ex – Emissray , iStealer

Phishing Attacks
wod< fjí wvúh f,i iEÿ õhdc wvúhlg mqoa.,hdj f.k hhs,
Wod - f*aia nqla wvúh f,i ;kq õhdc tlg Tn f,d.a jQ úg Tfí o;a; yel¾ jrhdg ,efí’

Bot or Zombies
;j;a m%n, fohls, Password Stealing, Keylogging hkak f,i;a l%shd;aul fõ’ BOTNET tlla hkq fndfyda úkdY ldÍ fohls, Tfí ish¨ o;a;o;# fidr .kakg oelsh yels fõ.
Wod - Zeus bot

Server Side Hacking

Exploiting
hkqfjka uq,slju oelafjkafka, hï moao;shl fyda cd,hl we;s wkdrlaIs; ia:dkhlska we;=,a ùfuka ;duf.a jdish idod .ekSuhs.

fjí wvúhl fujekaklska l, yß foa,

1. SQL Injection
2. RFI, LFI
3. Uploading Shells
4. XSS Cross Site Scripting
5. CSRF
6. Gaining Root Access to websites hosted on the same server and then intruding another site on the server
7. Using Scripts to gain information known as Exploits

Dictionary Attacks
f,fyisfhkau fuhska w;añfokak mq¿jka, kfï yeáhg jf.au lsisu ojil Dictionary tll we;=,;a fjkak mq¿jka kï uqrmohg we;=,a lrkak tmd, fudlo fm%da.%ïia ;sfhkjd fï jf.a fmdä Wkaf.a uqr mo f,fyisfhkau fidhd .kak mq¨jka.

Brute-force Attacks
by; foag iudkhs. kuq;a fndfyda ojila hk jevla, Tfí uqr moh os.= tlla kï wxl tl;= lsÍu, iudk ,l=Kq, jryka jeks foa iu. ;sfhkjd kï fndfyda ÿrg uu m%ydrh osh;a lrhs, ta;a f.dvla f,dl= uqr mohla kï jevla fjkafka keye.

Reverting Attack
lsisu wvúhla u.ska lshk Hacking lr,d fokjd lshk foaj,a úiajdia lrkak tmd’ Thdf.a i,a,s kslï f.or bkak n,a,g fi,a,ï lrkak fokak Bg jvd ys;g fydohs, lsisu fid*aÜfjhd tlla keye f*aia nqla, fï,a, Th jf.a wks;a m%isoao foaj,a HACK lrkak mq¿jka’ fï by; úia;r j,g wu;ru, yel¾jre oUdfkka wdj tjqk fkfuhs’ hq áhqí j, jf.a ;sfhk yelska.a fm%da.%ïia nd.; lrkak tmd ljodj;a Programming language tlla bf.k .kafka ke;sj ;uka yel¾ flfkla lshd .kakj;a tmd ljodj;a, Script kiddie flfkla kï lshd .;a;g lula keye’ fm%da.a¾ñka.a okakd m,shg yel¾,d fjkafk;a keye’ lsh, wu;l lrkakka tmd’ wka flfkl=g wkjYH mßos yela lrkak fm,fnkak tmd’ ;ud yel¾ flfkla lsh, fndaâ .y, m%isoaosfha nd,aÿ fjkak kï tmd, fjí wvúhla yela lr,d Deface lrkjg jvd tu wvúfha whs;s lrej oekqj;a lsÍfuka Tng uqo,a, /lshd ,eîfï iïNdú;dj jeähs, oeka ,xldfõ Cyber Laws jeä, ta ksid fudlla yß f.dka; jevla (BLACK HAT) jevla lrkak hkfldg ;udf.a wdrlaIdj ;yjqre lrf.k bkak’ ´kEu cd,hl wkdrlaIs; ;eka f.dvla ;sfhkjd, ta ksid yela lrkak neye lshkak tmd’ fydh,d bkak’
yß tfykï oeka okakjd fka HACKING iSka tl’ ch fõjd’
iudcjdofhka fl,jr fõjd'

0 comments:

Post a Comment