HACKING PART ALL top 10 part see..
āĻĒাāϰ্āĻ ā§§: Ethical Hacking āĻী? āĻেāύ āĻāϰুāϰি?
"āĻš্āϝাāĻিং" āĻļāĻŦ্āĻĻāĻি āύিāϝ়ে āĻুāϞ āϧাāϰāĻŖা āĻĻূāϰ āĻāϰা āĻāϰুāϰি। Ethical Hacking āĻšāϞো āĻ āύুāĻŽāϤি āύিāϝ়ে āϏিāϏ্āĻেāĻŽ/āύেāĻāĻāϝ়াāϰ্āĻ/āĻāϝ়েāĻŦ āĻ ্āϝাāĻĒেāϰ āĻĻুāϰ্āĻŦāϞāϤা āĻুঁāĻে āĻŦেāϰ āĻāϰে āϰিāĻĒোāϰ্āĻ āĻāϰা—āϝাāϤে āϏিāϏ্āĻেāĻŽ āĻāϰāĻ āύিāϰাāĻĒāĻĻ āĻšāϝ়।
āĻেāύ āĻļিāĻāĻŦে?
- đ āϏাāĻāĻŦাāϰ āύিāϰাāĻĒāϤ্āϤা āĻŦাāĻĄ়াāϤে
- đŧ āĻাāϞো āĻ্āϝাāϰিāϝ়াāϰ āϏুāϝোāĻ
- đ¯ āύিāĻেāϰ āĻ ্āϝাāĻাāĻāύ্āĻ/āĻĄিāĻাāĻāϏ āϏুāϰāĻ্āώিāϤ āϰাāĻāϤে
āĻĒাāϰ্āĻ ā§¨: āĻĒāϰিāĻŦেāĻļ āĻĒ্āϰāϏ্āϤুāϤি — Termux & Pydroid3
# Termux āϏ্āĻোāϰেāĻ āĻĒাāϰāĻŽিāĻļāύ
termux-setup-storage
āĻāĻĒāĻĄেāĻ/āĻāĻĒāĻ্āϰেāĻĄ
pkg update && pkg upgrade -y
āĻĒ্āϰাāĻĨāĻŽিāĻ āĻুāϞāϏ
pkg install python git nano -y pip install --upgrade pip
āĻ
āϤিāϰিāĻ্āϤ āϰেāĻĒো (āĻĒ্āϰāϝ়োāĻāύে)
pkg install root-repo unstable-repo
āĻাāϰ্āϏāύ āϝাāĻাāĻ
python --version git --version āĻĒাāϰ্āĻ ā§Š: Linux/Termux āĻāĻŽাāύ্āĻĄ āĻŦেāϏিāĻ
# āĻĢাāĻāϞ/āĻĄিāϰেāĻ্āĻāϰি
ls -la cd storage/shared pwd mkdir recon_lab rm -r old_folder
āĻāĻĄিāĻāϰ
nano script.py vim notes.txt
āĻĒাāϰāĻŽিāĻļāύ/āϰাāύ
ls -l chmod +x run.sh ./run.sh python3 script.py
āĻĒ্āϝাāĻেāĻ āĻŽ্āϝাāύেāĻাāϰ
pkg install nmap pkg update && pkg upgrade pip install requests beautifulsoup4 pip list āĻĒাāϰ্āĻ ā§Ē: Footprinting & Reconnaissance
Passive OSINT āĻĨেāĻে āĻļুāϰু āĻāϰে Active āϏ্āĻ্āϝাāύ—āϏāĻŦāĻিāĻুāĻ āĻļুāϧু āĻ āύুāĻŽোāĻĻিāϤ āĻাāϰ্āĻেāĻে!
# WHOIS
whois example.com
DNS āϰেāĻāϰ্āĻĄāϏ (āĻĒ্āϰāĻĨāĻŽে dnsutils āĻāύāϏ্āĻāϞ)
pkg install dnsutils dig example.com ANY +noall +answer
theHarvester (āĻāĻŽেāĻāϞ/āϏাāĻŦāĻĄোāĻŽেāĻāύ)
pip install theharvester theharvester -d example.com -b google -l 200
Sublist3r / Amass
pip install sublist3r sublist3r -d example.com -o subs.txt pkg install amass amass enum --passive -d example.com -o amass_subs.txt
Active Recon
nmap -sn 192.168.1.0/24 pkg install inetutils traceroute example.com nmap -sV -p 80,443 example.com āĻĒাāϰ্āĻ ā§Ģ: Scanning & Enumeration
# Nmap āĻŦেāϏিāĻ
nmap -p- target.com nmap -sC -sV target.com nmap -A target.com nmap -p 22,80,443,3306 target.com
NSE
ls /data/data/com.termux/files/usr/share/nmap/scripts/ nmap --script http-vuln* -p80,443 target.com nmap --script smb-enum* -p445 target.com
Enumeration āĻুāϞāϏ
pkg install enum4linux enum4linux -a 192.168.1.10 pkg install snmp snmpwalk -v1 -c public 192.168.1.10 rpcclient -U "" 192.168.1.10 āĻĒাāϰ্āĻ ā§Ŧ: Vulnerability Analysis
āĻ āĻোāĻŽেāĻļāύ + āĻŽ্āϝাāύুāϝ়াāϞ āĻেāϏ্āĻ = āĻļāĻ্āϤিāĻļাāϞী āĻāϞāύাāϰেāĻŦিāϞিāĻি āĻ ্āϝাāϏেāϏāĻŽেāύ্āĻ।
# Nikto (āĻāϝ়েāĻŦ āϏাāϰ্āĻাāϰ āϏ্āĻ্āϝাāύ)
pkg install nikto nikto -h http://target.com -o nikto_report.txt
wfuzz (āĻĄিāϰেāĻ্āĻāϰি āĻĢাāĻিং)
pip install wfuzz wfuzz -c -z file,/usr/share/wordlists/dirb/common.txt --hc 404
http://target.com/FUZZ | tee wfuzz_report.txt āĻĒাāϰ্āĻ ā§: āϏেāĻĢ āϞ্āϝাāĻŦ (āύিāϰাāĻĒāĻĻ āĻŦিāĻāϞ্āĻĒ)
āĻāĻĒāύাāϰ āĻĻেāϝ়া "Sample Virus Creation" āĻ āύুāϰোāϧāĻি āĻুঁāĻিāĻĒূāϰ্āĻŖ āĻšāĻāϝ়াāϝ় āĻāĻাāύে āĻāĻāĻি āύিāϰাāĻĒāĻĻ āĻŦিāĻāϞ্āĻĒ āϝোāĻ āĻāϰা āĻšāϝ়েāĻে—āϝাāϤে āĻোāύো āĻ্āώāϤি āύা āĻāϰে āĻļেāĻা āϝাāϝ়।
- ✔️ File Monitoring: āĻāĻāĻি āĻĄিāϰেāĻ্āĻāϰিāϤে āύāϤুāύ/āĻĒāϰিāĻŦāϰ্āϤিāϤ āĻĢাāĻāϞ āϞোāĻ āĻāϰা
- ✔️ Backup & Restore: āĻĢাāĻāϞ āĻāĻĒি, āĻš্āϝাāĻļ āϝাāĻাāĻ, āĻ্āϞিāύāĻāĻĒ
- ✔️ Startup Message (Local App Only): āĻāύāϏোāϞে āϏ্āĻŦাāĻāϤāĻŽ āĻŦাāϰ্āϤা (āϏিāϏ্āĻেāĻŽ āĻāύāĻĢিāĻ āύা āĻুঁāϝ়ে)
"""
āϏেāĻĢ āϞ্āϝাāĻŦ āϏ্āĻ্āϰিāĻĒ্āĻ: āĻোāύো āϏিāϏ্āĻেāĻŽ-āĻĢাāĻāϞ āĻĒāϰিāĻŦāϰ্āϤāύ āĻāϰে āύা। āĻļুāϧু āĻāĻāĻি āϞ্āϝাāĻŦ āĻĢোāϞ্āĻĄাāϰে āĻাāĻ āĻāϰে āĻāĻŦং āϰিāĻŽুāĻেāĻŦāϞ। """ import hashlib, os, shutil, time
LAB = "safe_lab" os.makedirs(LAB, exist_ok=True)
1) Backup & Verify
def sha256(p): h = hashlib.sha256() with open(p,'rb') as f: for ch in iter(lambda: f.read(8192), b''): h.update(ch) return h.hexdigest()
src = os.path.join(LAB, "sample.txt") with open(src, 'w', encoding='utf-8') as f: f.write("demo data\n")
bkp = os.path.join(LAB, "sample.txt.bak") shutil.copy(src, bkp) print("✓ āĻŦ্āϝাāĻāĻāĻĒ āϤৈāϰি:", bkp) print("✓ āĻš্āϝাāĻļ āϝাāĻাāĻ:", sha256(src) == sha256(bkp))
2) Directory Monitor (polling)
print("Watching for changes in:", LAB) base = {f: os.path.getmtime(os.path.join(LAB,f)) for f in os.listdir(LAB)} for _ in range(3): # āĻোāĻ āĻĄেāĻŽো time.sleep(1) now = {f: os.path.getmtime(os.path.join(LAB,f)) for f in os.listdir(LAB)} added = set(now) - set(base) changed = {f for f in now if f in base and now[f] != base[f]} for f in added: print("+ added:", f) for f in changed: print("~ changed:", f) base = now
3) Cleanup (optional)
os.remove(bkp) print("✓ āĻ্āϞিāύāĻāĻĒ āϏāĻŽ্āĻĒāύ্āύ") āĻĒাāϰ্āĻ ā§Ž: Web Architecture & HTTP/HTTPS āĻĢ্āϞো
# curl āĻĻিāϝ়ে GET/POST
curl -i http://127.0.0.1:5000/hello curl -i -X POST -d "user=Md&msg=Hi" http://127.0.0.1:5000/hello
mitmproxy (āĻļুāϧু āύিāĻেāϰ āϞ্āϝাāĻŦ āĻ্āϰাāĻĢিāĻেāϰ āĻāύ্āϝ)
pip install mitmproxy mitmproxy --showhost Simple Flask āĻĄেāĻŽো (āĻļিāĻ্āώাāĻŽূāϞāĻ)
from flask import Flask, request, make_response app = Flask(name)
@app.route('/hello', methods=['GET','POST']) def hello(): user = request.values.get('user','Guest') resp = make_response(f"Hello, {user}!") resp.set_cookie('sessionid','abc123', httponly=True) return resp
if name == 'main': app.run(host='0.0.0.0', port=5000) āĻĒাāϰ্āĻ ā§¯: OWASP Top 10 āĻĒāϰিāĻিāϤি
āϏāĻŦāĻেāϝ়ে āĻĒ্āϰāĻāϞিāϤ ā§§ā§ĻāĻি āĻāϝ়েāĻŦ āĻĻুāϰ্āĻŦāϞāϤা—āĻāĻĻাāĻšāϰāĻŖ, āĻĒ্āϰāĻাāĻŦ āĻ āĻĒ্āϰāϤিāĻাāϰ āϏংāĻ্āώিāĻĒ্āϤāĻাāĻŦে:
- Injection → Prepared Statements, Input Validation
- Broken Authentication → MFA, āϏেāĻļāύ āĻŽ্āϝাāύেāĻāĻŽেāύ্āĻ
- Sensitive Data Exposure → HTTPS/TLS, At-Rest Encryption
- XXE → āύিāϰাāĻĒāĻĻ XML Parsers
- Broken Access Control → RBAC, Server-side Checks
- Security Misconfiguration → Hardened Config, Audit
- XSS → Output Encoding, CSP
- Insecure Deserialization → Integrity Checks
- Known Vulns → āύিāϝ়āĻŽিāϤ āĻāĻĒāĻĄেāĻ
- Insufficient Logging → Centralized Logging & Alerting
āĻĒাāϰ্āĻ ā§§ā§Ļ: SQL Injection (āĻļিāĻ্āώাāĻŽূāϞāĻ)
āϧāϰāύ: Error/Union, Blind (Boolean/Time), Out-of-band। āĻĒ্āϰāϤিāĻাāϰ: Parameterized Query, ORM, Input Validation, WAF।
# SQLMap (āĻ
āύুāĻŽোāĻĻিāϤ āϞ্āϝাāĻŦ āĻাāϰ্āĻেāĻে)
sqlmap -u "http://target.local/vuln.php?id=1" --batch --dbs
Comments
Post a Comment