12.07.2015 Views

Devices - Penetration Testing Like a Hacker. - SecNiche Security Labs

Devices - Penetration Testing Like a Hacker. - SecNiche Security Labs

Devices - Penetration Testing Like a Hacker. - SecNiche Security Labs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

name, IP address and server location. Right clickingon the flag will let you access additional informationabout the web site using external lookups such asDomainTools WHOIS, WOT Scorecard, McAfeeSiteAdvisor and many more. You can also add additionallookups which you find necessary. Clicking on the flagicon will by default take you to Geotool, which Flagfox’sdefault action (see Figure 2) (Add-on Link: https://addons.mozilla.org/en-US/firefox/addon/flagfox/).Figure 1. Vidalia Control PanelFigure 2. Flagfox in Firefox 6.0databases for cognizing the data about the resource,assignees, registrants and administrative information.Flagfox: This extension introduces a flag icon on theright hand side of your address bar (see Figure 1). Thisflag shows the web server’s physical location. Hoveringover the flag will display information such as domainExploit Database SearchExploit Database Search: The Exploit Database (http://exploit-db.com/) is an archive of more than 15000exploits and software vulnerabilities. This exploitdatabase is a great place for information securityresearchers and penetration testers for getting anexploit’s information in plain text format.Offsec Exploit-db Search: This add-on simply addsOffsec Exploit Archive search among other installedsearch engines in your Firefox. (Add-on Link: https://addons.mozilla.org/en-US/firefox/addon/offsec-exploitdb-search/).SQL InjectionSQL Injection: Database applications are critical intoday’s web scenario. If a database application isunable to filter out escape characters then it becomesvery easy for malicious users to perform SQL codeinjection on a vulnerable application. Using this, amalicious user can gain access to the server andcan delete or modify records. Recently websites likeKathmandu Metropolitan City, Metropolitan UK Police,Nepal Telecommunications Authority, BART PoliceDatabase and NASA Forum were exposed of the SQLFigure 3. Geotool lookup of a website05/2011 (5) SeptemberPage 43http://pentestmag.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!