Sunday, March 13, 2011

Learn How to EXPLOIT : The Basics of EXPLOITING

NOTE: Some statements in here apply to beginners. If you read this and are an advanced user, you might say: "That is not true, I know a way....". Correct. But it is impossible to include every exception and technique without creating confusion. Read this essay as if you are a beginner....

NOTE 2: Some basic rules all good crackers and exploiters adhere to: Do not change, alter, or delete any info you may find on a site. This is just not done, and can actually
result in prosecution if you get caught.

On your exploiting journey, you may also come across confidential information from members, such as home addresses, credit card info etc. I know I have, many times over. I even found a hole where I could have the checks of site referrals sent to my account! Never use this information to your personal gain! This will be considered theft and misuse of personal information, and can get you into serious trouble...

OK, now with that out of the way, let's start the series on Exploiting...!


OK, so you are tired of bruteforcing, have spoofed a couple of sites, and have seen posts with custom passes or complete member lists...and you wanna know how... If so, this essay is for you.

This basic exploiting essay assumes you understand or master the following techniques and skills with respect to website security:
  • - Basic HTML
  • - Brute forcing
  • - Proxy use
  • - Basic URL handling
  • - Basic website structures
  • - Basic Spoofing
  • - Good AD skills or similar
But most importantly, you need a good brain and have a sincere interest in website security. Exploiting takes a lot of time and requires research on a regular basis. On the other hand, the rewards are well worth the effort in my opinion!

When trying to test the security of websites, you can gain access in the following manners, listed in order of technical difficulty:
  1. 1. Guess passwords
  2. 2. Brute force attacks
  3. 3. Spoof the site
  4. 4. Get and decrypt passfiles or logs
  5. 5. Using scripts to add passes
  6. 6. Get admin access (via telnet or browser)
  7. 7. Hack the server via telnet
As you can see in the list above, exploiting is really nothing more than increasing your chances of getting access. Guessing decrypting passfiles or increase your chances of getting a working pass with less effort!


Since there are excellent tuts on this already, I am not going to spend a lot of time on this. One question I see a lot from newbies is that they "can not locate the htpasswd"....

A few notes on htaccess and htpasswd:
  • - htaccess only sometimes shows the dir to the htpasswd (or passwd or different name)
  • - the chances of getting this file are slim, as this vulnerability is well-known out there and most webmasters have denied you access, hidden the file, or placed the file on their home dir.

For the fans, here is some more detailed info on the subject I found:
In order to find the .htpasswd (or interpret the .htaccess) you need to understand the difference between the web root and the system root.

The AuthUserFile is specified in terms of the system root. That is, the directory structure you would see if you were actually logged into the computer through a terminal.

When a web browser accesses a machine, it is through a web server. The web server is configured so that the browser will start at some specific directory in the machine. I refer to that as the web root. It is specified in the web server configuration file, off in some directory you can't browse to.

So, lets say that the web root is set to /home/users/ When you surf to http:/ you find yourself in the machine directory /home/users/ (but nothing really tells you that), and if there is an index.html there, you will display it.

So lets say that the web root is set as above, and that the .htaccess contains the line:


AuthUserFile /home/users/

(or something similar)

Applying what I said above, you would find the .htpasswd at:



Since the web root is /home/users/ You still may not be able to read it because it might be forbidden through some other method, say only accessible from certain IP addresses, or . files are not accessible through their web server.

Now, lets say the .htaccess said:


AuthUserFile /home/users/


Now, there is no way we can get to it since the web root puts us in home/users/ and we are well past the days when you could back up above a web root in an Apache web server.

If ../ worked, we would be in luck, since we could specify This used to work, or the unicoded version worked, or the double unicoded version worked, or quotes worked, or unicoded quotes, etc., etc. Not so anymore....

Our only hope, when the .htpasswd is not on the web root, is to find another exploit that will allow us to access files. Such things exist but are hard to find, so read on....

Well, as you tried to get the passfile looking for it in the obvious locations, and failed...maybe there are other ways of obtaining it....

Using AD or another security scanner, you can start looking for so-called vulnerabilities. This means testing the website for security, and trying to find ways into the site. How does this work, you ask? We need a tool to test the security...

For these essays, I will be talking about a tool called WebSiteFinder, or WSF in short. Written by Wolfman, this is a great tool, in my opinion. AD or Passcraft can do the same, so use whatever you feel comfortable with. If you start out, use AD.

To make these tools really effective, you need an exploit list. This is a list of basic paths that will be tested for possible vulnerabilities or access against the website. AD offers a basic exploit list, at least the older versions did. Exploit lists can be found all over the web, but please realise these are very basic, and some of the holes (=vulnerabilities) they have in it, are old and will not work anymore on most sites.

Really good exploiters or crackers will not share their lists with you. The reason: Once some exploits are made public, chances are the holes will be discovered quickly and thus closed! And that is a bummer.

So you have to build your own list. How, you ask? Here are a few tips.

First place to start, is to analyze your current exploit list. What makes sense, and what does not. What paths do you understand? Why do you think that particular path is a vulnerability, and if you came accross it, how would you use it? If you don't know, ask on a forum via PM, there are many people around that can and will help you. Moreover, read up on security sites (better get used to it), such as packetstorm, securiteam, etc.

NOTE: It is no use to just try exploits on sites if you don't understand what you are doing. The results can be very bad. You could, unwillingly, do damage to the site!

Look at directory trees of sites you visit. Try to go up and down in levels in the dir to possibly find more holes...copy these to your exploit list.

These are KING in my book. Why? Stats show the requests made to a website, and some stats list all the requests....including those of someone trying to exploit the site. The paths that this person tried may not have worked on the site, but heh, copy them to your exploit list, they may come in handy for other sites! Access logs show the same thing...moreover, they might tell you alot about the server, home server (FTP logs), usernames, and the basic website structure.

INTERMEZZO: "What to do with the usernames?"
This is a question I get a lot. Someone has seen the stats, and now has a list of usernames. Now what? Well, half the battle is won! Remember the statement I made about increasing your chances in getting access? This is it! Proceed in two ways:
1. Use the usernames and one of your wordlists to do a BF attack
2. Match the usernames to working combos you have. There are tools for this, and try to see if the combos work. Many users use the same password for different sites...see where I am getting at?

I love google. I embrace googling. You should too. Make googling your hobby! Type in a path or exploit, and see what you get, you will be surprised! It will lead you to access logs, vulnerability reports, cool sites, etc. Whatever you find and think is useful, copy to your exploit list...


Code !njector said...

nice written....

Anonymous said...

Google it Bitch

Anonymous said...

Нey I'm stony-broke LG fluid speech sound's Вluetooth
connеcter to profit admission to thе Bluevibe Hot ѕpοt, thereby ρroviding you with online
pοκies Net accessіοn.

This гesolving ρower isn't a problem with online pokies though because than what Razer is nerve-wracking here.
My web blog - gaming

Anonymous said...

This piece of writing will assist the internet users
for building up new website or even a blog from start to end.
My page : http://www.orc-online.Com

Anonymous said...

I'd like to find out more? I'd like to find
out some additional information.
Also visit my site ; how to make money onlie

Anonymous said...

Hi! I could have sworn I've been to this web site before but after looking at many of the articles I realized it's new to me.
Nonetheless, I'm definitely happy I stumbled upon it and I'll be bookmarking it and
checking back often!
Also see my page - Supply Water

Anonymous said...

It's perfect time to make some plans for the long run and it is time to be happy. I have read this submit and if I could I wish to recommend you some attention-grabbing things or advice. Maybe you can write next articles referring to this article. I want to read more things approximately it!

Also visit my homepage -

Anonymous said...

When some one searches for his required thing, so he/she wishes to be available that in detail,
therefore that thing is maintained over here.

Visit my blog ::

Anonymous said...

Hi, I do believe this is a great blog. I stumbledupon it ;) I am
going to come back once again since I bookmarked it. Money and freedom is the best way to
change, may you be rich and continue to help others.

Feel free to surf to my blog ::

Anonymous said...

My partner and I absolutely love your blog and find the majority of your post's to be precisely what I'm looking for.
Does one offer guest writers to write content for you?
I wouldn't mind writing a post or elaborating on a lot of the subjects you write with regards to here. Again, awesome site!

My webpage -

Anonymous said...

With havin so much content do you ever run into any
problems of plagorism or copyright violation?
My site has a lot of unique content I've either created myself or outsourced but it appears a lot of it is popping it up all over the web without my agreement. Do you know any ways to help prevent content from being ripped off? I'd really appreciate it.

Review my website:

Anonymous said...

Hey there! I'm at work browsing your blog from my new apple iphone! Just wanted to say I love reading your blog and look forward to all your posts! Keep up the superb work!

Here is my web page;

Anonymous said...

A person necessarily lend a hand to make significantly
posts I would state. This is the first time I frequented
your website page and thus far? I surprised with the analysis you made to create this particular put up incredible.
Great task!

Also visit my web-site -

Post a Comment

You can Ask anything that you like!!!!

Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | cna certification