Saturday, 28 December 2013

How to find admin pages

Today im gonna show how to find admin panels when you have info to login.

There's a few options to find it.

1) Adding to URL

http://www.site.com/admin
http://www.site.com/administrator
http://www.site.com/admin.php
http://www.site.com/login

2) Online scanning (Link is at the end)



3) Perl scripts (Script and Active Perl link will be on end of this page)

For this you will need install Active Perl...

4) Programs (Links at the end of the thread)

You can use Havij or Reiluke's admin finder

5) Scan ports (Link at the end of the thread)

For that use nMap.First you need to get your websites IP address.
Go to cmd (start>run>cmd) and type ping site.com (without http://www. After that paste the IP in nMap and click 'Scan'
When finished pick tab 'Ports/computers'


6) Crawl website (Link + crack to acunetix)

Just scan all files and folders on site.Acunetix is the right tool

7) robots.txt

Check robots.txt
http://www.site.com/robots.txt

7) Google

Dork: site:webpage.com "admin"
site:webpage.com "login"

Downloads and links:

Online scanner -> http://sc0rpion.ir/af/

Download Perl -> http://www.activestate.com/activeperl/downloads
Perl script -> http://pastebin.com/WWZszURW

Havij (Uploaded by me) -> http://www.mediafire.com/download.php?s2iiaabz87i7t8a
Reiluke admin finder (Uploaded by me) -> Automatic download

nMap -> http://nmap.org/download.html

Acunetix (Uploaded by me) -> http://www.mediafire.com/download.php?vam13z7pe1b85kl

Password for locker .rar is

www.reiluke.i.ph

Related Posts:

  • Introduction To Armitage in Kali Introduction To Armitage in Kali Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits … Read More
  • Tor in Kali Linux Installing Tor in Kali Linux What is Tor? Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal… Read More
  • Hack facebook , gmail with Social Engineering Toolkit Social Engineering Toolkit Humans are the weakest link in any security system ~Shashwat (That'll be me) Social engineering toolkit does not exploit vulnerability in the mechanism of any service. It exploits the weakness … Read More
  • Hack Windows 8 Java vulnerability Java signed applet Hack Windows 8 Java vulnerability In this tutorial we will look at how difficult it can be to hack modern operating systems.  Hack any Window… Read More
  • Add new exploits to Metasploit from Exploit-db Exploit-db As usual, a few official words from the developers before I express my personal views. The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for u… Read More

0 comments:

Post a Comment