Hacking

Home PDF Audio

There are various ways to hack, and this topic is quite interesting. As a hobbyist White Hat Hacker, I find there is a lot of knowledge to learn in this field. Here, I will record some methods I’ve explored.

Default Passwords

Some websites, including those of government agencies, still use default passwords. While many companies or users change their default credentials, others fail to do so. Users are often lazy, and passwords like 12345678 are still commonly seen. This is especially true for older or niche systems.

nmap or Netcat

These tools are used to scan the ports of a server. Pay particular attention to commonly used ports such as 80, 22, and 443. For AWS instances, the default username is ec2-user. For Azure instances, it’s azure-user. For Google Cloud instances, the default username is usually ubuntu or google-cloud. For other cloud instances, it’s typically root.

Using the Browser Console

The browser console is useful for inspecting hidden information. Sometimes, critical data is embedded in the HTML or JavaScript code but not visible on the page itself.

Backdoors

In life, backdoors provide unauthorized entry into buildings, often unnoticed or unguarded, such as parking lots or side doors. Similarly, systems may have hidden backdoors that bypass normal security protocols.

Social Engineering

People’s nicknames, birthdays, and social media posts can reveal a lot of personal information. Often, these details are used to construct weak passwords. For Wi-Fi networks, knowing someone’s house number or other identifying details can help in guessing their SSID or password.

SQL Injection

For any input field, testing with ? 1=1 is a common technique to identify vulnerabilities and potential SQL injection points.

Actuator or Health APIs

For API servers, applications like Spring Boot offer an /actuator endpoint that provides machine and application health data. Other web frameworks also have similar functionality that can expose sensitive server details.

Traffic Monitoring

To understand how the frontend interacts with the backend, use proxy applications like Charles Proxy on macOS to record and analyze request logs. This can give you insight into the paths and data exchanges between components.

Limits and Edge Cases of APIs

It’s important to test the limits and edge cases of an API or server. A Distributed Denial of Service (DDoS) attack attempts to overwhelm request limits. Additionally, edge cases are scenarios where APIs might allow access to restricted data. Testing these can help ensure proper access controls are in place.

Admin Panels

Sometimes, admin or internal panels are not adequately protected. It’s worth trying to access paths like /admin or visiting subdomains like admin.xx.com to check if these areas are properly secured.


Back 2025.01.07 Donate