SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
[Your First Book about Ethical Hacking and Penetration Testing Just Using a Browser]
[PENETRATION TESTING USING FIREFOX ADD-ON]
FIREBUG:HTTPFOX:HACKBAR:TAMPER DATA:GROUNDSPEED
XSS-ME:WAPPALYZER:SQL INJECT ME:FOXYPROXY:FLAGFOX
WEB DEVELOPER:FOXYSPIDER:ANONYMOX:CRYPTOFOX:WORLDIP:GHOSTERY
[SRIKANTA SEN] | Certified Ethical Hacker
2
Foreword
For budding ethical hackers or penetration tester, it is difficult to collect or download the tools used for
ethical hacking or penetration testing. What is the tool name? Where can I get the tools? How to use the
tools? How much memory is required to install the tool etc, these are the common question that comes in
mind. As a result they run away from this most promising career opportunity.
So I used a single window (Firefox Browser) and add some tools (Plug-in) one by one to make it a
penetration testing platform. The advantage is that “Firefox Browser” is free and the Plug-in described in
the book is also freely available and trust me it does not occupy too much of memory space in computer.
Moreover I believe that, all the ethical hacker and penetration testing community should know about the
Plug-in developers.
Penetration testing domain is huge, this book does not tech you penetration testing in a methodical way or
will make you an expert penetration tester, but I believe that, “this should be the first book if you want to
learn basics of penetration testing”.
It is assumed that reader knows basics of HTML, JavaScript, and some Sql syntax and has basic
understanding of networking concept.
Author is aware of trademark claim and has no intention of violating the trademark about any Plug-in,
company name or Software mentioned in this book.
I should finish it by thanking the entire ISOEH research team, who constantly gave constructive input for the
betterment of this book.
Any words can be mailed to srikantasen@gmail.com. 
Date: 01-jan-2015
3
Copyright Notice
THE TOPICS DISCUSSED IN THIS BOOK SHOULD NOT BE COPIED OR REPRODUCED UNLESS
SPECIFIC PERMISSIONS HAVE BEEN GIVEN TO YOU BY THE AUTHOR SRIKANTA SEN.
ANY UNAUTHORIZED USE; DISTRIBUTION OF FULL OR ANY PART OF THIS BOOK IS STRICTLY DISCOURAGED.
Liability Disclaimer
THE TERM “HACKING” SHOULD BE READ AND UNDERSTOOD AS “ETHICAL HACKING”. “ETHICAL
HACKING” AND “PENETRATION TESTING” ARE INTERCHANGEABLYUSED IN THIS BOOK. AUTHOR
IS NOT AGAINST OR IN FAVOR OF ANY ORGANIZATION OR COUNTRY.
NO SUGGESTION OR CRITISISM TO ANY COUNTRY OR ORGANIZATION’S BUSINESS POLICY BY THE AUTHOR.
THE INFORMATION PROVIDED IN THIS EBOOK IS FOR EDUCATIONAL PURPOSES ONLY.
THE EBOOK CREATOR IS NOT RESPONSIBLE FOR ANY MISUSE OF THE INFORMATION PROVIDED.
THE INTENTION OF THIS EBOOK IS TO DEVELOP A DEFENSIVE ATTITUDE IN ETHICAL HACKER / PENTESTER.
ALL FIREFOX PLUG-IN DISCUSSED IN BOOK ARE FREELY AVAILABLE AND CAN BE USED AT YOUR OWN RISK.
Mozilla Firefox (known simply as Firefox) is a free and open-source web browser.
Firefox plug-in/add-on is built outside of Firefox by companies like Adobe Systems and Apple and many individual.
4
Table of Contents Page Number
A. About Penetration Testing: 9-12
1. What is penetration testing?
2. Benefits of penetration testing.
3. Some terms used in Penetration Testing/Ethical hacking.
4. About Ethical Hacking
5. Phases of Ethical Hacking
6. Some Firefox Add-ons and their Uses
7. FireFox Browser version we are using
B. FIREBUG: 13-25
1. What is Firebug
2. Features of Firebug
3. Installation
4. Components
5. Inspect Html
6.Inspect CSS
7.Inspect JavaScript
8.Error handling by firebug
C. HTTPFOX:
1.What is HTTPFOX
2.Features of HTTPFOX
3.Installation
4.Components explained with PHP codes
i)headers
ii)cookies
iii)Query String
iv) Post Data
26-32
5
Table of Contents Page Number
D. HACKBAR: 33-42
1.What is HACKBAR
2.Features of HACKBAR
3.Installation
4.Look of HACKBAR
5. Manual SQL INJECTION demonstrated with HACKBAR
6.Use of SQL, Encryption, Strip spaces and Encoding feature of HACKBAR
E. TAMPER DATA: 43-53
1.What is TAMPERDATA
2.Features of TAMPERDATA
3.Installation
4.Look of TAMPERDATA
5.Components of TAMPERDATA
6.Fields of TAMPERDATA window and their meaning
7.GET and POST methods
8.Understanding HTTP request of TAMPERDATA
9.How to delete element from webpage
10. Decoding password field from webpage
F. GROUNDSPEED: 54-60
1.What is GROUNDSPEED
2.Features of GROUNDSPEED
3.Installation
4.Look of GROUNDSPEED
5.Components of GROUNDSPEED
6.Manipulating webpage data(php code) using GROUNDSPEED
7.Working with hidden value
8.deactivation of Javascript function using GROUNDSPEED
6
Table of Contents
G. XSS-ME:
1.What is XSS
Page Number
61-74
2.Types of XSS
3.Demonstration of XSS with php codes(GET AND POST METHOD)
5.What is XSS-Me
6.Features of XSS-Me
7.Installation
8.Look of XSS-Me
9.Create your own playload in XSS-Me
10.Running automatic test with payloads
H. WAPPALYZER: 75-77
1.What is WAPPALYZER
2.Features of WAPPALYZER
3.Installation
4.Look of WAPPALYZER
I. SQL INJECT ME: 78-85
1.What is SQL injection basic concept
2.About SQL INJECT ME
3.Features of SQL INJECT ME
4.Installation
5.Look of SQL INJECT ME
6.Find admin page and run SQL INJECT ME
7.Running automated attack using SQL INJECT ME
J. FOXYPROXY: 86-95
1.What is PROXY
2.About FOXYPROXY
3.Features of FOXYPROXY
4.Installation

Weitere Àhnliche Inhalte

Was ist angesagt?

無題 1
無題 1無題 1
無題 1s1170034
 
G suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, ChennaiG suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, Chennaivinoth kumar
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancementsVishal Gurujuwada
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016IMMUNIO
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slidesBehrouz Sadeghipour
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentationguest78070f
 
Account Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in RakutenAccount Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in RakutenRakuten Group, Inc.
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Mazin Ahmed
 
Internet security
Internet securityInternet security
Internet securityNishant Pahad
 

Was ist angesagt? (11)

無題 1
無題 1無題 1
無題 1
 
G suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, ChennaiG suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, Chennai
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
Account Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in RakutenAccount Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in Rakuten
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
Internet security
Internet securityInternet security
Internet security
 

Andere mochten auch

Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblySam Bowne
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Sam Bowne
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Sam Bowne
 
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Sam Bowne
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgSam Bowne
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgSam Bowne
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Sam Bowne
 
Beginner's Guide To Digital Marketing
Beginner's Guide To Digital MarketingBeginner's Guide To Digital Marketing
Beginner's Guide To Digital MarketingJon Payne
 
Testing Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeterTesting Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeterBlazeMeter
 
Idiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City CouncilIdiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City CouncilJon Payne
 
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12Practical Malware Analysis Ch12
Practical Malware Analysis Ch12Sam Bowne
 
Practical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProPractical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProSam Bowne
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Sam Bowne
 
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-DisassemblyPractical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-DisassemblySam Bowne
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesSam Bowne
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorSam Bowne
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondSam Bowne
 
Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)varun teja G.V.V
 
Digital Marketing Beginner's Guide
Digital Marketing Beginner's GuideDigital Marketing Beginner's Guide
Digital Marketing Beginner's GuideEric Metelka
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutionssecurityxploded
 

Andere mochten auch (20)

Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
 
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbg
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
 
Beginner's Guide To Digital Marketing
Beginner's Guide To Digital MarketingBeginner's Guide To Digital Marketing
Beginner's Guide To Digital Marketing
 
Testing Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeterTesting Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeter
 
Idiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City CouncilIdiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City Council
 
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12Practical Malware Analysis Ch12
Practical Malware Analysis Ch12
 
Practical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProPractical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA Pro
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
 
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-DisassemblyPractical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-Disassembly
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)
 
Digital Marketing Beginner's Guide
Digital Marketing Beginner's GuideDigital Marketing Beginner's Guide
Digital Marketing Beginner's Guide
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 

Ähnlich wie Ethical hacking firefox plugin6

The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdfThe-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdfprasunkagrawal
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionPaulo R
 
30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess Lancaster30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess LancasterQA or the Highway
 
And I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts UnpluggedAnd I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts UnpluggedTarun Lalwani
 
And i thoughtiknewqtp_preview
And i thoughtiknewqtp_previewAnd i thoughtiknewqtp_preview
And i thoughtiknewqtp_previewSaurabh Singh
 
Fundamentals of Open Source Development
Fundamentals of Open Source DevelopmentFundamentals of Open Source Development
Fundamentals of Open Source DevelopmentOSU Open Source Lab
 
Lindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionLindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionIvy Lindsey
 
0764-kali-linux.pdf
0764-kali-linux.pdf0764-kali-linux.pdf
0764-kali-linux.pdfT17Rockstar
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTcentralohioissa
 
UFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd EdUFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd EdTarun Lalwani
 
E-Mediat: Workshop 2
E-Mediat:  Workshop 2E-Mediat:  Workshop 2
E-Mediat: Workshop 2Beth Kanter
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxlior mazor
 
Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Zack Meyers
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingMuhammad Khizer Javed
 
Resume Search - Online Resume search
Resume Search - Online Resume searchResume Search - Online Resume search
Resume Search - Online Resume searchYuva Raj
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINTJerod Brennen
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security HardeningIda Bagus Budanthara
 

Ähnlich wie Ethical hacking firefox plugin6 (20)

The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdfThe-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
 
30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess Lancaster30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess Lancaster
 
And I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts UnpluggedAnd I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts Unplugged
 
And i thoughtiknewqtp_preview
And i thoughtiknewqtp_previewAnd i thoughtiknewqtp_preview
And i thoughtiknewqtp_preview
 
Fundamentals of Open Source Development
Fundamentals of Open Source DevelopmentFundamentals of Open Source Development
Fundamentals of Open Source Development
 
Lindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionLindsey_FinalTrainingSession
Lindsey_FinalTrainingSession
 
0764-kali-linux.pdf
0764-kali-linux.pdf0764-kali-linux.pdf
0764-kali-linux.pdf
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
UFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd EdUFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd Ed
 
E-Mediat: Workshop 2
E-Mediat:  Workshop 2E-Mediat:  Workshop 2
E-Mediat: Workshop 2
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
 
Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
 
Resume Search - Online Resume search
Resume Search - Online Resume searchResume Search - Online Resume search
Resume Search - Online Resume search
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security Hardening
 
Using Firefox Add-ons: Extensions
Using Firefox Add-ons: ExtensionsUsing Firefox Add-ons: Extensions
Using Firefox Add-ons: Extensions
 

KĂŒrzlich hochgeladen

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...Nguyen Thanh Tu Collection
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 

KĂŒrzlich hochgeladen (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 

Ethical hacking firefox plugin6

  • 1. [Your First Book about Ethical Hacking and Penetration Testing Just Using a Browser] [PENETRATION TESTING USING FIREFOX ADD-ON] FIREBUG:HTTPFOX:HACKBAR:TAMPER DATA:GROUNDSPEED XSS-ME:WAPPALYZER:SQL INJECT ME:FOXYPROXY:FLAGFOX WEB DEVELOPER:FOXYSPIDER:ANONYMOX:CRYPTOFOX:WORLDIP:GHOSTERY [SRIKANTA SEN] | Certified Ethical Hacker
  • 2. 2 Foreword For budding ethical hackers or penetration tester, it is difficult to collect or download the tools used for ethical hacking or penetration testing. What is the tool name? Where can I get the tools? How to use the tools? How much memory is required to install the tool etc, these are the common question that comes in mind. As a result they run away from this most promising career opportunity. So I used a single window (Firefox Browser) and add some tools (Plug-in) one by one to make it a penetration testing platform. The advantage is that “Firefox Browser” is free and the Plug-in described in the book is also freely available and trust me it does not occupy too much of memory space in computer. Moreover I believe that, all the ethical hacker and penetration testing community should know about the Plug-in developers. Penetration testing domain is huge, this book does not tech you penetration testing in a methodical way or will make you an expert penetration tester, but I believe that, “this should be the first book if you want to learn basics of penetration testing”. It is assumed that reader knows basics of HTML, JavaScript, and some Sql syntax and has basic understanding of networking concept. Author is aware of trademark claim and has no intention of violating the trademark about any Plug-in, company name or Software mentioned in this book. I should finish it by thanking the entire ISOEH research team, who constantly gave constructive input for the betterment of this book. Any words can be mailed to srikantasen@gmail.com.  Date: 01-jan-2015
  • 3. 3 Copyright Notice THE TOPICS DISCUSSED IN THIS BOOK SHOULD NOT BE COPIED OR REPRODUCED UNLESS SPECIFIC PERMISSIONS HAVE BEEN GIVEN TO YOU BY THE AUTHOR SRIKANTA SEN. ANY UNAUTHORIZED USE; DISTRIBUTION OF FULL OR ANY PART OF THIS BOOK IS STRICTLY DISCOURAGED. Liability Disclaimer THE TERM “HACKING” SHOULD BE READ AND UNDERSTOOD AS “ETHICAL HACKING”. “ETHICAL HACKING” AND “PENETRATION TESTING” ARE INTERCHANGEABLYUSED IN THIS BOOK. AUTHOR IS NOT AGAINST OR IN FAVOR OF ANY ORGANIZATION OR COUNTRY. NO SUGGESTION OR CRITISISM TO ANY COUNTRY OR ORGANIZATION’S BUSINESS POLICY BY THE AUTHOR. THE INFORMATION PROVIDED IN THIS EBOOK IS FOR EDUCATIONAL PURPOSES ONLY. THE EBOOK CREATOR IS NOT RESPONSIBLE FOR ANY MISUSE OF THE INFORMATION PROVIDED. THE INTENTION OF THIS EBOOK IS TO DEVELOP A DEFENSIVE ATTITUDE IN ETHICAL HACKER / PENTESTER. ALL FIREFOX PLUG-IN DISCUSSED IN BOOK ARE FREELY AVAILABLE AND CAN BE USED AT YOUR OWN RISK. Mozilla Firefox (known simply as Firefox) is a free and open-source web browser. Firefox plug-in/add-on is built outside of Firefox by companies like Adobe Systems and Apple and many individual.
  • 4. 4 Table of Contents Page Number A. About Penetration Testing: 9-12 1. What is penetration testing? 2. Benefits of penetration testing. 3. Some terms used in Penetration Testing/Ethical hacking. 4. About Ethical Hacking 5. Phases of Ethical Hacking 6. Some Firefox Add-ons and their Uses 7. FireFox Browser version we are using B. FIREBUG: 13-25 1. What is Firebug 2. Features of Firebug 3. Installation 4. Components 5. Inspect Html 6.Inspect CSS 7.Inspect JavaScript 8.Error handling by firebug C. HTTPFOX: 1.What is HTTPFOX 2.Features of HTTPFOX 3.Installation 4.Components explained with PHP codes i)headers ii)cookies iii)Query String iv) Post Data 26-32
  • 5. 5 Table of Contents Page Number D. HACKBAR: 33-42 1.What is HACKBAR 2.Features of HACKBAR 3.Installation 4.Look of HACKBAR 5. Manual SQL INJECTION demonstrated with HACKBAR 6.Use of SQL, Encryption, Strip spaces and Encoding feature of HACKBAR E. TAMPER DATA: 43-53 1.What is TAMPERDATA 2.Features of TAMPERDATA 3.Installation 4.Look of TAMPERDATA 5.Components of TAMPERDATA 6.Fields of TAMPERDATA window and their meaning 7.GET and POST methods 8.Understanding HTTP request of TAMPERDATA 9.How to delete element from webpage 10. Decoding password field from webpage F. GROUNDSPEED: 54-60 1.What is GROUNDSPEED 2.Features of GROUNDSPEED 3.Installation 4.Look of GROUNDSPEED 5.Components of GROUNDSPEED 6.Manipulating webpage data(php code) using GROUNDSPEED 7.Working with hidden value 8.deactivation of Javascript function using GROUNDSPEED
  • 6. 6 Table of Contents G. XSS-ME: 1.What is XSS Page Number 61-74 2.Types of XSS 3.Demonstration of XSS with php codes(GET AND POST METHOD) 5.What is XSS-Me 6.Features of XSS-Me 7.Installation 8.Look of XSS-Me 9.Create your own playload in XSS-Me 10.Running automatic test with payloads H. WAPPALYZER: 75-77 1.What is WAPPALYZER 2.Features of WAPPALYZER 3.Installation 4.Look of WAPPALYZER I. SQL INJECT ME: 78-85 1.What is SQL injection basic concept 2.About SQL INJECT ME 3.Features of SQL INJECT ME 4.Installation 5.Look of SQL INJECT ME 6.Find admin page and run SQL INJECT ME 7.Running automated attack using SQL INJECT ME J. FOXYPROXY: 86-95 1.What is PROXY 2.About FOXYPROXY 3.Features of FOXYPROXY 4.Installation