SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
[Your First Book about Ethical Hacking and Penetration Testing Just Using a Browser]
[PENETRATION TESTING USING FIREFOX ADD-ON]
FIREBUG:HTTPFOX:HACKBAR:TAMPER DATA:GROUNDSPEED
XSS-ME:WAPPALYZER:SQL INJECT ME:FOXYPROXY:FLAGFOX
WEB DEVELOPER:FOXYSPIDER:ANONYMOX:CRYPTOFOX:WORLDIP:GHOSTERY
[SRIKANTA SEN] | Certified Ethical Hacker
2
Foreword
For budding ethical hackers or penetration tester, it is difficult to collect or download the tools used for
ethical hacking or penetration testing. What is the tool name? Where can I get the tools? How to use the
tools? How much memory is required to install the tool etc, these are the common question that comes in
mind. As a result they run away from this most promising career opportunity.
So I used a single window (Firefox Browser) and add some tools (Plug-in) one by one to make it a
penetration testing platform. The advantage is that “Firefox Browser” is free and the Plug-in described in
the book is also freely available and trust me it does not occupy too much of memory space in computer.
Moreover I believe that, all the ethical hacker and penetration testing community should know about the
Plug-in developers.
Penetration testing domain is huge, this book does not tech you penetration testing in a methodical way or
will make you an expert penetration tester, but I believe that, “this should be the first book if you want to
learn basics of penetration testing”.
It is assumed that reader knows basics of HTML, JavaScript, and some Sql syntax and has basic
understanding of networking concept.
Author is aware of trademark claim and has no intention of violating the trademark about any Plug-in,
company name or Software mentioned in this book.
I should finish it by thanking the entire ISOEH research team, who constantly gave constructive input for the
betterment of this book.
Any words can be mailed to srikantasen@gmail.com. 
Date: 01-jan-2015
3
Copyright Notice
THE TOPICS DISCUSSED IN THIS BOOK SHOULD NOT BE COPIED OR REPRODUCED UNLESS
SPECIFIC PERMISSIONS HAVE BEEN GIVEN TO YOU BY THE AUTHOR SRIKANTA SEN.
ANY UNAUTHORIZED USE; DISTRIBUTION OF FULL OR ANY PART OF THIS BOOK IS STRICTLY DISCOURAGED.
Liability Disclaimer
THE TERM “HACKING” SHOULD BE READ AND UNDERSTOOD AS “ETHICAL HACKING”. “ETHICAL
HACKING” AND “PENETRATION TESTING” ARE INTERCHANGEABLYUSED IN THIS BOOK. AUTHOR
IS NOT AGAINST OR IN FAVOR OF ANY ORGANIZATION OR COUNTRY.
NO SUGGESTION OR CRITISISM TO ANY COUNTRY OR ORGANIZATION’S BUSINESS POLICY BY THE AUTHOR.
THE INFORMATION PROVIDED IN THIS EBOOK IS FOR EDUCATIONAL PURPOSES ONLY.
THE EBOOK CREATOR IS NOT RESPONSIBLE FOR ANY MISUSE OF THE INFORMATION PROVIDED.
THE INTENTION OF THIS EBOOK IS TO DEVELOP A DEFENSIVE ATTITUDE IN ETHICAL HACKER / PENTESTER.
ALL FIREFOX PLUG-IN DISCUSSED IN BOOK ARE FREELY AVAILABLE AND CAN BE USED AT YOUR OWN RISK.
Mozilla Firefox (known simply as Firefox) is a free and open-source web browser.
Firefox plug-in/add-on is built outside of Firefox by companies like Adobe Systems and Apple and many individual.
4
Table of Contents Page Number
A. About Penetration Testing: 9-12
1. What is penetration testing?
2. Benefits of penetration testing.
3. Some terms used in Penetration Testing/Ethical hacking.
4. About Ethical Hacking
5. Phases of Ethical Hacking
6. Some Firefox Add-ons and their Uses
7. FireFox Browser version we are using
B. FIREBUG: 13-25
1. What is Firebug
2. Features of Firebug
3. Installation
4. Components
5. Inspect Html
6.Inspect CSS
7.Inspect JavaScript
8.Error handling by firebug
C. HTTPFOX:
1.What is HTTPFOX
2.Features of HTTPFOX
3.Installation
4.Components explained with PHP codes
i)headers
ii)cookies
iii)Query String
iv) Post Data
26-32
5
Table of Contents Page Number
D. HACKBAR: 33-42
1.What is HACKBAR
2.Features of HACKBAR
3.Installation
4.Look of HACKBAR
5. Manual SQL INJECTION demonstrated with HACKBAR
6.Use of SQL, Encryption, Strip spaces and Encoding feature of HACKBAR
E. TAMPER DATA: 43-53
1.What is TAMPERDATA
2.Features of TAMPERDATA
3.Installation
4.Look of TAMPERDATA
5.Components of TAMPERDATA
6.Fields of TAMPERDATA window and their meaning
7.GET and POST methods
8.Understanding HTTP request of TAMPERDATA
9.How to delete element from webpage
10. Decoding password field from webpage
F. GROUNDSPEED: 54-60
1.What is GROUNDSPEED
2.Features of GROUNDSPEED
3.Installation
4.Look of GROUNDSPEED
5.Components of GROUNDSPEED
6.Manipulating webpage data(php code) using GROUNDSPEED
7.Working with hidden value
8.deactivation of Javascript function using GROUNDSPEED
6
Table of Contents
G. XSS-ME:
1.What is XSS
Page Number
61-74
2.Types of XSS
3.Demonstration of XSS with php codes(GET AND POST METHOD)
5.What is XSS-Me
6.Features of XSS-Me
7.Installation
8.Look of XSS-Me
9.Create your own playload in XSS-Me
10.Running automatic test with payloads
H. WAPPALYZER: 75-77
1.What is WAPPALYZER
2.Features of WAPPALYZER
3.Installation
4.Look of WAPPALYZER
I. SQL INJECT ME: 78-85
1.What is SQL injection basic concept
2.About SQL INJECT ME
3.Features of SQL INJECT ME
4.Installation
5.Look of SQL INJECT ME
6.Find admin page and run SQL INJECT ME
7.Running automated attack using SQL INJECT ME
J. FOXYPROXY: 86-95
1.What is PROXY
2.About FOXYPROXY
3.Features of FOXYPROXY
4.Installation

Weitere ähnliche Inhalte

Was ist angesagt?

G suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, ChennaiG suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, Chennaivinoth kumar
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016IMMUNIO
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentationguest78070f
 
Account Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in RakutenAccount Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in RakutenRakuten Group, Inc.
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Mazin Ahmed
 

Was ist angesagt? (11)

無題 1
無題 1無題 1
無題 1
 
G suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, ChennaiG suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, Chennai
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
Account Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in RakutenAccount Fraud Situation and Prevention in Rakuten
Account Fraud Situation and Prevention in Rakuten
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
Internet security
Internet securityInternet security
Internet security
 

Andere mochten auch

Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblySam Bowne
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Sam Bowne
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Sam Bowne
 
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Sam Bowne
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgSam Bowne
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgSam Bowne
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Sam Bowne
 
Beginner's Guide To Digital Marketing
Beginner's Guide To Digital MarketingBeginner's Guide To Digital Marketing
Beginner's Guide To Digital MarketingJon Payne
 
Testing Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeterTesting Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeterBlazeMeter
 
Idiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City CouncilIdiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City CouncilJon Payne
 
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12Practical Malware Analysis Ch12
Practical Malware Analysis Ch12Sam Bowne
 
Practical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProPractical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProSam Bowne
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Sam Bowne
 
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-DisassemblyPractical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-DisassemblySam Bowne
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesSam Bowne
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorSam Bowne
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondSam Bowne
 
Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)varun teja G.V.V
 
Digital Marketing Beginner's Guide
Digital Marketing Beginner's GuideDigital Marketing Beginner's Guide
Digital Marketing Beginner's GuideEric Metelka
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutionssecurityxploded
 

Andere mochten auch (20)

Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
 
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbg
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
 
Beginner's Guide To Digital Marketing
Beginner's Guide To Digital MarketingBeginner's Guide To Digital Marketing
Beginner's Guide To Digital Marketing
 
Testing Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeterTesting Soap/Rest Web Services with JMeter
Testing Soap/Rest Web Services with JMeter
 
Idiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City CouncilIdiots Guide to Digital Marketing - Bristol City Council
Idiots Guide to Digital Marketing - Bristol City Council
 
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12Practical Malware Analysis Ch12
Practical Malware Analysis Ch12
 
Practical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA ProPractical Malware Analysis: Ch 5: IDA Pro
Practical Malware Analysis: Ch 5: IDA Pro
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
 
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-DisassemblyPractical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-Disassembly
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)
 
Digital Marketing Beginner's Guide
Digital Marketing Beginner's GuideDigital Marketing Beginner's Guide
Digital Marketing Beginner's Guide
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 

Ähnlich wie Ethical hacking firefox plugin6

The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdfThe-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdfprasunkagrawal
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionPaulo R
 
30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess Lancaster30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess LancasterQA or the Highway
 
And i thoughtiknewqtp_preview
And i thoughtiknewqtp_previewAnd i thoughtiknewqtp_preview
And i thoughtiknewqtp_previewSaurabh Singh
 
And I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts UnpluggedAnd I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts UnpluggedTarun Lalwani
 
Fundamentals of Open Source Development
Fundamentals of Open Source DevelopmentFundamentals of Open Source Development
Fundamentals of Open Source DevelopmentOSU Open Source Lab
 
Lindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionLindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionIvy Lindsey
 
0764-kali-linux.pdf
0764-kali-linux.pdf0764-kali-linux.pdf
0764-kali-linux.pdfT17Rockstar
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTcentralohioissa
 
UFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd EdUFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd EdTarun Lalwani
 
E-Mediat: Workshop 2
E-Mediat:  Workshop 2E-Mediat:  Workshop 2
E-Mediat: Workshop 2Beth Kanter
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxlior mazor
 
Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Zack Meyers
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingMuhammad Khizer Javed
 
Resume Search - Online Resume search
Resume Search - Online Resume searchResume Search - Online Resume search
Resume Search - Online Resume searchYuva Raj
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINTJerod Brennen
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 

Ähnlich wie Ethical hacking firefox plugin6 (20)

The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdfThe-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
 
30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess Lancaster30 of the best free software test tools in 60 minutes by Jess Lancaster
30 of the best free software test tools in 60 minutes by Jess Lancaster
 
And i thoughtiknewqtp_preview
And i thoughtiknewqtp_previewAnd i thoughtiknewqtp_preview
And i thoughtiknewqtp_preview
 
And I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts UnpluggedAnd I thought I knew QTP - QTP Concepts Unplugged
And I thought I knew QTP - QTP Concepts Unplugged
 
Fundamentals of Open Source Development
Fundamentals of Open Source DevelopmentFundamentals of Open Source Development
Fundamentals of Open Source Development
 
Lindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionLindsey_FinalTrainingSession
Lindsey_FinalTrainingSession
 
0764-kali-linux.pdf
0764-kali-linux.pdf0764-kali-linux.pdf
0764-kali-linux.pdf
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
UFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd EdUFT & QTP Interview Unplugged 2nd Ed
UFT & QTP Interview Unplugged 2nd Ed
 
E-Mediat: Workshop 2
E-Mediat:  Workshop 2E-Mediat:  Workshop 2
E-Mediat: Workshop 2
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
 
Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
 
Resume Search - Online Resume search
Resume Search - Online Resume searchResume Search - Online Resume search
Resume Search - Online Resume search
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security Hardening
 
Using Firefox Add-ons: Extensions
Using Firefox Add-ons: ExtensionsUsing Firefox Add-ons: Extensions
Using Firefox Add-ons: Extensions
 

Kürzlich hochgeladen

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Kürzlich hochgeladen (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Ethical hacking firefox plugin6

  • 1. [Your First Book about Ethical Hacking and Penetration Testing Just Using a Browser] [PENETRATION TESTING USING FIREFOX ADD-ON] FIREBUG:HTTPFOX:HACKBAR:TAMPER DATA:GROUNDSPEED XSS-ME:WAPPALYZER:SQL INJECT ME:FOXYPROXY:FLAGFOX WEB DEVELOPER:FOXYSPIDER:ANONYMOX:CRYPTOFOX:WORLDIP:GHOSTERY [SRIKANTA SEN] | Certified Ethical Hacker
  • 2. 2 Foreword For budding ethical hackers or penetration tester, it is difficult to collect or download the tools used for ethical hacking or penetration testing. What is the tool name? Where can I get the tools? How to use the tools? How much memory is required to install the tool etc, these are the common question that comes in mind. As a result they run away from this most promising career opportunity. So I used a single window (Firefox Browser) and add some tools (Plug-in) one by one to make it a penetration testing platform. The advantage is that “Firefox Browser” is free and the Plug-in described in the book is also freely available and trust me it does not occupy too much of memory space in computer. Moreover I believe that, all the ethical hacker and penetration testing community should know about the Plug-in developers. Penetration testing domain is huge, this book does not tech you penetration testing in a methodical way or will make you an expert penetration tester, but I believe that, “this should be the first book if you want to learn basics of penetration testing”. It is assumed that reader knows basics of HTML, JavaScript, and some Sql syntax and has basic understanding of networking concept. Author is aware of trademark claim and has no intention of violating the trademark about any Plug-in, company name or Software mentioned in this book. I should finish it by thanking the entire ISOEH research team, who constantly gave constructive input for the betterment of this book. Any words can be mailed to srikantasen@gmail.com.  Date: 01-jan-2015
  • 3. 3 Copyright Notice THE TOPICS DISCUSSED IN THIS BOOK SHOULD NOT BE COPIED OR REPRODUCED UNLESS SPECIFIC PERMISSIONS HAVE BEEN GIVEN TO YOU BY THE AUTHOR SRIKANTA SEN. ANY UNAUTHORIZED USE; DISTRIBUTION OF FULL OR ANY PART OF THIS BOOK IS STRICTLY DISCOURAGED. Liability Disclaimer THE TERM “HACKING” SHOULD BE READ AND UNDERSTOOD AS “ETHICAL HACKING”. “ETHICAL HACKING” AND “PENETRATION TESTING” ARE INTERCHANGEABLYUSED IN THIS BOOK. AUTHOR IS NOT AGAINST OR IN FAVOR OF ANY ORGANIZATION OR COUNTRY. NO SUGGESTION OR CRITISISM TO ANY COUNTRY OR ORGANIZATION’S BUSINESS POLICY BY THE AUTHOR. THE INFORMATION PROVIDED IN THIS EBOOK IS FOR EDUCATIONAL PURPOSES ONLY. THE EBOOK CREATOR IS NOT RESPONSIBLE FOR ANY MISUSE OF THE INFORMATION PROVIDED. THE INTENTION OF THIS EBOOK IS TO DEVELOP A DEFENSIVE ATTITUDE IN ETHICAL HACKER / PENTESTER. ALL FIREFOX PLUG-IN DISCUSSED IN BOOK ARE FREELY AVAILABLE AND CAN BE USED AT YOUR OWN RISK. Mozilla Firefox (known simply as Firefox) is a free and open-source web browser. Firefox plug-in/add-on is built outside of Firefox by companies like Adobe Systems and Apple and many individual.
  • 4. 4 Table of Contents Page Number A. About Penetration Testing: 9-12 1. What is penetration testing? 2. Benefits of penetration testing. 3. Some terms used in Penetration Testing/Ethical hacking. 4. About Ethical Hacking 5. Phases of Ethical Hacking 6. Some Firefox Add-ons and their Uses 7. FireFox Browser version we are using B. FIREBUG: 13-25 1. What is Firebug 2. Features of Firebug 3. Installation 4. Components 5. Inspect Html 6.Inspect CSS 7.Inspect JavaScript 8.Error handling by firebug C. HTTPFOX: 1.What is HTTPFOX 2.Features of HTTPFOX 3.Installation 4.Components explained with PHP codes i)headers ii)cookies iii)Query String iv) Post Data 26-32
  • 5. 5 Table of Contents Page Number D. HACKBAR: 33-42 1.What is HACKBAR 2.Features of HACKBAR 3.Installation 4.Look of HACKBAR 5. Manual SQL INJECTION demonstrated with HACKBAR 6.Use of SQL, Encryption, Strip spaces and Encoding feature of HACKBAR E. TAMPER DATA: 43-53 1.What is TAMPERDATA 2.Features of TAMPERDATA 3.Installation 4.Look of TAMPERDATA 5.Components of TAMPERDATA 6.Fields of TAMPERDATA window and their meaning 7.GET and POST methods 8.Understanding HTTP request of TAMPERDATA 9.How to delete element from webpage 10. Decoding password field from webpage F. GROUNDSPEED: 54-60 1.What is GROUNDSPEED 2.Features of GROUNDSPEED 3.Installation 4.Look of GROUNDSPEED 5.Components of GROUNDSPEED 6.Manipulating webpage data(php code) using GROUNDSPEED 7.Working with hidden value 8.deactivation of Javascript function using GROUNDSPEED
  • 6. 6 Table of Contents G. XSS-ME: 1.What is XSS Page Number 61-74 2.Types of XSS 3.Demonstration of XSS with php codes(GET AND POST METHOD) 5.What is XSS-Me 6.Features of XSS-Me 7.Installation 8.Look of XSS-Me 9.Create your own playload in XSS-Me 10.Running automatic test with payloads H. WAPPALYZER: 75-77 1.What is WAPPALYZER 2.Features of WAPPALYZER 3.Installation 4.Look of WAPPALYZER I. SQL INJECT ME: 78-85 1.What is SQL injection basic concept 2.About SQL INJECT ME 3.Features of SQL INJECT ME 4.Installation 5.Look of SQL INJECT ME 6.Find admin page and run SQL INJECT ME 7.Running automated attack using SQL INJECT ME J. FOXYPROXY: 86-95 1.What is PROXY 2.About FOXYPROXY 3.Features of FOXYPROXY 4.Installation