Archive for September, 2012

Nmap in Backtrack

Posted: September 25, 2012 in Backtrack, Hacking
Tags: , ,

Hello friends…

Today I m going to start with Backtrack OS and in that lets start with nmap

Basic Intro to Nmap :

Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing.

It was designed to rapidly scan large networks, although it works fine against single hosts.

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

To install nmap in linux use command
sudo apt-get install namp
or just
apt-get install nmap

nmap -sP   // ping scan scan range from 0-256
nmap -sS   // SYN stealth scan..
nmap -sP  // specifies the range
nmap -sT  // to steal XP TCP ports
nmap -O  // view OS

but it dosent scan all the ports…to scan from port 1 to 65535 then use
nmap -p1-65535 192.168.x.x

if u want to give port number manually then use
nmap -p80,136 192.168.x.x

FIN scan -sF
Null scan -sN
UDP scan -sU
ip protocol scan -sO
Idle scan -sL
version detection -sV
ACK scan -sA
Windowns scan -sW
RPC scan -sR
List scan -sL

and to know more type
nmap -h

if you want to do it graphically then open Zenmap. Zenmap is nothing but graphical interface of Nmap.

If you want video tutorial then  Click Here

Thank you friends….


Dominos India website Hacked

Posted: September 9, 2012 in Hacking News
Tags: , ,

India’s fast food pizza company’s website( has been hacked by a hacker using the handle Maxney who is part of the Turkish Hacker group “Turkish Ajan Hacker Group”.

The Hacker claimed that he compromised the database belong to the Domion’s India. He uploaded the compromised data in eight different pastes in pastebin. He shared the link in their official forum.

The leak contains over 37,000 account details including name, phone number, email address, password and city details. The passwords are in plain text.

The data seems to be legitimate one. Make sure your data is not listed.  If you are one of the victim and use same password anywhere else, then immediately change your password.

Ref : EHN