Top Banner
INCOGNITO-AN HACKING APPLICATION CREATED BY Shatadru Chattopadhyay Chirag Gandhi
15

Incognito

May 27, 2015

Download

Technology

Incognito is a special hacking application developed by us...Final Year btech students...with available resources we can commercialize it...this is just half the project
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Incognito

INCOGNITO-ANHACKING APPLICATION

CREATED BY

Shatadru Chattopadhyay

Chirag Gandhi

Page 2: Incognito
Page 3: Incognito

INCOGNITO TECHNIQUES

S

QL Injection

B

anner Grabbing

P

ort Scanning

C

ross Site Scripting

R

emote File Inclusion

L

ocal File Inclusion

Page 4: Incognito

STRUCTURE INCOGNITO

C

lass Diagram

U

se Case Diagram

Page 5: Incognito

SECURITY THREAT: HIGH

Page 6: Incognito

WHAT IS SQLI???

S

QLI is a technique by which we use a loophole in the

website to access contents of database.

N

ow let us check an SQLI vulnerable site and lets see

what it allows us to do

Page 7: Incognito

POINTS OF ATTACK

E

rror Message

V

ulnerable Links

D

isplay of username

Page 8: Incognito

DEFICIENCIES OF INCOGNITO

B

lind SQLI• E.g.:-www.poder360.com

C

an be used even to hack the website

Page 9: Incognito

SECURITY THREAT: MEDIUM

B

anner Grabbing

P

ort Scanner

Page 10: Incognito

BANNER GRABBING

I

t is a way of obtaining information about a server

I

f such information is doled out by the server than it

makes it more susceptible to network hacking!!!!

Page 11: Incognito

WHAT USE IS INCOGNITO?

I

t would List all information about the websites

server if protected it would not be of much

importance but if not then it can in a real big way

hamper the server.

Page 12: Incognito

PORT SCANNER

Page 13: Incognito

WHAT INCOGNITO DOES???

I

t scans ports itself without any external program.

N

ormally all scanning is done by using NMAP

I

f one wants to compare results using INCOGNITO then

one can use NMAP and also use command prompt netstat -

a

Page 14: Incognito

TYPES OF SCAN

I

t scans specific ports

I

t scans important ports

I

t scans all ports

H

IGHLIGHT:- It uses multithreading to return results faster

Page 15: Incognito

WHY IS INCOGNITO SPECIAL?

H

acking Applications are never made in Java

P

ython or C is generally used for it

S

econdly the vast amount of options available with it

is generally never clubbed into one single software