Saturday, 26 November 2011

How to Add Meta Tags to Blogger Blogs for SEO


Adding Meta Tags are Most Important for SEO your blog. In this Blogger tutorial I will show you the best way to add meta tags to your Blogger blog (Blogspot blog) to improve the your Blogger SEO platform.

First of all, I would like to teach you about Meta Tags what are we going to our blogger Blog. If you are totally new and ignore about meta tags read the passage below about Meta Tags.

What are Meta Tags?
Meta tags are HTML tags that provide additional information about your blog that is unseen by visitors but available to search engines. The meta description tag, for example, provides a short summary of the page content. The keyword meta tags show the keywords and keyword phrases a visitor might use to find your blog. Because of abuse of meta tags search engines have become smarter and most no longer place emphasis on keywords to establish page ranking however keyword meta tags are still used by some search engines so it is a good idea to include them.

Know about Limitations of Blogger and SEO
Blogger is not properly Optimized Seo friendly. Meta descriptions and keywords are not supported by blogger.com by default. Title tags are also not optimized. But where is will there is a way. The webmaster has made a way to use Meta Tags to Blogger blogs. But a disgusting matter is you will have to add all the Meta Tags all alone and manually.

How to Add Meta Tags to a Blogger Blogspot Blog Home Page?

Follow the following steps to add Meta Tags To your blog correctly.

Step:1 Login to Blogger account.
Step:2 Navigate to Design > Edit HTML
Step:3 Click on Download Full Template for your security purpose.
Step:4 Check the Expand Widget Templates box then..
Step:5 Press (Ctrl+F) to Find the lines below which will be near the top of your template:

<head>
<b:include data='blog' name='all-head-content'/>
<title><data:blog.pageTitle/></title>

Step:6 Paste the following code immediately below
<title><data:blog.pageTitle/></title>

<b:if cond='data:blog.url == data:blog.homepageUrl'>
<meta content='Your blog description here' name='description'/>
<meta content='Your blog keywords here(separate by commas)'
name='keywords'/>
</b:if>

Step:7 Enter your blog description between the single quote marks under description. Maximum 150 characters

Step:8 Enter the keywords of your blog between the single quote marks under keywords. But Keywords are not so important now-a-days. Because most of the popular search engine has cancelled keywords as a part of SEO. Like: Google, Yahoo, Bing blah blah blah.

After adding the codes your Meta tags look like this below (it is an example):

<b:if cond='data:blog.url == data:blog.homepageUrl'>
<meta content='Find tips,tricks,tutorials,walkthroughs to customize your Blogger Blogspot blog.SEO,Banners,Adsense,gadgets,fixes,feeds,rss,help for beginner bloggers' name='description'/>
<meta content='blog,blogger,blogger.com,blogspot.com,blogspot,blogging,
tutorials,tips,blogger help,customize blogger,SEO,make money,gadgets,Google Adsense,banners, feeds,analytics,solutions
'
name='keywords'/>
</b:if>

Step:9 Click on the Save Template button.

Step:10 To see your description in action you can either navigate to your blog's home page and click on view source in your browser. In Internet Explorer you will find this option in the view menu. A text document will appear which you can scroll through. You will see your description near the top of the document. Alternatively you can check your description in a free Meta Tag Analyzer tool such as Submit Express or SEO Centro
Tuesday, 2 August 2011

Most Important Web Address Not Allowed By People



I regularly check Google’s robots.txt as well as sitemap.xml pages (YES, Google does have a Google sitemap), with hope of finding new and interesting places to study.
Previously I wrote about Google’s unseen parts which could be found in Google’s robots.txt. Now I’m taking you trough some places found in Google’s sitemap.xml (please note that there are a lot of other pages in that sitemap which I will not write about, so go check them out):

The pages

Basic Google search WITHOUT ADS – This has got to be my nicest find, and I’ll be sure to bookmark it and use it a lot more than the usual Google. Don’t remove the &output=googleabout from the URL, because it will not work otherwise.
An old advertisment page – An old advertisment page where we find the first Google AdWords Select program.
Solutions for Financial Services (metrics) – A page with some really interesting Google stats, dated November 2005.
Jumpstart – If you’re a new advertiser planning to spend at least 50 U.S. dollars a day on AdWords, our Jumpstart specialists will use their extensive knowledge of AdWords to create a customized campaign that you can modify and use as a model for future campaigns.
Advertising Demos and Guides – Some really nice advertising tutorials, demos and guides.
10 Tips for Enterprise Search – Use these tips to find, index, and rank pages on your company websites more effectively as you improve your users’ search experience.
The last Adwords newsletter – dated July 2004, with some really nice sidebar stats.
Guidelines for Third Party Use of Google Brand Features – ALL the Google trademarks for all their services. The page also provides guidelines for the use of Google’s brand features.
The Google Web Directory – A page which is not public anymore, listing some nice infos and facts about the Google Directory.
Google Corporate contact page – Which is not public anymore, for some time now, and where we find some OTHER phone numbers than the ones used these days in their current contact page (go ahead and compare the phones below with the ones that are now in their contact pages):
Google Inc.
1600 Amphitheatre Parkway
Mountain View CA 94043
phone: (650) 623-4000
fax: (650) 618-1499
Security Issues E-mails – You will find e-mails and send reports regarding security problems with any of Google’s services, systems, or networks. Quite useful.
Google dance 2002 and Google Dance 2003 – A funny Dance competition Google organized back then. Lots of never before seen photos of Googler’s and the Plex.
Notification of Account Termination for My-Deja Email Accounts – I actually don’t know what exactly the heck this is (I do have a basic ideea), but I’ll mention it anyway.
Google Jobs@Britney – I think it’s some test page of their spelling suggestion system. Anyway, I think I should report that page in the right spam report place, because it uses keyword stuffing :D
Google Lunar Jobs – Google is interviewing candidates for engineering positions at their lunar hosting and research center, opening late in the spring of 2007. Nice huh ?
Some Lunar jobs test page – A test/saved page which (I think) got left on the server. ANyway, you can re-see the old Google interface.
Add Google buttons to Netscape – Some really old page with info’s on how to put favourite bookmarks in Netscape’s browser (page not public anymore).
PDF Form Request your permission to use Google’s brand features.
Googlers in the Halloween Spirit – Some cool pictures with Googlers from 2000′s Halloween Party.
SEARCH AND DEPLOY – The race to build a better search engine – The New Yorker, May 29, 2000 © Michael Specter 2000. May not be reprinted without permission.
Google’s Zeitgeist 2001 Timeline – A neat Zeitgeist 2001 press timeline with some nice coverage and info’s. Offcourse it’s not public anymore ;)
Google’s 3 Billion mark – Google offers immediate access to 3 billion web documents (December 11, 2001)
Google’s 6 Billion mark – Google offers immediate access to 6 billion web documents (February 17, 2004)
Google’s Adsense launch – Google, developer of the award-winning Google search engine, today announced a new self-service option for Google AdSense, a program that enables website publishers to serve ads precisely targeted to the specific content of their individual web pages (June 18, 2003).
ASK.com begins using Google’s PPC program – Ask Jeeves and Google sign $100 million three-year deal (July 18, 2002).
Yahoo! and Google Join Forces – (Now that’s a FIRST) Yahoo! Everywhere and Google join forces to offer award-winning search technology to wireless Internet users (April 10, 2001).
Google Searches Related to America Under Attack – Google searches, stats and graphs from the 9/11/01 event (page not public anymore).
Google US Puzzle Championship – Is your brain feeling under utilized? Not enough mental challenge in your day job?
Fade PSAs – A suggestion gone extinct.
Papers written by Googlers – A partial list of papers written by people now at Google, showing the range of backgrounds of people in Google Engineering.
Online Business presentation page – Google can help your business make more money (yeah right)… Page not public anymore.
1, 2, 3, 4 – What the heck are these PDF documents ?
Improving Google Adwords – The ideas and the engineers that drive online advertising innovation.
Google.org mirror – Exactly that. This page is a perfect mirror of Google.org.

How To Hack Google Hidden Webcam Tips and Tricks


Though I have added this topic in the first page of Google Hacing Tips. But now I will show you the detail of this hacking tips. Enjoy it.

You may know that Personal web cams can be a lot of fun to hack using Google. People leave an amazing number of web cameras out there wide open for anyone to latch onto. Google makes the discovery of these cameras far too easy. While many of them are driveway and office cameras, smaller personal web cams can provide hours of amusement. 
Google hacks used in this episode

Brimsoft cameras - intitle:"Biromsoft WebCam" -4.0 -serial -ask -crack -software -a -the -build -download -v4 -3.01 -numrange:1-10000

Supervisor cam - intitle:"supervisioncam protocol"

Netsnap cameras - intitle:"Live NetSnap Cam-Server feed"

WebcamXP - "powered by webcamXP" "Pro|Broadcast"

EvoCam - intitle:"EvoCam" inurl:"webcam.html"

We hope you enjoy the video, and if you have suggestions for a next episode for the video blog, feel free to leave a note and make a suggestion. 

Hack Google Tips The Best Hacking Tips



Manipulate the google engine by using it to locate mp3 files online as well as some free software, and more! Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find:
Passwords
Software / MP3′s
etc.
Presented below is just a sample of interesting searches that we can send to google to obtain info. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
Try a few of these searches:
intitle:”Index of” passwords modified
allinurl:auth_user_file.txt
“access denied for user” “using password”
“A syntax error has occurred” filetype:ihtml
allinurl: admin mdb
“ORA-00921: unexpected end of SQL command”
inurl:passlist.txt
“Index of /backup”
“Chatologica MetaSearch” “stack tracking:”
And these:
“parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory “Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Name of Singer or album -xxx -html -htm -php -shtml -
opendivx -md5 -md5sums
Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.
METHOD 2
put this string in google search:
intitle:index.of mp3
You only need add the name of the song/artist/singer. Example: intitle:index.of mp3 jackson
METHOD 3
put this string in google search:
inurl:microsoft filetype:iso
You can change the string to watever you want, ex. microsoft to adobe, iso to
zip etc…
“AutoCreate=TRUE password=*”
This searches the password for “Website Access Analyzer”, a Japanese software that creates webstatistics. For those who can read Japanese, check out the
author’s site at: coara.or.jp/~passy/ [coara.or.jp/~passy/]
“http://*:*@www” domainname
This is a query to get inline passwords from search engines (not just Google),
you must type in the query followed with the the domain name without the .com
or .net
Another way is by just typing
“http://bob:bob@www”
“sets mode: +k”
This search reveals channel keys (passwords) on IRC as revealed from IRC chat
logs.
allinurl: admin mdb
Not all of these pages are administrator’s access databases containing
usernames, passwords and other sensitive information, but many are!
allinurl:auth_user_file.txt
DCForum’s password file. This file gives a list of (crackable) passwords,
usernames and email addresses for DCForum and for DCShop (a shopping cart
program(!!!). Some lists are bigger than others, all are fun, and all belong to
googledorks. =)
intitle:”Index of” config.php
This search brings up sites with “config.php” files. To skip the technical
discussion, this configuration file contains both a username and a password for
an SQL database. Most sites with forums run a PHP message base. This file gives
you the keys to that forum, including FULL ADMIN access to the database.
eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops
and IRC bots, suffice it to say that this file contains usernames and passwords
for IRC users.

More Search:

intitle:”DocuShare” inurl:”docushare/dsweb/” -faq -gov -edu
“#mysql dump” filetype:sql
“#mysql dump” filetype:sql 21232f297a57a5a743894a0e4a801fc3
“allow_call_time_pass_reference” “PATH_INFO”
“Certificate Practice Statement” inurl:(PDF | DOC)
“Generated by phpSystem”
“generated by wwwstat”
“Host Vulnerability Summary Report”
“HTTP_FROM=googlebot” googlebot.com “Server_Software=”
“Index of” / “chat/logs”
“Installed Objects Scanner” inurl:default.asp
“MacHTTP” filetype:log inurl:machttp.log
“Mecury Version” “Infastructure Group”
“Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)” ext:log
“Most Submitted Forms and Scripts” “this section”
“Network Vulnerability Assessment Report”
“not for distribution” confidential
“not for public release” -.edu -.gov -.mil
“phone * * *” “address *” “e-mail” intitle:”curriculum vitae”
“phpMyAdmin” “running on” inurl:”main.php”
“produced by getstats”
“Request Details” “Control Tree” “Server Variables”
“robots.txt” “Disallow:” filetype:txt
“Running in Child mode”
“sets mode: +p”
“sets mode: +s”
“Thank you for your order” +receipt
“This is a Shareaza Node”
“This report was generated by WebLog”
( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject
(intitle:”PRTG Traffic Grapher” inurl:”allsensors”)|(intitle:”PRTG Traffic Grapher – Monitoring Results”)
(intitle:WebStatistica inurl:main.php) | (intitle:”WebSTATISTICA server”) -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob
(inurl:”robot.txt” | inurl:”robots.txt” ) intext:disallow filetype:txt
+”:8080″ +”:3128″ +”:80″ filetype:txt
+”HSTSNR” -”netop.com”
-site:php.net -”The PHP Group” inurl:source inurl:url ext:pHp
94FBR “ADOBE PHOTOSHOP”
AIM buddy lists
allinurl:/examples/jsp/snp/snoop.jsp
allinurl:cdkey.txt
allinurl:servlet/SnoopServlet
cgiirc.conf
cgiirc.conf
contacts ext:wml
data filetype:mdb -site:gov -site:mil
exported email addresses
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential
ext:asp inurl:pathto.asp
ext:ccm ccm -catacomb
ext:CDX CDX
ext:cgi inurl:editcgi.cgi inurl:file=
ext:conf inurl:rsyncd.conf -cvs -man
ext:conf NoCatAuth -cvs
ext:dat bpk.dat
ext:DBF DBF
ext:DCA DCA
ext:gho gho
ext:ics ics
ext:ini intext:env.ini
ext:jbf jbf
ext:ldif ldif
ext:log “Software: Microsoft Internet Information Services *.*”
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
ext:nsf nsf -gov -mil
ext:plist filetype:plist inurl:bookmarks.plist
ext:pqi pqi -database
ext:reg “username=*” putty
ext:txt “Final encryption key”
ext:txt inurl:dxdiag
ext:vmdk vmdk
ext:vmx vmx
filetype:asp DBQ=” * Server.MapPath(“*.mdb”)
filetype:bkf bkf
filetype:blt “buddylist”
filetype:blt blt +intext:screenname
filetype:cfg auto_inst.cfg
filetype:cnf inurl:_vti_pvt access.cnf
filetype:conf inurl:firewall -intitle:cvs
filetype:config web.config -CVS
filetype:ctt Contact
filetype:ctt ctt messenger
filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To”
filetype:fp3 fp3
filetype:fp5 fp5 -site:gov -site:mil -”cvs log”
filetype:fp7 fp7
filetype:inf inurl:capolicy.inf
filetype:lic lic intext:key
filetype:log access.log -CVS
filetype:log cron.log
filetype:mbx mbx intext:Subject
filetype:myd myd -CVS
filetype:ns1 ns1
filetype:ora ora
filetype:ora tnsnames
filetype:pdb pdb backup (Pilot | Pluckerdb)
filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net
filetype:pot inurl:john.pot
filetype:PS ps
filetype:pst inurl:”outlook.pst”
filetype:pst pst -from -to -date
filetype:qbb qbb
filetype:QBW qbw
filetype:rdp rdp
filetype:reg “Terminal Server Client”
filetype:vcs vcs
filetype:wab wab
filetype:xls -site:gov inurl:contact
filetype:xls inurl:”email.xls”
Financial spreadsheets: finance.xls
Financial spreadsheets: finances.xls
Ganglia Cluster Reports
haccess.ctl (one way)
haccess.ctl (VERY reliable)
ICQ chat logs, please…
intext:”Session Start * * * *:*:* *” filetype:log
intext:”Tobias Oetiker” “traffic analysis”
intext:(password | passcode) intext:(username | userid | user) filetype:csv
intext:gmail invite intext:http://gmail.google.com/gmail/a
intext:SQLiteManager inurl:main.php
intext:ViewCVS inurl:Settings.php
intitle:”admin panel” +”Powered by RedKernel”
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
intitle:”AppServ Open Project” -site:www.appservnetwork.com
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
intitle:”Big Sister” +”OK Attention Trouble”
intitle:”curriculum vitae” filetype:doc
intitle:”edna:streaming mp3 server” -forums
intitle:”FTP root at”
intitle:”index of” +myd size
intitle:”Index Of” -inurl:maillog maillog size
intitle:”Index Of” cookies.txt size
intitle:”index of” mysql.conf OR mysql_config
intitle:”Index of” upload size parent directory
intitle:”index.of *” admin news.asp configview.asp
intitle:”index.of” .diz .nfo last modified
intitle:”Joomla – Web Installer”
intitle:”LOGREP – Log file reporting system” -site:itefix.no
intitle:”Multimon UPS status page”
intitle:”PHP Advanced Transfer” (inurl:index.php | inurl:showrecent.php )
intitle:”PhpMyExplorer” inurl:”index.php” -cvs
intitle:”statistics of” “advanced web statistics”
intitle:”System Statistics” +”System and Network Information Center”
intitle:”urchin (5|3|admin)” ext:cgi
intitle:”Usage Statistics for” “Generated by Webalizer”
intitle:”wbem” compaq login “Compaq Information Technologies Group”
intitle:”Web Server Statistics for ****”
intitle:”web server status” SSH Telnet
intitle:”Welcome to F-Secure Policy Manager Server Welcome Page”
intitle:”welcome.to.squeezebox”
intitle:admin intitle:login
intitle:Bookmarks inurl:bookmarks.html “Bookmarks
intitle:index.of “Apache” “server at”
intitle:index.of cleanup.log
intitle:index.of dead.letter
intitle:index.of inbox
intitle:index.of inbox dbx
intitle:index.of ws_ftp.ini
intitle:intranet inurl:intranet +intext:”phone”
inurl:”/axs/ax-admin.pl” -script
inurl:”/cricket/grapher.cgi”
inurl:”bookmark.htm”
inurl:”cacti” +inurl:”graph_view.php” +”Settings Tree View” -cvs -RPM
inurl:”newsletter/admin/”
inurl:”newsletter/admin/” intitle:”newsletter admin”
inurl:”putty.reg”
inurl:”smb.conf” intext:”workgroup” filetype:conf conf
inurl:*db filetype:mdb
inurl:/cgi-bin/pass.txt
inurl:/_layouts/settings
inurl:admin filetype:xls
inurl:admin intitle:login
inurl:backup filetype:mdb
inurl:build.err
inurl:cgi-bin/printenv
inurl:cgi-bin/testcgi.exe “Please distribute TestCGI”
inurl:changepassword.asp
inurl:ds.py
inurl:email filetype:mdb
inurl:fcgi-bin/echo
inurl:forum filetype:mdb
inurl:forward filetype:forward -cvs
inurl:getmsg.html intitle:hotmail
inurl:log.nsf -gov
inurl:main.php phpMyAdmin
inurl:main.php Welcome to phpMyAdmin
inurl:netscape.hst
inurl:netscape.hst
inurl:netscape.ini
inurl:odbc.ini ext:ini -cvs
inurl:perl/printenv
inurl:php.ini filetype:ini
inurl:preferences.ini “[emule]”
inurl:profiles filetype:mdb
inurl:report “EVEREST Home Edition ”
inurl:server-info “Apache Server Information”
inurl:server-status “apache”
inurl:snitz_forums_2000.mdb
inurl:ssl.conf filetype:conf
inurl:tdbin
inurl:vbstats.php “page generated”
inurl:wp-mail.php + “There doesn’t seem to be any new mail.”
inurl:XcCDONTS.asp
ipsec.conf
ipsec.secrets
ipsec.secrets
Lotus Domino address books
mail filetype:csv -site:gov intext:name
Microsoft Money Data Files
mt-db-pass.cgi files
MySQL tabledata dumps
mystuff.xml – Trillian data files
OWA Public Folders (direct view)
Peoples MSN contact lists
php-addressbook “This is the addressbook for *” -warning
phpinfo()
phpMyAdmin dumps
phpMyAdmin dumps
private key files (.csr)
private key files (.key)
Quicken data files
rdbqds -site:.edu -site:.mil -site:.gov
robots.txt
site:edu admin grades
site:www.mailinator.com inurl:ShowMail.do
SQL data dumps
Squid cache server reports
Unreal IRCd
WebLog Referrers

Note: This is for informational purposes only. Do not use any of this information for illegal uses. Again, this is for demonstrational purposes. HacknMod is not responsible for your actions and does not promote illegal or malicious actvities.
Monday, 1 August 2011

How To Hack Gmail Cookie Part - 3 The Bost Tips and Tricks


So friends, This is the third part of my Gmail Session Hijacking and Cookie Stealing series on RHA, In the first part I introduced you to the basics and fundamentals of a Session Hijacking attack, In the second part I introduced you to the variety of methods used to capture session cookies. In this part I will tell you how to carry out a session hijacking attack once you have the session cookies.

Cookie Injection With a Firefox WebBrowserNow there are variety of plugins used to inject cookies in your browser, depending on which browser you are using, I would recommend you the use of firefox browser as it supports vast number of cookie injection plugins.


Webdeveloper toolbar is an addon for the firefox browser it makes the process of injecting cookies extremely easy. All you have to do is to install the webdeveloper toolbar, Click on the cookies drop down menu and click on the cookie you want to edit.


Once you have clicked on the edit cookie option, You will be brought to the following screen:


Next replace your cookie value with the victims cookie value.


Now if you have captured cookies using wireshark, then instead of using Webdeveloper toolbar, you can use Cookie injector to inject session cookies directly in to your browser. All you need to do is to press Alt+C after installing the cookie injector and then just paste the wireshark cookie dump and press ok. After you have done so, Just refresh your browser and you will be in victims account.


Note: In order to install Cookie injector script you would need to first install Greasmonkey plugin for firefox
CookieManger is one of my most preferred choice for performing a Session hijacking hijacking, Since it's  very user friendly and extremely easy to use. You can view CookieManager's usage guide here.

Cookie Injection With Google Chrome

If you are too lazy to use firefox for cookie injection, then luckily there are few extensions on google chrome used to inject cookies into your browser and take control of the victims account. One of my favorite cookie injecting extensions is Cookie editor by Philip, It sports a very unfriendly interface.


Drawbacks of Session Hijacking Attack: With so many advantages of a session hijacking attack there are some drawbacks that you also need to know.
1.
First of all cookie stealing becomes useless if victim is using a https://protocol for browsing and end to end encryption is enabled.
2.
Most of the cookies expire once the victims clicks on the logout button and hence the attacker also logs
out of the account.
3.
Lots of websites do not sport parallel logins which also makes cookie stealing useless.

Protection Against A Session Hijacking AttackThe

best way to protect yourself against a session hijacking attack is to use https:// connection each and every time you login to your Facebook, Gmail, Hotmail or any other email account. As your cookies would be encrypted so even if an attacker manages to capture your session cookies he won't be able to do any thing with your cookies.

So freinds, I hope you have enjoyed the Gmail Session hijacking and cookie stealing series, Depending on readers response I might make a tutorial on Facebook Session hijacking too. If you have any questions feel free to ask.

How To Hack Gmail Cookie Part - 2 The Bost Tips and Tricks



In my previous post Gmail Cookie Stealing And Session Hijacking Part 1, I discussed all the basics and fundamentals in order to understand a Session Hijacking attack, If you have not read the part 1, Kindly read the part 1 first in order to get good grasp of the topic.

Well after a tremendous feedback and response of readers on Session hijacking, I thought to extend this topic and write more on it, In this tutorial I will explain you some methods to capture Gmail Gx cookies.

Gmail GX Cookie

In gmail the cookie which authenticates users is called a GX cookie, Now as we cannot use a cookie stealer since by now we don't know any XSS vulnerability in gmail.

Tools You will be required


1.Cain And Abel
2.Network Minner
3.Wireshark

How To Capture Cookies?

Now there are couple of ways you can use to capture unsecured Gmail cookie which depend on the type of network you are on.

Packet Sniffing


 If you are on a Hub based network you can use packet sniffing in order to capture local traffic. You may use any packet sniffer you want to capture cookies, but I would recommend you to either use wireshark or Network Miner because they are quite userfriendly.

Wireshark

Wireshark is my recommended choice if you are on a hub based network and are looking forward to capture an unsecured Gmail Gx Cookie. Here is how you can capture a gmail GX cookie via Wireshark.

Step 1 - First of all download wireshark from the official website and install it.

Step 2 - Next open up wireshark click on analyze and then click on interfaces.

Step 3 - Next choose the appropriate interface and click on start.



Step 4 - The wireshark will now start to capture the traffic, In the mean time log in to your gmail account but make sure that you have selected "Don't use https://" in Gmail account Settings.




Step 5  - Next set the filter to on the top left to http.cookie contains "Gx", What this filter will do is that it will filter out all the traffic for the gmail authentication cookies named as GX.

Step 6 - Once you have found the suitable line of Gmail GX cookie right click on it and click on Copy and then select Bytes (Printable Text Only)

Step 7 - Now you have successfully captured Gmail GX unsecured cookie.

Network Miner

You can also use network miner to capture, it's more easier and userfreindly than wireshark.

Note: You would need a Winpcap before capturing traffic from either Network Miner or Wireshark.

ARP Spoofing Or Man In The Middle Attack:

Now if you are on a switched based lan network, packet sniffing will probably not work for you as the traffic meant for the particular system will only reach it, So packetsniffing becomes useless in Switch based networks.

1. Cain And Abel.

Cain and Abel should be your only choice if you are on windows operating system, You can easily place your self between the victims computer and the gateway and capture all the traffic going through it and hence successfully launching a man in the middle attack, afterwards you can filter out cookie information from the captured traffic. Here is a screenshot of captured traffic from Cain and abel.

2.EtterCap

Now if you are on a linux machine, You should probably use Ettercap as it's one of the best sniffers I have ever played with, With Ettercap you can easily launch a Man in the middle attack(ARP Poisoning) and capture unsecured Gmail GX cookie.


How can I prevent this kind of attack?

So friends till now you might have known the importance of using https:// connections. In order to prevent these kinds of attacks always use a https:// connection or a VPN solution while logging in to your email accounts.

So friends this concludes the part 2 of my series on cookie stealing, In part 3 we will look on variety of different methods used to inject cookies in to our browser to gain access to the account.

How To Hack Gmail Cookie Part 1 The Bost Tips and Tricks


Well I have posted lots of articles on Phishing and keylogging, but today I would like to throw some light on a very useful method which hackers use to hack gmail, facebook and other email accounts i.e. Stealing.  One of the reasons why I am writing this article as there are lots of newbies having lots of misconceptions related to cookie stealing and session hijacking, So I hope this tutorial cover all those misconception and if not all most of them.

What is a Cookie?

A cookie is a piece of code which is used to authenticate a user on a website, In other words when ever you login to a website such as Facebook, Gmail, Orkut etc your browser assigns you a cookie which basically tells the browser that for how long the user should be logged it, Apart of authentication purpose a cookie can be used for variety of different purposes, If you would like to know more about cookie stealing kindly google it up.

What is a Session Token?

After an authentication is completed , A webserver hands the browser a session token which is used because a webserver needs a way to recognize between different connections, If a hacker could capture your session token then it's a cakewalk for the hacker to hack into your gmail, facebook or any other account.

What is a Session Hijacking Attack?

A session hijacking attack is basically an act of capturing session token and injecting it into your own browser to gain acess to victims account.

What is a Cookie Stealer?

A cookie stealer is basically a script used to steal victims authentication cookies, Now for a cookie stealing process to work the website or the webpage should be vulnerable to an XSS attack, This is the most common and widely known misconception among newbies.

How the stealing process work?

1. The attacker creates a PHP script and uploades it to a webhosting site.

2. The attacker then asks the victim to visit that particular link containing the PHP code.

3. Once the victim visits it his/her authentication cookie is saved in a .txt file.

4. Next the attacker uses a cookieinjector or a cookie editor, There are lots of firefox addons, google chrome extensions to do the work for you. Personally I use Cookie manager v1.5.1 as it's quite user friendly.

You can also use the webdeveloper toolbar to do the work for you.

5. The attacker replaces his own cookies with the victims cookies as a result of which the victims session is hijacking

Why it does not work on a website which is not vulnerable to XSS?
It's due to the browser's same origin policy, and according to it the browsers don't allow the javascripts to acess the cookies.

Gmail GX Cookie
By now I believe that I might have cleared lots of misconceptions related to cookie stealing, but all of those information is only good for you if you try to do it practically,  So let's get to the main topic.

In gmail the cookie which authenticates users is called a GX cookie, Now as we cannot use a cookie stealer as by now we don't know any XSS vulnerability in gmail, So if you are on a LAN  you can use wireshark or any other packet sniffer to steal gmail Unsecured GX cookie and use it to gain acess.

Will this hack always work?

Well this trick won't work on all Gmail accounts and as Gmail now offers End to End https:// encryption, Which encrypts the session token so even if we could get our hands on the GX cookie it's useless, but if a user has turned off the End to End https:// encryption in gmail it can work for sure.


I hope you have liked the post uptill now, I will cover the method to steal gmail gx cookies and using it to hack gmail accounts in the next post, So stay tuned !.


Update:Part2 has been published, You can read it here