Download - Incognito
![Page 1: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/1.jpg)
INCOGNITO-ANHACKING APPLICATION
CREATED BY
Shatadru Chattopadhyay
Chirag Gandhi
![Page 2: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/2.jpg)
![Page 3: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/3.jpg)
INCOGNITO TECHNIQUES
S
QL Injection
B
anner Grabbing
P
ort Scanning
C
ross Site Scripting
R
emote File Inclusion
L
ocal File Inclusion
![Page 4: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/4.jpg)
STRUCTURE INCOGNITO
C
lass Diagram
U
se Case Diagram
![Page 5: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/5.jpg)
SECURITY THREAT: HIGH
![Page 6: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/6.jpg)
WHAT IS SQLI???
S
QLI is a technique by which we use a loophole in the
website to access contents of database.
N
ow let us check an SQLI vulnerable site and lets see
what it allows us to do
![Page 7: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/7.jpg)
POINTS OF ATTACK
E
rror Message
V
ulnerable Links
D
isplay of username
![Page 8: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/8.jpg)
DEFICIENCIES OF INCOGNITO
B
lind SQLI• E.g.:-www.poder360.com
C
an be used even to hack the website
![Page 9: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/9.jpg)
SECURITY THREAT: MEDIUM
B
anner Grabbing
P
ort Scanner
![Page 10: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/10.jpg)
BANNER GRABBING
I
t is a way of obtaining information about a server
I
f such information is doled out by the server than it
makes it more susceptible to network hacking!!!!
![Page 11: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/11.jpg)
WHAT USE IS INCOGNITO?
I
t would List all information about the websites
server if protected it would not be of much
importance but if not then it can in a real big way
hamper the server.
![Page 12: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/12.jpg)
PORT SCANNER
![Page 13: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/13.jpg)
WHAT INCOGNITO DOES???
I
t scans ports itself without any external program.
N
ormally all scanning is done by using NMAP
I
f one wants to compare results using INCOGNITO then
one can use NMAP and also use command prompt netstat -
a
![Page 14: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/14.jpg)
TYPES OF SCAN
I
t scans specific ports
I
t scans important ports
I
t scans all ports
H
IGHLIGHT:- It uses multithreading to return results faster
![Page 15: Incognito](https://reader035.vdocument.in/reader035/viewer/2022081519/5565563ed8b42a9a3a8b4849/html5/thumbnails/15.jpg)
WHY IS INCOGNITO SPECIAL?
H
acking Applications are never made in Java
P
ython or C is generally used for it
S
econdly the vast amount of options available with it
is generally never clubbed into one single software