INCOGNITO-ANHACKING APPLICATION
CREATED BY
Shatadru Chattopadhyay
Chirag Gandhi
INCOGNITO TECHNIQUES
S
QL Injection
B
anner Grabbing
P
ort Scanning
C
ross Site Scripting
R
emote File Inclusion
L
ocal File Inclusion
STRUCTURE INCOGNITO
C
lass Diagram
U
se Case Diagram
SECURITY THREAT: HIGH
WHAT IS SQLI???
S
QLI is a technique by which we use a loophole in the
website to access contents of database.
N
ow let us check an SQLI vulnerable site and lets see
what it allows us to do
POINTS OF ATTACK
E
rror Message
V
ulnerable Links
D
isplay of username
DEFICIENCIES OF INCOGNITO
B
lind SQLI• E.g.:-www.poder360.com
C
an be used even to hack the website
SECURITY THREAT: MEDIUM
B
anner Grabbing
P
ort Scanner
BANNER GRABBING
I
t is a way of obtaining information about a server
I
f such information is doled out by the server than it
makes it more susceptible to network hacking!!!!
WHAT USE IS INCOGNITO?
I
t would List all information about the websites
server if protected it would not be of much
importance but if not then it can in a real big way
hamper the server.
PORT SCANNER
WHAT INCOGNITO DOES???
I
t scans ports itself without any external program.
N
ormally all scanning is done by using NMAP
I
f one wants to compare results using INCOGNITO then
one can use NMAP and also use command prompt netstat -
a
TYPES OF SCAN
I
t scans specific ports
I
t scans important ports
I
t scans all ports
H
IGHLIGHT:- It uses multithreading to return results faster
WHY IS INCOGNITO SPECIAL?
H
acking Applications are never made in Java
P
ython or C is generally used for it
S
econdly the vast amount of options available with it
is generally never clubbed into one single software