Pular para o conteúdo principal

Postagens

Mostrando postagens de setembro, 2016

Prompt de comando do Windows: 10 comandos que você provavelmente não conhecia

O prompt de comando do Windows (CMD) pode também ser extremamente útil, assim como acontece no Linux. Aliás, no sistema operacional do pinguim, usuários mais experientes e/ou administradores geralmente preferem utilizá-lo, ao invés de interfaces gráficas repletas de “firulas”. A linha de comando é poderosa, precisa e prática, capaz de fornecer resultados de forma muito mais rápida, inúmeras vezes. Temido por uns, amado por outros e desconhecido por muitos, o prompt de comando, entretanto, tem sua razão de ser, e pode, com certeza, ser seu amigo. Vamos agora apresentar 10 comandos que você provavelmente não conhecia. Dez comandos muito úteis, aliás, para você utilizar no prompt de comando do Windows. Esqueça por um momento os já conhecidos e batidos “dir”, “ipconfig”, “cd” e “cls”, e vamos lá. Como abrir o prompt de comando no Windows Para abrir rapidamente o prompt de comando, simplesmente clique no menu “Iniciar”, digite “cmd” (sem aspas) e tecle <ENTER>.

SQLMap with Tor for Anonymity

In a previous tutorial, I had demonstrated how to use SqlMap to carry out Sql Injection on a website . In this tutorial, I will show you how to use Tor to add a layer of obscurity between you and the target website. Installing Tor Getting tor for Kali Linux is as simple as typing a single line in the terminal- apt-get instal tor If you have any problems installing, then do an apt-get update first. Start Tor This is also quite simple tor You'll see something like this- Root@kali: Sep 04 02:41:25.806 [notice] Tor v0.2.8.7 (git-cc2f02ef17899f86) running on Linux with Libevent 2.0.21-stable, OpenSSL 1.0.2h and Zlib 1.2.8. Sep 04 02:41:25.806 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Sep 04 02:41:25.806 [notice] Read configuration file "/etc/tor/torrc". Sep 04 02:41:25.811 [notice] Opening Socks listener on 127.0.0.1:9050 Sep 04 02:41:25.000 [notice]

toriptables2g for GUI Desktop with notification

Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the tor network. Dependencies: tor python-notify sudo apt-get install tor python-notify Usage: toriptables2g.py -h Screenshots: Parrot Security OS Kali Linux, Rolling Edition Ubuntu 16.04.1 LTS (Xenial Xerus) Tor IPTables rules loaded To test: What is my IP address Check Tor Project Witch proxy checker IP leak test DNS leak test To change IP w/o reload: Refresh Check Tor project webpage sudo kill -HUP $( pidof tor ) Distro Specific Fix: Notification error sudo apt-get install mate-notification-daemon >>> https://bitbucket.org/ruped24/toriptables2g/src/

Simple Man-in-the-Middle Script: For Script Kiddies

This Is for the Script Kiddies: This tutorial is about a script written for the How to Conduct a Simple Man-in-the-Middle Attack written by the one and only OTW. Hello script kiddies, Just running a script doesn't give you the understanding of what's going on under the hood. Hence it's not hacking. Please read the the well written tutorial by the OTW before continuing. You will get a good understanding of what's going on under the hood and the tools that are used and why. What This Script Do: It will scan for victims, auto detect local interface and default gateway. Also set up the MitM attack for the victim, router, ipforward, and restore the victim when done. All you need to do is enter the victim's IP Address. That's it. What Tools Are Needed: Kali Linux or any pentesting distro Screenshot: Usage: Read the README.Md sudo ./mitm.py After Target Poisoned: Run sniffers in external terminals Note: Your local interface may differ

Hacking Techniques – Top 10 Hacking Methods for Beginner Hackers

Top 10 Hacking Techniques Used by the Hackers Hacking is a growing threat to every business both large and small. Whether it’s stealing private data, taking control of your computer, or shutting down your website, hackers can seriously impact any business, at any time in a number of ways.Following are the Most used Hacking Techniques by the Hackers. List of Hacking Techniques used by Hackers. SQL injection hacking techniques Cross-site scripting hacking techniques Broken authentication and session management hacking techniques Clickjacking hacking techniques DNS cache poisoning hacking techniques Social engineering hacking techniques Symlinking – An insider hacking techniques Cross-site request forgery hacking techniques Remote code execution hacking techniques DDoS attack – Distributed denial of service hacking techniques Hacking Websites are one of the most the common things right now.And we are going to mention the Hacking techniques used by BlackHats and a

Script Kiddies Kali

Here I've consolidated some of kali's frequently used toolsets. With Kali having north of 300 tools, it can get overwhelming. To find and launch an array of tools and remember their path can cause a brain freeze. I've created what's dubbed the script kiddies Kali that's menu driven. menu.ogv - Google Drive There's just too many folks to give credit to (here) for these great tools. This is a menu for easy access to kali's most used toolsets. The toolsets and menu scripts can be found below: Modify the menu.sh script's path to fit your environment and tools. 1) Killchain –- https://github.com/ruped24/killchain 2) Fuckshitup –- https://github.com/ruped24/fuckshitup 3) Discover -- https://github.com/leebaird/discover 4) Netools –- http://sourceforge.net/projects/netoolsh 5) BBQSQL -- sudo pip install bbqsql 6) Lazykali –- https://github.com/ruped24/Lazykali 7) Tangodown -- http://tinyurl.com/pqagjyw The menu script can be foun