Let's get started!
2hackthis
Wednesday, 10 August 2016
THC Hydra is very prominent online brute-force tool and has been
featured in Null-Byte quite a lot. It is dictionary based, as you will
have to provide a wordlist with possible passwords. You can read the
README here: https://github.com/vanhauser-thc/thc-hydra
We will thereby be focusing on brute forcing email, or more specifically,
SMTP, also known as the Simple Mail Transfer Protocol. It is your
standard protocol for sending electronic mail.
Let's get started!
Let's get started!
Monday, 8 August 2016
Track A Person’s Location while Chatting with him on Facebook, Google + Or Else
The websites or your location are blocked
using IP Address here in my this trick, I am telling you how to track a
person’s location i.e., IP Address by doing a simple chat with him / her
on Facebook, Google+ or any other social network.
If you wants to track anyone’s
location, might be your friend whom you wants to meet for an important
job and he is telling you that he is outside. So, just invite him on
Facebook Chat and say him “hi” or any familiar word which you use.
Now, when you friends do reply, open your windows Command Prompt. Someone call it cmd, some Command or MS-DOS. To open command prompt, search cmd or command prompt in Windows or use Terminal in Linux to input the command.
- Tracking Receiver’s IP Addresses designs
If you like this trick then please Do Share.
Now, when you friends do reply, open your windows Command Prompt. Someone call it cmd, some Command or MS-DOS. To open command prompt, search cmd or command prompt in Windows or use Terminal in Linux to input the command.
- Tracking Receiver’s IP Addresses designs
In Command Prompt, type netstat -a or if you are using any messanger to chat then use netstat -nbt. Now, command prompt will show all your computer’s IP Addresses and Receiver IP Address.
Tracking Location
After getting your friend’s IP Address go to either http://www.whatismyipaddress.com/ or http://www.ip-address.org/. Choose Location Finder and fill your friend’s IP Address and it will show your friend’s Geographic location.If you like this trick then please Do Share.
Eligibility to participate in AdSense
While we can't say whether your site would be
eligible without fully reviewing your application, there are a few
things you can check before applying to see if your site would be a good
fit with AdSense.
- Do you have a website?
You'll need one in order to participate. Read our tips for creating great content so you'll attract users and advertisers to your site. - Are you at least 18 years old?
As noted in our Terms and Conditions, we can only accept applications from applicants who are over 18. - Does your site comply with our program policies?
Check that your site complies with our policies before submitting your application. Keep in mind that we may change our policies at any time, and per our Terms and Conditions, it's your responsibility to keep up-to-date with them. - Has your site been active for at least six months?
In some locations, including China and India, we require your site to have been active for at least six months before it will be considered. We've taken this step to ensure the quality of our advertising network and protect the interests of our advertisers and existing publishers.
Eligibility for hosted accounts
AdSense works with products such as Blogger and YouTube to allow you to create host partner accounts. To be eligible for a hosted AdSense account via Blogger or YouTube, you must first meet certain eligibility requirements. As soon as your blog or channel becomes eligible for monetization via AdSense, you can apply for a new AdSense account and link these products.
Please apply for your new AdSense account via your
Blogger or YouTube account. Note that you won't be able to apply via the
regular AdSense application process. For more information, see: sign up for AdSense via YouTube or make money with your blog.
If you signed up for AdSense through a host partner and you’d like to show ads on your own non-host partner website, then you’ll need to submit a one-time application form.Using Microsoft EXE Programs on Linux
First, enable 32 bit packages:
sudo dpkg --add-architecture i386
Then install key which was used to sign packages:
wget https://dl.winehq.org/wine-builds/Release.key
sudo apt-key add Release.key
Next add the repository to /etc/apt/sources.list or create a *.list under /etc/apt/sources.list.d/ with the following content:
deb https://dl.winehq.org/wine-builds/debian/ DISTRO main
with DISTRO being either wheezy, jessie, stretch or sid
To avoid problems with missing dependencies, Wheezy users should also add the following to /etc/apt/sources.list (if it is not already there):
deb http://ftp.de.debian.org/debian/ oldstable main
Update packages:
sudo apt-get update
Then install (example for the development branch):
sudo apt-get install winehq-devel
or
sudo apt-get install wine:i386
sudo apt-get install wine-bin:i386
If you prefer to use the Staging branch, replace `winehq-devel` with `winehq-staging` in the line above.
If apt-get complains about missing dependencies, install them, then repeat the last two steps (update and install).
All Kali tools in order
All tools and Subtools According to the process of Ethical Hacking in hierachy
- Information Gathering
DNS Analysis, IDS/IPS Identification, Live Host Identification,
Network & Port Scanners, OSINT Analysis, Route Analysis,
SMB Analysis, SMTP Analysis, SNMP Analysis, SSL Analysis
Network & Port Scanners, OSINT Analysis, Route Analysis,
SMB Analysis, SMTP Analysis, SNMP Analysis, SSL Analysis
- Vulnerability Analysis
Cisco Tools, Fuzzing Tools, Stree Testing, VOIP Tools
- Web Application Analysis
CMS & Framework Identification, Web Application Proxies,
Web crawler & Directory Bruteforce, Web Vulnerability Scanners
Web crawler & Directory Bruteforce, Web Vulnerability Scanners
- Database Assesment
- Password Attacks
Offline Attacks, Online Attacks, Passing Hash tools, Password Profiling & Wordlist
- Wireless Attacks
802.11 Wireless Tools, Bluetooth Tools, Other Wireless Tools,
RFID & NFC Tools
RFID & NFC Tools
- Reverse Engineering
- Exploitation Tools
- Sniffing & Spoofing
Network Sniffers, Spoofing and MITM
- Post exploitation
OS Backdoors, Tunneling & Exfiltration, Web Backdoors
- Forensics
Digital Forensics, Forensics Carving Tools, Forensics Imagins Tools,
PDF Forensics Tools, Sleuth Kit Suite
PDF Forensics Tools, Sleuth Kit Suite
- Reporting Tools
- Social Engineering Tools
- System Services
BeEF, Dradis
Subscribe to:
Posts (Atom)