Wednesday 10 August 2016

THC Hydra is very prominent online brute-force tool and has been featured in Null-Byte quite a lot. It is dictionary based, as you will have to provide a wordlist with possible passwords. You can read the README here: https://github.com/vanhauser-thc/thc-hydra



We will thereby be focusing on brute forcing email, or more specifically, SMTP, also known as the Simple Mail Transfer Protocol. It is your standard protocol for sending electronic mail.
Let's get started!


Monday 8 August 2016

Track A Person’s Location while Chatting with him on Facebook, Google + Or Else

The websites or your location are blocked using IP Address here in my this trick, I am telling you how to track a person’s location i.e., IP Address by doing a simple chat with him / her on Facebook, Google+ or any other social network.
 
 

If you wants to track anyone’s location, might be your friend whom you wants to meet for an important job and he is telling you that he is outside. So, just invite him on Facebook Chat and say him “hi” or any familiar word which you use.
Now, when you friends do reply, open your windows Command Prompt. Someone call it cmd, some Command or MS-DOS. To open command prompt, search cmd or command prompt in Windows  or use Terminal in Linux to input the command.


- Tracking Receiver’s IP Addresses designs

In Command Prompt, type netstat -a or if you are using any messanger to chat then use netstat -nbt. Now, command prompt will show all your computer’s IP Addresses and Receiver IP Address.


Tracking Location

After getting your friend’s IP Address go to either http://www.whatismyipaddress.com/ or http://www.ip-address.org/. Choose Location Finder and fill your friend’s IP Address and it will show your friend’s Geographic location.

If you like this trick then please Do Share.

Eligibility to participate in AdSense

While we can't say whether your site would be eligible without fully reviewing your application, there are a few things you can check before applying to see if your site would be a good fit with AdSense.
  • Do you have a website?
    You'll need one in order to participate. Read our tips for creating great content so you'll attract users and advertisers to your site.
  • Are you at least 18 years old?
    As noted in our Terms and Conditions, we can only accept applications from applicants who are over 18.
  • Does your site comply with our program policies?
    Check that your site complies with our policies before submitting your application. Keep in mind that we may change our policies at any time, and per our Terms and Conditions, it's your responsibility to keep up-to-date with them.
  • Has your site been active for at least six months?
    In some locations, including China and India, we require your site to have been active for at least six months before it will be considered. We've taken this step to ensure the quality of our advertising network and protect the interests of our advertisers and existing publishers.
When you're ready, please submit an application. We'll review your application and get back to you by email within about a week.

Eligibility for hosted accounts

AdSense works with products such as Blogger and YouTube to allow you to create host partner accounts. To be eligible for a hosted AdSense account via Blogger or YouTube, you must first meet certain eligibility requirements. As soon as your blog or channel becomes eligible for monetization via AdSense, you can apply for a new AdSense account and link these products.
Please apply for your new AdSense account via your Blogger or YouTube account. Note that you won't be able to apply via the regular AdSense application process. For more information, see: sign up for AdSense via YouTube or make money with your blog.
If you signed up for AdSense through a host partner and you’d like to show ads on your own non-host partner website, then you’ll need to submit a one-time application form.

Using Microsoft EXE Programs on Linux


First, enable 32 bit packages:

sudo dpkg --add-architecture i386

Then install key which was used to sign packages:

wget https://dl.winehq.org/wine-builds/Release.key

sudo apt-key add Release.key

Next add the repository to /etc/apt/sources.list or create a *.list under /etc/apt/sources.list.d/ with the following content:

deb https://dl.winehq.org/wine-builds/debian/ DISTRO main

with DISTRO being either wheezy, jessie, stretch or sid

To avoid problems with missing dependencies, Wheezy users should also add the following to /etc/apt/sources.list (if it is not already there):
deb http://ftp.de.debian.org/debian/ oldstable main

Update packages:
sudo apt-get update

Then install (example for the development branch):
sudo apt-get install winehq-devel
or
sudo apt-get install wine:i386
sudo apt-get install wine-bin:i386

If you prefer to use the Staging branch, replace `winehq-devel` with `winehq-staging` in the line above.

If apt-get complains about missing dependencies, install them, then repeat the last two steps (update and install).

All Kali tools in order


All tools and Subtools According to the process of Ethical Hacking in hierachy
  1. Information Gathering
DNS Analysis, IDS/IPS Identification, Live Host Identification,
Network & Port Scanners, OSINT Analysis, Route Analysis,
SMB Analysis, SMTP Analysis, SNMP Analysis, SSL Analysis
  1. Vulnerability Analysis
Cisco Tools, Fuzzing Tools, Stree Testing, VOIP Tools
  1. Web Application Analysis
CMS & Framework Identification, Web Application Proxies,
Web crawler & Directory Bruteforce, Web Vulnerability Scanners
  1. Database Assesment
  2. Password Attacks
Offline Attacks, Online Attacks, Passing Hash tools, Password Profiling & Wordlist
  1. Wireless Attacks
802.11 Wireless Tools, Bluetooth Tools, Other Wireless Tools,
RFID & NFC Tools
  1. Reverse Engineering
  2. Exploitation Tools
  3. Sniffing & Spoofing
Network Sniffers, Spoofing and MITM
  1. Post exploitation
OS Backdoors, Tunneling & Exfiltration, Web Backdoors
  1. Forensics
Digital Forensics, Forensics Carving Tools, Forensics Imagins Tools,
PDF Forensics Tools, Sleuth Kit Suite
  1. Reporting Tools
  2. Social Engineering Tools
  3. System Services
BeEF, Dradis