Showing posts with label UBUNTU. Show all posts
Showing posts with label UBUNTU. Show all posts

Brute-Force attack using HYDRA Brute-Force attack using HYDRA

What is BRUTE-FORCE attack ? A password attack that does not attempt to decrypt any information, but continue to try different passwords. Fo...

+ Read more »

How to use R.A.T. through S.E.T? How to use R.A.T. through S.E.T?

RAT is Remote Administration tool , using RAT you can control Remote P.C. ,there are lots of software available for RAT , but they are made ...

+ Read more »

How to install & configure send mail in Ubuntu? How to install & configure send mail in Ubuntu?

Send mail is program which will help you to send email through command, you can send email from terminal or CMD . In this program we use our...

+ Read more »

How to install social engineering toolkit(S.E.T.) in ubuntu? How to install social engineering toolkit(S.E.T.) in ubuntu?

Social Engineering Tool kit is cool tool which came with BACKTRACK, this increase power of metasploit. If you are on any linux system other ...

+ Read more »

How to scan web-server with Nikto? How to scan web-server with Nikto?

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6...

+ Read more »

how to Browser Autopwn attack in metasploit? how to Browser Autopwn attack in metasploit?

In this article we will examine the effectiveness of metasploit browser autopwn module.The basic idea behind that module is that it creates ...

+ Read more »

How to crack wi-fi password in ubuntu? How to crack wi-fi password in ubuntu?

For this purpose we are going to use Ubuntu. First we have to install air-crack program in o.s (1)install aircrack sudo apt-get install airc...

+ Read more »

How to use latest java vulnerability to hack remote p.c. ? How to use latest java vulnerability to hack remote p.c. ?

Today we are going to use metasploit again. We can hack remote computer using java applet to run code outside send-box. This vulnerability i...

+ Read more »

How to crack any hash with help of online services? How to crack any hash with help of online services?

How to crack any hash with help of online services? findmyhash.py try to crack different types of hashes using free online services. (1)Down...

+ Read more »

how to crack md5 hash in ubuntu? how to crack md5 hash in ubuntu?

If you have an password in md5 hash and you need password in plain text for this there is lot of tool and online websites too but they wont ...

+ Read more »

How to install & use SLOWLORIS in ubuntu? How to install & use SLOWLORIS in ubuntu?

(1)Open a browser and go to this URL: ‘http://ha.ckers.org/slowloris‘ (here you can know more about what is SLOWLORIS, & what it can do)...

+ Read more »

HOW TO DO SQL INJECTION FROM LINUX? HOW TO DO SQL INJECTION FROM LINUX?

Here is SQL injection tools for linux. It`s SQLMAP. SQLMAP is python based tool , so you can run in any os which has python installed.So it ...

+ Read more »

Some of  the Cool Metasploit  Metrepreter script Some of the Cool Metasploit Metrepreter script

Getcountermeasure Getcountermeasure is an automated script Disable security measures such as antivirus, firewall, and more. Command:...

+ Read more »

How to jam WIFI network in UBUNTU & BACK TRACK? How to jam WIFI network in UBUNTU & BACK TRACK?

If you have UBUNTU or BACK TRACK installed ,then you can start from step 7 directly you can skip first six step. If you have windows user st...

+ Read more »

Hack Linux OS using METASPLOIT Hack Linux OS using METASPLOIT

The most common use of msfpayload tool is for the generation of shellcode for an exploit that is not currently in the Metasploit Framework o...

+ Read more »

How to Find Email-Address of the domain using metasploit? How to Find Email-Address of the domain using metasploit?

First open your terminal & Type following command msfconsole use auxiliary/gather/search_email_collector show options The next s...

+ Read more »

Some Metasploit Attacks Some Metasploit Attacks

today i will show you Some metasploit attacks. Requirement:- Backtrack. Metasploit. These are just some commands ,there are lots of options ...

+ Read more »

DOS attack from linux using hping3. DOS attack from linux using hping3.

I am here to explain the DoS attacks (with practicals). You all know about DoS attack, Denial-of-Service Attacks. In this attack, attacker d...

+ Read more »

HOW TO run .Exe files with wine ? HOW TO run .Exe files with wine ?

If you run a .exe file with wine and see The file '/home/[username]/example.exe' is not marked as executable. If this was downloaded...

+ Read more »
 
Top