Top 20 OpenSSH Server Best Security Practices
OpenSSH is the implementation of the SSH protocol. OpenSSH is recommended for remote login, making backups, remote file transfer via scp or sftp, and much more. SSH is perfect to keep confidentiality and integrity for data exchanged between two networks and systems. However, the main advantage is server authentication, through the...
[Win Tool] Boot Multiple ISO from USB (MultiBoot USB)
How to create a Multiboot USB Flash Drive that you can use to Boot Multiple ISO Files from USB. Please note that you might need a 8GB-16GB or larger USB flash device to be able to support every bootable ISO entry. I will update and add more Bootable ISO files to the list as I find the time to test them. You can also contact...
MultiSystem - Create a MultiBoot USB from Linux
Custom Multiboot UFD containing your favorite Bootable Live Linux Distributions. Official HomePage: http://liveusb.info/dotclearMultisystem Prerequisites: Ubuntu Linux or Ubuntu Based System (can use an Ubuntu CD or USB) A USB Flash Drive (to use for your MultiBoot USB) Working Internet Connection install-depot-multiboot.s...
Cách chia Subnet nhanh
Dạo trước mình có viết bài Subnet mask và cách chia có trình bày về cách chia Subnet căn bản. Cách tính và nhớ phương phá để chia Subnet có nhiều cách, bài này trình bày...
Subnet mask và cách chia
Subnet là gì?: Hiểu đơn giản vầy. Khi ta chia một Network ra thành nhiều Network nhỏ hơn thì các Network nhỏ này được gọi là Subnet. Vì sao cần phải chia Subnet ma...
Uploading shell by using LFI
================================Required:1. site vuln to lfi2. php knowledge3. browser Mozilla Firefox...================================So... first you find some site vuln to...
Code chmod khi shell không chmod được
Code:<?php@chmod("index.php", 0755);?>Code này chỉ hoạt động tại nơi up load lênVí dụ :Em muốn chmod file index.php tại thư mục ( diễn đàn )thì mấy anh cứ up code đó tại thư mục diễn đàn rồi rồi run file php đó&nb...
Commerce Remote File Upload Vulnerability (/admin/categories.php)
# Exploit Title: [oscommerce remote upload from categories.php]# Google Dork: ["powered by oscommerce"]# Date: [20-November-2010]# Author: [Number 7]#Contact: {an[dot]7[at]live[dot]fr}# Software Link: [http://www.oscommerce.com/solutions/downloads]# Tested on: [windows-linux-FreeBSD-Solar...
Bypassing Linuxconf in Mandrake
If you have used Mandrake (or most any Linux distribution) for any time you've become familiar with the great utility Linuxconf. Linuxconf is installed by default on a Mandrake system and can be used for a score of configuration related tasks. Check out the Linuxconf homepage for more details.You can usually find linuxconf...
Hacking Windows shares from Linux with Samba
A little while ago I did an article on breaking into Windows shares using an automated madirish.bat. If you're not familiar with that article, feel free to read up on Madirish.net (articles Madirish Tutorial 09 and Tutorial 10 in the 'Tech' section). In that article I showed how to use native windows diagnostic commands to...
Connecting To a Remote MySQL Server Securely Using SSH Port Forwarding
Connecting SecurelyOften times utilizing remote MySQL databases is as simply as opening a SSH session to the remote machine and typing 'mysql -u username -p' and using the MySQL command line client. Sometimes, however, this can be cumbersome and you might wish to use a GUI based management tool. This becomes a problem however...
Wireless Hacking with Kismet
The proliferation of wireless networks is sometimes scary when you consider how insecure most wireless configurations are. With a little work, and some technical know-how you can easily break into most wireless networks or simply monitor the wireless traffic flowing all around you. The good news is that setting up a wireless...
SSHatter SSH Brute Forcer
SSHatter is an SSH brute force utility available from http://freshmeat.net/projects/sshatter/?branch_id=70781&release_id=263196. Essentially the tool is comprised of a small Perl file. The utility requires a few non-standard Perl libraries but these are easily installed. You must have Perl installed to use SSHatter.Installing...
Using Netcat to Transfer Files (and Other Mischief)
Netcat is an oft maligned program that can easily be used for many interesting and useful purposes. While many admins have heard of netcat, it is usually in the context of detecting rootkits or evidence of intrusion. The fact that netcat is a favorite tool among malicious hackers does a great disservice to the tool, but it...
Web Hacking Lesson 6 - Arbitrary Code Execution Vulnerabilities
Arbitrary Code Execution VulnerabilitiesNote: If you haven't read Lesson 1 go check it out first for test application install instructions.This type of vulnerability is extremely dangerous. Unsafely written PHP that utilizes system calls and user input could allow an attacker to run an arbitrary command on the filesystem. This...
Web Hacking Lesson 5 - File Upload Vulnerabilities
PHP File Upload ExploitsNote: If you haven't read Lesson 1 go check it out first for test application install instructions.File upload exploits are a common problem with web based applications. In a nutshell this vulnerability hinges on functionality that allows an attacker to upload a script file that can then be executed...
Web Hacking Lesson 4 - File Include Vulnerabilities
PHP File Include VulnerabilitiesNote: If you haven't read Lesson 1 go check it out first for test application install instructions.Along the same lines of SQL injection and XSS, remote file inclusion vulnerabilities rely on the user being able to manipulate variables interpreted by PHP. The most common occurance of this...
Web Hacking Lesson 3 - Brute Force
Brute ForcingNote: If you haven't read Lesson 1 go check it out first for test application install instructions.Brute forcing a web application is a method to bypass traditional authentication checks. Although brute forcing may seem like an attack that a PHP developer might not be able to mitigate, it is actually an important...
Web Hacking Lesson 2 - SQL Injection
SQL InjectionNote: If you haven't read Lesson 1 go check it out first for test application install instructions.SQL injection attacks bear many of the same fundamental hallmarks as XSS attacks. At its core and SQL injection abuses the web application to introduce unintended functionality. SQL injection aims to escape out of...
Web Hacking Lesson 1
This exercise is designed to expose you to several of the top threat vectors facing web based applications, specifically PHP/MySQL applications. 'Threat vector' is a common term used in computer security to connote ways in which an attacker will attempt to compromise a system. System is used in a broad sense here because a compromised...
Brute Forcing PHP MD5 Hashed Passwords
Web Application PasswordsMany PHP based web applications use md5 hashing in order to obscure stored passwords. At first glance this seems like an effective security measure, however upon further examination it becomes clear that this approach does little to secure a password. Let us assume that an attacker somehow captures...
Protecting Your LAMP Site with a Robots.txt Honeypot
One standard form of information discovery and reconnaissance used by malicious attackers is to scan a target website and search for robots.txt files. The robots.txt file is designed to provide instructions to spiders or web crawlers about a site's structure and more importantly to specify which pages and directories the spider...
Creating a Robots.txt Honeypot
One standard form of information discovery and reconnaissance used by malicious attackers is to scan a target website and search for robots.txt files. The robots.txt file is designed to provide instructions to spiders or web crawlers about a site's structure and more importantly to specify which pages and directories the spider...
Bypassing PHP PathInfo
The pathinfo() built-in PHP function is often used by programmers to identify the types of files being specified in URLs. Pathinfo will do simple parsing of path and filenames and present an array of useful attributes such as the base name of the file specified or the file extension of the file specified. The following example...
Hardening PHP from php.ini
PHP's default configuration file, php.ini (usually found in /etc/php.ini on most Linux systems) contains a host of functionality that can be used to help secure your web applications. Unfortunately many PHP users and administrators are unfamiliar with the various options that are available with php.ini and leave the file in it's...
Acidcat CMS v 3.3 (fckeditor) Shell Upload Vulnerability
===[ Exploit ]===[»] http://server/admin/fckeditor/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/asp/connector.asp[»] asp renamed via the .asp;.jpg (shell.asp;.j...
News Script PHP Pro (fckeditor) File Upload Vulnerability
===[ Exploit ]=== ./Iranian HackerZ[»] http://server/[patch]/fckeditor/editor/filemanager/connectors/uploadtest.html[»] Select the "File Upload" To use = php===[ Upload To ]===[»] http://server/[patch]/userfiles/Name F...
Maximus CMS (fckeditor) Arbitrary File Upload Vulnerability
exploit # path/html/FCKeditor/editor/filemanager/connectors/uploadtest.html[!] first find the target hostex: www.site.com or www.target.com/maximusthen # http://site.com/FCKeditor/editor/filemanager/connectors/uploadtest.ht...
Hướng dẫn sử dụng metasploit
1) Giới thiệuMetasploit Framework là một môi trường dùng để kiểm tra ,tấn công và khai thác lỗi của các service. Metasploit được xây dựng từ ngôn ngữ hướng đối tượng Perl, với những components được viết bằng C, assembler, và Python.Metasploit có thể chạy trên hầu hết các hệ điều hành: Linux, Windows, MacOS. Bạn có thể download chương...
Xem pass Gmail bằng Javascript
Add vô bookmark bar của Firefox trong Location để code sau:javascript : var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k<w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g + ' forms');}function z(f){var b=false;for(var...
SQL update
update user set email="hehehe@yahoo.com" where id=1update 'user' set 'email'='mail_cua_minh@yahoo.com' where 'username'='user_admin';update 'table_can_update' set 'ten_pas_can_update'='pas_moi_de_update' where 'ID'='ID_admin';update user set passwd ="e10adc3949ba59abbe56e057f20f883e" where i...
Skill basic command
cat /etc/passwd | cut -f1 -d:hay:cut -f1 -d: /etc/passwdThêm 1 cách tìm path victimBạn đã bao giờ gặp phải 1 site mà nó addon domainxem etc/passwd dek thaynghía qua cái error_log...
Những câu lệnh và thao tác hữu ích trong Ubuntu
Những thao tác và thủ thuật dưới đây có thể sẽ hữu ích cho bạn khi sử dụng Ubuntu cả 2 phiên bản Desktop và Server.sudo: khi sudo được đi kèm trước một dòng lệnh nó sẽ gọi quyền root để thực thi câu lệnh đó, và khi thực thi xong nó sẽ trả lại quyền của user bạn đang dùng.sudo apt-get install package_name: apt-get install sẽ tiến...
Trick to use rdesktop in ubuntu
-0: Hình như giống với mstsc /console-D: No title bar-g: set độ phân giải-z: nén (sẽ chạy nhanh hơn)-r <path>: tự map folder máy thật sang thành ổ mạng.&nb...
Các cách vào Terminal hay nhất (Guake Terminal)
Shortcut bàn phímTrong Ubuntu và Linux Mint, mặc đình phím tắt của terminal là kết hợp giữa Ctrl+Alt+T. Nếu bạn muốn thay đổi phím tắt này để có thể mở terminal theo cách riêng, vào Menu > System> Preferences > Keyboard Shortcuts.Kéo cửa sổ xuống và tìm shortcut for “Run a Terminal”. Nếu bạn muốn...
Cài đặt VirtualBox 4.0
Gỡ bỏ VirtualBox cũ trong máyTùy thuộc vào phiên bản bạn sử dụng, ví dụ với phiên bản 3.2sudo apt-get remove virtualbox-3.2Thêm kho của VirtualBox và cài đặt:Chạy các lệnh sau để thêm và cài ...
Câu lệnh cơ bản ubuntu
Di chuyển / liệt kê các tập tinpwd hiển lên tên thư mục đang làm việc vớicd di chuyển sang thư mục « /home/người_dùng »cd ~/Desktop di chuyển sang thư mục« /home/người_dùng/Desktop...
 
2012 upshell | Header Image by Game Wallpapers
Avatar Gamezine Designed by Cheapest Tablet PC
Supported by Phones 4u