Search This Blog

Powered by Blogger.

How to get an admin password on a work PC in an Active Directory domain?

  ⚙How to get an admin password on a work PC in an Active Directory domain? A) First, find the location of the shortcut for the installed Po...

Saturday, November 7, 2020

Most Wanted Tutorials | Hacking + Refund + Cracking + Much More


 

Most Wanted Tutorials | Hacking + Refund + Cracking + Much More :cyclone:


What you will find :

• Get a FREE Mastercard
•Get refunded for your giftcards
•Get Things from Ebay for Free by Bull-D
•Getting Referrals
•Google SEO Secret Guide
•Guide to making money online
•Guide_-_The_Ultimate_Blackhat_Cash_Machine
•Hack Hotmail
•Hacking Gmail Guide
•Hma CPALEAD Guide
•Hman_CPASecrets#1
•How To Crack WEP In Linux
•How to Get Massive YouTube Traffic
•How To Get Passes To Pornsites
•How To Hack WEP wifi Passwords
•How To Kick Someone Of A Wireless Network (Mustbe LAN-Admin)
•Howto Make $1000’s a Week with Torrents & CPA-PPL
•How To Make A Phisher For A Website
•How to make easy money as an eBay affiliate - Victor V
•How To Make Mozilla Firefox 30 Times Faster


https://mega.nz/file/nhhDhAxI#ukXnH4RaBZwWXPmVsdXb0iYvWpi7Nexzf3H8utVfVL8

Enjoy

BY ABSHQ

:+1::heart:


BY A

HUGE PACK OF COURSES


 HUGE PACK OF COURSES:beginner:


Free course only for you

:star2:CONTAINS :

:point_right:PHOTOGRAPHY
:point_right:ETHICAL HACKING
:point_right:CYBERSECURITY COURSES
:point_right:SEO
:point_right:BITCOIN
:point_right:CRYPTOGRAPGY
:point_right:CYBER FORENSIC
:point_right:DATA MINING
:point_right:BUSINESS COURSES
:point_right:AND MANY MORE THINGS...


:o: Download link:




BY ABSHQ

Friday, November 6, 2020

Calls without a SIM card


 Calls without a SIM card


Perhaps you have had situations when you had to call a person and at the same time remain completely anonymous and not burn your number.

Using a SIM card identifies you with a cell tower closest to you, I'll tell you so if you use the left SIM and call someone using unverified call services, then most likely you will not be able to remain anonymous on the network and your traffic is not encrypted and there is no point from such a SIM card, the place where you are can be tracked.

In this regard, I want to share with you services for calls. in which all traffic passes through the TOR network or simply has a high degree of encryption in the network.

List of sites:

https://tox.chat/
https://www.linphone.org/
https://jitsi.org/
https://www.ringcentral.com/
https://www.mumble.com/

Personally, I myself used the latest service for anonymous calls and I can recommend it to you, but the main thing is that the choice is yours.

I don’t see any reason to tell you about each service, because all the detailed information can be found on these sites, which I indicated above.



By ABSHQ

BEST NETWORK HACKING


 


ARP Poisoning and Sniffing





DHCP Discover and Starvation
Subdomains Identification
Certificate Cloning
TCP Analysis (ISN, Flags)
Username check on social networks
Web Techonologies Identification
and a lot more!

🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :

1) git clone https://github.com/fportantier/habu.git

2) cd habu

3) habu.arp.ping [OPTIONS] IP

A) Send ARP packets to check if a host it's alive in the local network.

Example:

# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding

Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.
habu.arp.poison
Usage: habu.arp.poison [OPTIONS] VICTIM1 VICTIM2

B) Send ARP 'is-at' packets to each victim, poisoning their ARP tables for
send the traffic to your system.

Note: If you want a full working Man In The Middle attack, you need to
enable the packet forwarding on your operating system to act like a
router. You can do that using:

# echo 1 > /proc/sys/net/ipv4/ip_forward

Example:

# habu.arpoison 192.168.0.1 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.70
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
...

Options:
-i TEXT Interface to use
-v Verbose
--help Show this message and exit.
habu.arp.sniff
Usage: habu.arp.sniff [OPTIONS]

C) Listen for ARP packets and show information for each device.

Columns: Seconds from last packet | IP | MAC | Vendor

Example:

1 192.168.0.1 a4:08:f5:19:17:a4 Sagemcom Broadband SAS
7 192.168.0.2 64:bc:0c:33:e5:57 LG Electronics (Mobile Communications)
2 192.168.0.5 00:c2:c6:30:2c:58 Intel Corporate
6 192.168.0.7 54:f2:01:db:35:58 Samsung Electronics Co.,Ltd

Options:
-i TEXT Interface to use
--help Show this message and exit.
habu.asydns
Usage: habu.asydns [OPTIONS]

D) Requests a DNS domain name based on public and private RSA keys using the
AsyDNS protocol https://github.com/portantier/asydns

AND MUCH MORE

BY ABSHQ

Why transfer data in HTTP headers


 Why transfer data in HTTP headers :


1) Usually, predictable technical information is conveyed in HTTP headers, so not all programs for logging and traffic analysis have the function of saving the contents of HTTP headers. For example, Apache usually (it depends on the setting of the log format) stores such HTTP header fields as Referer and User-Agent . If you want, you can configure Apache to save the data submitted by the POST method, but this is usually not done, since the logs begin to take up too much space.

2) As for storing other HTTP header fields, this is in principle possible, but this requires enabling and configuring the mod_log_forensic module , this also happens infrequently, plus storing a large amount of practically unnecessary data.

3) Therefore, there are certain reasons to use HTTP headers for data transfer, since GET requests are saved almost always, POST requests are rarely saved, and HTTP headers are almost never saved.

4) Among the popular applications that use the HTTP header field to transfer data, you can at first recall PhpSploit - "a hidden framework for subsequent exploitation", in short, a Trojan, a PHP backdoor for web servers.





BY ABSHQ

Create OpenSSL Certificate with Ansible


 Create OpenSSL Certificate with Ansible :


1) When working with OpenSSL, public keys are derived from the corresponding private key.

The first step will always be to generate a private key using a specific algorithm.

2) For production use, you need a Certification Authority (CA) or Certification Authority that is responsible for signing a certificate that you can trust on the Internet.

Since we are talking about Dev and Lab use cases, we are creating a self signed certificate.

3) Create OpenSSL Certificate with Ansible
In the examples shown in this article, the private key is named hostname_privkey.pem, the certificate file is hostname_fullchain.pem, and the CSR file is hostname.csr, where hostname is the actual DNS for which the certificate was generated.
Before we start

$ sudo dnf install ansible

$ sudo yum -y install epel-release
$ sudo yum install ansible

$ sudo apt update
$ sudo apt install software-properties-common
$ sudo apt-add-repository --yes --update ppa:ansible/ansible
$ sudo apt install ansible

$ echo "deb http://ppa.launchpad.net/ansible/ansible/ubuntu trusty main" | sudo tee -a /etc/apt/sources.list
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 93C4A3FD7BB9C367
$ sudo apt update
$ sudo apt install ansible

$ pacman -S ansible
Confirm the Ansible installation by checking the version.

$ ansible --version
ansible --version
ansible 2.9.11
config file = None
configured module search path = ['/usr/share/ansible/plugins/modules']
ansible python module location = /usr/local/Cellar/ansible/2.9.11/libexec/lib/python3.8/site-packages/ansible
executable location = /usr/local/bin/ansible
python version = 3.8.5 (default, Jul 21 2020, 10:48:26) [Clang 11.0.3 (clang-1103.0.32.62)]
Install dependencies
pyOpenSSL is required to generate keys and certificates using Ansible.

$ sudo pip install pyOpenSSL

$ sudo pip3 install pyOpenSSL
Writing an Ansible playbook to generate a self signed certificate
With the dependencies installed, we need to start creating the certificate using Ansible.

We will make a single playbook with tasks for creating a private key, CSR and certificate.

I'll walk through each feature block by block, and later we'll combine everything to get a working playbook.

Create project folders:

$ mkdir -p ~/projects/ansible/{certificates,files,templates}
$ cd ~/projects/
$ tree
.
`-- ansible
|-- certificates
|-- files
`-- templates

4 directories, 0 files
Create a playbook template

$ vim ~/projects/ansible/openssl_certificates.yml
Add standard sections.
---
- hosts: localhost
vars:



BY ANONYMOUS BLACK SEC


Types and behaviors of hackers According


 Types and behaviors of hackers According :

  
1) To my understanding, "hackers" should be roughly divided into two categories: "positive" and "evil". Decent hackers rely on their knowledge to help system administrators find loopholes in the system and To be improved, and evil sect hackers use various hacking skills to attack, invade, or do other things harmful to the network, because evil sect hackers are engaged in things that violate the "Hacker Code", so their real names It is called "Cracker" instead of "Hacker", which is what we often hear of "Cacker" and "Hacker".

2) Regardless of the type of hacker, their initial learning content will be the content involved in this part, and the basic skills they master will be the same. Even if they each embarked on a different path in the future, they did the same thing, but the starting point and purpose were different.

3) Many people once asked me: "What do you usually do as a hacker?

» Isn't it very exciting?" Some people understand hackers as "doing boring and repetitive things every day." In fact, these are misunderstandings. Hackers usually need to spend a lot of time to learn. I don’t know if this process has an end or not. I only know "the more the better." Since learning hackers is entirely out of personal hobbies, there is no such thing as "boring"; repetition is inevitable, because "practice makes perfect". Only through constant contact and practice can one experience something that can only be expected and unspeakable.

4) In addition to learning, hackers should apply their knowledge to practice. No matter what kind of hackers do, the fundamental purpose is to master what they have learned in practice.



By ABSHQ

What is Cybercrime? Types, Tools, Examples


 What is Cybercrime? Types, Tools, Examples:beginner:


:cycloneIn this tutorial, you will learn :


• What is Cybercrime?
• Example of Cybercrime
• Cybercrime Attack Types
• Cyber Crime Tools


:o: Link :
https://telegra.ph/What-is-Cybercrime-Types-Tools-Examples-10-17


:sparkles:This tutorial is for beginners not for professionals




Share and Support :heart:

 

Blogger news

Blogroll

About