Saturday, 6 July 2013

How to run Google Chrome as Root in Kali Linux






Steps :

  • cd Desktop
  • Dpkg -i name file
  • Go Launch Application
  • Create New Element
  • Name : Google
  • Commande : Google-Chrome
  • go /opt/google/chrome and open file google-chrome with leafpad
    and change ( exec -a "$0" "$HERE/chrome" "$@" --user-data-dir

VIDEO :

Friday, 5 July 2013

GUI Sqlmap in Kali Linux






Installation Commands :
  • sudo apt-get install python-tk python2.7 sakura
  • git clone git://github.com/sqlmapproject/sqlmap.gi­t
  • cd sqlmap
  • Download sqlmap from  http://gui-for-sqlmap.googlecode.com
  • unzip sqm-60712.zip
  • python2.7 sqm.pyw
VIDEO :


Finding out GeoLocation of IP Address using NMAP


Tries to identify the physical location of an IP address using the Geobytes geolocation web service.

Download Script

Usage


nmap --script ip-geolocation-geobytes <target>

Output

| ip-geolocation-geobytes:
| latitude: 43.667
| longitude: -79.417
| city: Toronto
| region: Ontario
|_ country: Canada
 

VIDEO :

Tuesday, 2 July 2013

SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS


A new tool presented at the Black Hat DC 2009 conference by Moxie Marlinspike proves to be a formidable foe against secure login schemes. Always trying to stay on top of the game, Click Death Squad decides to give this tool a whirl and see what the buzz is all about. This attack is particularly crafty because it acts as a Man in the Middle, keeping an eye on HTTPS requests and then mapping them to HTTP look alike setups. If a person were operating on a wireless access point that had been broken into, the results can be devastating. You have a box running sslstrip which has port forwarding enabled and is actively spoofing ARP on a LAN. This computer is the jump off point, which will fake out the wireless router into redirecting HTTPS requests, modifying them and passing them on to the victim. Features include a fake "lock" icon and selective logging capabilities, which provide great flexibility when sniffing traffic. The example we use shows how a MySpace "secure" login can be easily captured using this attack. Props to Moxie Marlinspike for making this tool available to the public.

    Add support for 2048 and 4096 bit Diffie-Hellman
    Fix syslog error messages
    Fix threading issues in daemon mode .
    Fix address family check in netfilter NAT lookup
    Fix build on recent glibc systems
    Minor code and build process improvements

Download SSLsplit v 0.4.5

VIDEO :