Wednesday, 10 July 2013

How to Hack a Computer with Armitage


Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.

Through one Metasploit instance, your team will:
  •     Use the same sessions
  •     Share hosts, captured data, and downloaded files
  •     Communicate through a shared event log.
  •     Run bots to automate red team tasks

VIDEO : 

Monday, 8 July 2013

How to fix Memory Card formatting problem ?


The solution of this problem is to format the Memory Card again with FATfile system through computer because your mobile cant read it any more so you cannot format it from your Mobile.

To format your Memory Card with FAT (FAT16) file system :
  • Plug-in your Memory Card into your computer.
  • Wait till computer detects the Memory Card.
  • Now note down the Drive Letter of your Memory Card
Note: In this tutorial we will assume that drive letter of your Memory Card is I: but you should replace it with actual drive letter of your memory card.

  • Now run Command Prompt by Typing CMD and hitting Enter in Start>>Run or by typing CMD and hitting Enter key after pressing WinKEY+R.Windows 7 and Vista users should type CMD in Start’s Search Box when Command Prompt appear, right click on it and run as administrator.
  • Once Command Prompt launches, Type I: /fs:FAT and hit enter.
Please note that in above tutorial we assumed that I: is drive letter of memory card but this could not be same in your case so make sure to replace I: with actual drive letter of your Memory Card.
Also Please note that if you format anything your data will be erased.

Sunday, 7 July 2013

How to install Tor browser in Kali Linux

Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays.

Click Here to Download Tor Browser


How to install :

VIDEO :

Saturday, 6 July 2013

How to run Google Chrome as Root in Kali Linux






Steps :

  • cd Desktop
  • Dpkg -i name file
  • Go Launch Application
  • Create New Element
  • Name : Google
  • Commande : Google-Chrome
  • go /opt/google/chrome and open file google-chrome with leafpad
    and change ( exec -a "$0" "$HERE/chrome" "$@" --user-data-dir

VIDEO :

Friday, 5 July 2013

GUI Sqlmap in Kali Linux






Installation Commands :
  • sudo apt-get install python-tk python2.7 sakura
  • git clone git://github.com/sqlmapproject/sqlmap.gi­t
  • cd sqlmap
  • Download sqlmap from  http://gui-for-sqlmap.googlecode.com
  • unzip sqm-60712.zip
  • python2.7 sqm.pyw
VIDEO :


Finding out GeoLocation of IP Address using NMAP


Tries to identify the physical location of an IP address using the Geobytes geolocation web service.

Download Script

Usage


nmap --script ip-geolocation-geobytes <target>

Output

| ip-geolocation-geobytes:
| latitude: 43.667
| longitude: -79.417
| city: Toronto
| region: Ontario
|_ country: Canada
 

VIDEO :

Tuesday, 2 July 2013

SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS


A new tool presented at the Black Hat DC 2009 conference by Moxie Marlinspike proves to be a formidable foe against secure login schemes. Always trying to stay on top of the game, Click Death Squad decides to give this tool a whirl and see what the buzz is all about. This attack is particularly crafty because it acts as a Man in the Middle, keeping an eye on HTTPS requests and then mapping them to HTTP look alike setups. If a person were operating on a wireless access point that had been broken into, the results can be devastating. You have a box running sslstrip which has port forwarding enabled and is actively spoofing ARP on a LAN. This computer is the jump off point, which will fake out the wireless router into redirecting HTTPS requests, modifying them and passing them on to the victim. Features include a fake "lock" icon and selective logging capabilities, which provide great flexibility when sniffing traffic. The example we use shows how a MySpace "secure" login can be easily captured using this attack. Props to Moxie Marlinspike for making this tool available to the public.

    Add support for 2048 and 4096 bit Diffie-Hellman
    Fix syslog error messages
    Fix threading issues in daemon mode .
    Fix address family check in netfilter NAT lookup
    Fix build on recent glibc systems
    Minor code and build process improvements

Download SSLsplit v 0.4.5

VIDEO :