"Changed Too Recently" Youtube channel name changing Problem Solved 2018...

3 comments:

"Changed Too Recently" Youtube channel name changing Problem Solved 2018...

0 comments:

How to Make USB or Pen Drive Bootable without Using External Software only with CMD


In this video i'll show you how you can make your pen drive or flash drive bootable without using any external software only using CMD command prompt, So please don't forget to subscribe my channel CH Side, Because i make many videos like this for you so please don't forget and subscribe our channel for more new intresting videos like that. Thanks for Watching. If you find any Problem Contact me on : Facebook : www.facebook.com/Rehman000786 Twitter : twitter.com/onlinetechlearn Gmail : technicalschool786@gmail.com Fb Page : https://www.facebook.com/Technical-Sc... https://www.facebook.com/allfirmwaref... https://www.facebook.com/androidtipsa... https://www.facebook.com/pchardwarend... https://www.facebook.com/Computer-Sof... https://www.facebook.com/hackingpoint0/ Number : +923031036758 Category Howto & Style License Standard YouTube License

0 comments:

Watch any website History







Hi friend i'm Abdul Rehmanin this video i'll show you how you can see any website history or past view or interface..... That how to website looks like 10 years ago or 15 years ago or i think you want to know when this site or web page created or uploaded......
I hopw this video increase to your knowledge......
So please don't forget to subscribe my channel CH Side, Because i make many videos like this for you so please don't forget and subscribe our channel for more new intresting videos like that.
Thanks for Watching.

If you find any Problem Contact me on :

Facebook :
www.facebook.com/Rehman000786
Twitter :
twitter.com/onlinetechlearn
Gmail :
technicalschool786@gmail.com
Fb Page :
https://www.facebook.com/Technical-Sc...
https://www.facebook.com/allfirmwaref...
https://www.facebook.com/androidtipsa...
https://www.facebook.com/pchardwarend...
https://www.facebook.com/Computer-Sof...
https://www.facebook.com/hackingpoint0/
Number :
+923031036758

0 comments:

Free Youtube Subscribers

Get free Youtube Subscribers

Get free youtube subscribers now for free . No Money just Subscriber my channel and click on Bell Icon and like my all Videos . After that text me on facebook page i'll give you 50 subscribers in only 2 hours. 

This is not fake if you think that it is fake than you can skip it . But i want to say please try for first time then tell me about your channel and subsriber.

Click on Youtube Icon and Subscribe My Youtube Channel.




After Subscribe my channel please click on Bell icon and like my videos.

Than text me on My Facebook page.
Clik on Facebook icon ........

Thanks For Visiting Here



1 comments:

Metaspolit Hacking Tool

What is Metasploit??

Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.
Its a powerful tool used for penetration testing. Learning to work with metasploit needs a lot of efforts and time. Ofcourse to can learn metasploit overnight, it needs lots of practice and patience

Download Metasploit

Historical Background:            

Since it’s development in the high-level language of Perl by Moore in 2003, there were two main alternates that occurred to Metasploit along with its framework. First, by 2007 the framework got entire redevelopment using Ruby programming language. Later, in 2009 Rapid7 adopted the project. Rapid7 is a security company which provides unified vulnerability management solutions.
Two of the main contributions of Rapid7 was the execution of Metasploit Express and Metasploit Pro. Metasploit Express, whose release was in 2010, functionally targets security teams who verify vulnerabilities. While it provides the user with an automated evidence collection, it allows them to use brute-force methods as well. Further, Metasploit Express integrates the Network Mapper (Nmap) and offers a user-friendly graphical user interface (GUI).
Additional features that distinguished Metasploit Pro came in 2010. The main focus of this edition was penetration testers and IT security teams. Quick Start Wizards/MetaModules, building and managing social engineering campaigns, an advanced Pro Console, web application testing, dynamic payloads for anti-virus evasion, integration with Nexpose for ad-hoc vulnerability scans, and Virtual Private Network (VPN) pivoting were all of the features characterizing Metasploit Pro.
Metasploit 4.0 was released in 2011 while its preceding version was Metasploit 3.0 released in 2006, having its following updates afterward. Fuzzing tools, such as providing random and unexpected inputs to a computer program for the sake of monitoring exceptions and crashes, were implemented to the old versions of the project in order to allow finding and discovering software vulnerabilities, not merelyexploiting known bugs.Accordingly, a third party Metasploit Module emerged in a way that scans for potential exploits of a software to provide reliable exploitability risk results and further recommends remediation to such bugs.

Just give a look at following basic steps for beginners to break into a system using metasploit after gathering some information about the target system.
1. Select a right exploit and then set the target.
2.Verify the exploit options to determine whether the target system is vulnerable to the exploit.
3.Select a payload
4.Execute the exploit.
You must be confused !!!!
Now carefully read the following basic terms to get an idea about these four steps mentioned above .I have defined the terms technically and side by side explained in layman language to clarify the things. I have taken an example that an attacker wants to break into a house . I hope my this approach will give you a great idea about these basic terms .
VULNERABILITY -A WEAKNESS WHICH ALLOWS AN ATTACKER TO BREAK INTO OR COMPROMISE A SYSTEM’S SECURITY
Like the main gate of house with a weak lock (can be easily opened) , a glass window of house(can be easily broken) etc can be the vulnerabilities in the systems which make it easy for an attacker to break into.
EXPLOIT – CODE WHICH ALLOWS AN ATTACKER TO TAKE ADVANTAGE OF A VULNERABILITY SYSTEM.
The set of different keys which he can try one by one to open the lock , the hammer with him which he can use to break the glass window etc can be the exploits.
PAYLOAD- ACTUAL CODE WHICH RUNS ON THE SYSTEM AFTER EXPLOITATION
Now Finally after exploiting the vulnerability and breaking in , he can have different things to do. He can Steal Money destroy the things or just can give a look and come back.. Deciding this is what we mean by setting the Payload.

Exploits:

Fundamentally, an exploit is referred to as a piece of software, a chunk of data, or a sequence of commands that utilizes a bug or vulnerability in order to cause theunintended or unanticipated behavior to occur on a computer system or software. Exploits identified by Metasploit have numbered around 1613 exploits. Such exploits exist in four main categories. 
The first category is Android and Apple iOs which targets mobile phones. In the meanwhile, Firefox is another category for remote code execution for this browser. Another category targets certain operating systems such as Windows, Linux, Unix, Mac, Sun Solaris… etc. The remaining category is multi. Exploits not related to any specific platform belong here.

Payloads: 

When it comes to computer networking and the internet, a payload describes the notion of having the eventual effect of a software virus being delivered to a user’s computer. Metaspoilt owns over 438 payloads. Some rampant ones of these payloads are Command Shell which grants users the privilege of running collection scripts and commands against the host. 
Meterpreter is another payload. This allows Virtual Network Computing (VNC) for users and allows browsing upload and download files as well. Dynamic payloads are another type of payloads which generate some unique payloads to avoid anti-virusdefenses.

Metasploit Framework:

It is basically an open-source framework which accepts contributions by developers through GitHub.com website. Such contributions are mainly exploits and scanners. They are thereby reviewed by a team that has employees of Rapid7 and senior external contributors. The main developers of the framework are Moore, MartMiller, and spoon.
Metasploit Interfaces:
Other than Metasploit Express and Metasploit Pro, there are four other main available interfaces for Metasploit: Metasploit Framework Edition is the free version of Metasploit. It offers a command line interface, Zenmap, a compiler for Ruby, and a well-known ports-scanner. Metasploit Community Edition is another free version. This version is included in the main installer, and it offers several features such as manual exploitation, network discovery and module browsing.
Armitage is another free interface for it, which is a graphical cyber attackmanagement tool harnessed to visualize targets and recommend exploits based on the vulnerabilities. It is open source network security tool which allows for shared sessions, data, and communication through a single instance. Cobalt Strike is another interface in which it contains all the features of Armitage, adding post exploitation tool and report generation features. Nonetheless, this interface is provided by another company called Strategic Cyber LLC.
There are five basic steps in exploiting a system using Metasploit:
  1. Choose a certain exploit and configure it by writing the appropriate code to target a system. Then, exploit a certain bug in it. 
  2. Check whether the target system is susceptible to the given exploit.
  3. Choose a certain payload to apply on the target system when managing to exploit it and get through it. 
  4. Choose the appropriate encoding technique in order to deceive the intrusion-prevention system (IPS) and make it ignore the oncoming payload.
  5. Finally, execute the Exploit.

Some Commands used:

search<pattern>
It searches for a match for a given pattern. For example: “search xxx” will searchall occurrences of “xxx”
use<exploit name>
It tells the program to use a particular exploit
SET parameter
It sets the value for a given parameter
SETG parameter
It sets the value for a given parameter globally, to avoid resetting the parameters again and again later on.
exploit
Finally. this performs the attack on the target system.
I hope its enough friends, You will learn more with further tutorials when you will start working with metasploit practically.

0 comments:

Linux Commands

Kali Linux Basic Commands

A to Z



Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.
Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer’s hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.

All Kali Linux Commands

Here below we are listing A-Z Kali Linux commands which will help you to ease of flow in work.
Kali Linux commandsFunction
A
 apropos Search Help manual pages (man -k)
 apt-get Search for and install software packages (Debian)
 aptitude Search for and install software packages (Debian)
 aspell Spell Checker
 awk Find and Replace text, database sort/validate/index
B
 basename Strip directory and suffix from filenames
 bash GNU Bourne-Again Shell
 bc Arbitrary precision calculator language
 bg Send to background
 break Exit from a loop
 builtin Run a shell builtin
 bzip2 Compress or decompress named files
C
 cal Display a calendar
 case Conditionally perform a command
 cat Concatenate and print (display) the content of files
 cd Change Directory
 cfdisk Partition table manipulator for Linux
 chgrp Change group ownership
 chmod Change access permissions
 chown Change file owner and group
 chroot Run a command with a different root directory
 chkconfig System services (runlevel)
 cksum Print CRC checksum and byte counts
 clear Clear terminal screen
 cmp Compare two files
 comm Compare two sorted files line by line
 command Run a command – ignoring shell functions
 continue Resume the next iteration of a loop
 cp Copy one or more files to another location
 cron Daemon to execute scheduled commands
 crontab Schedule a command to run at a later time
 csplit Split a file into context-determined pieces
 cut Divide a file into several parts
D
 date Display or change the date and time
 dc Desk Calculator
 dd Convert and copy a file, write disk headers, boot records
 ddrescue Data recovery tool
 declare Declare variables and give them attributes
 df Display free disk space
 diff Display the differences between two files
 diff3 Show differences among three files
 dig DNS lookup
 dir Briefly list directory contents
 dircolors Colour setup for `ls’
 dirname Convert a full pathname to just a path
 dirs Display list of remembered directories
 dmesg Print kernel &amp; driver messages
 du Estimate file space usage
E
 echo Display message on screen
 egrep Search files for lines that match an extended expression
 eject Eject removable media
 enable Enable and disable builtin shell commands
 env Environment variables
 ethtool Ethernet card settings
 eval Evaluate several commands/arguments
 exec Execute a command
 exit Exit the shell
 expect Automate arbitrary applications accessed over a terminal
 expand Convert tabs to spaces
 export Set an environment variable
 expr Evaluate expressions
F
 false Do nothing, unsuccessfully
 fdformat Low-level format a floppy disk
 fdisk Partition table manipulator for Linux
 fg Send job to foreground
 fgrep Search files for lines that match a fixed string
 file Determine file type
 find Search for files that meet a desired criteria
 fmt Reformat paragraph text
 fold Wrap text to fit a specified width
 for Expand words, and execute commands
 format Format disks or tapes
 free Display memory usage
 fsck File system consistency check and repair
 ftp File Transfer Protocol
 function Define Function Macros
 fuser Identify/kill the process that is accessing a file
G
 gawk Find and Replace text within files
 getopts Parse positional parameters
 grep Search files for lines that match a given pattern
 groupadd Add a user security group
 groupdel Delete a group
 groupmod Modify a group
 groups Print group names a user is in
 gzip Compress or decompress named files
H
 hash Remember the full pathname of a name argument
 head Output the first part of files
 help Display help for a built-in command
 history Command History
 hostname Print or set system name
I
 iconv Convert the character set of a file
 id Print user and group id’s
 if Conditionally perform a command
 ifconfig Configure a network interface
 ifdown Stop a network interface
 ifup Start a network interface up
 import Capture an X server screen and save the image to file
 install Copy files and set attributes
J
 jobs List active jobs
 join Join lines on a common field
K
 kill Stop a process from running
 killall Kill processes by name
L
 less Display output one screen at a time
 let Perform arithmetic on shell variables
 ln Create a symbolic link to a file
 local Create variables
locate Find files
 logname Print current login name
 logout Exit a login shell
 look Display lines beginning with a given string
 lpc Line printer control program
 lpr Off line print
 lprint Print a file
 lprintd Abort a print job
 lprintq List the print queue
 lprm Remove jobs from the print queue
 ls List information about files
 lsof List open files
M
 make Recompile a group of programs
 man Help manual
 mkdir Create new folders
 mkfifo Make FIFOs (named pipes)
 mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem
 mknod Make block or character special files
 more Display output one screen at a time
 mount Mount a file system
 mtools Manipulate MS-DOS files
 mtr Network diagnostics (traceroute/ping)
 mv Move or rename files or directories
 mmv Mass Move and rename files
N
 netstat Networking information
 nice Set the priority of a command or job
 nl Number lines and write files
 nohup Run a command immune to hangups
 notify-send Send desktop notifications
 nslookup Query Internet name servers interactively
O
 open Open a file in its default application
 op Operator access
P
 passwd Modify a user password
 paste Merge lines of files
 pathchk Check file name portability
 ping Test a network connection
 pkill Stop processes from running
 popd Restore the previous value of the current directory
 pr Prepare files for printing
 printcap Printer capability database
 printenv Print environment variables
 printf Format and print data
 ps Process status
 pushd Save and then change the current directory
 pwd Print Working Directory
Q
 quota Display disk usage and limits
 quotacheck Scan a file system for disk usage
 quotactl Set disk quotas
R
 ram ram disk device
 rcp Copy files between two machines
 read Read a line from standard input
 readarray Read from stdin into an array variable
 readonly Mark variables/functions as readonly
 reboot Reboot the system
 rename Rename files
 renice Alter priority of running processes
 remsync Synchronize remote files via email
 return Exit a shell function
 rev Reverse lines of a file
 rm Remove files
 rmdir Remove folders
 rsync Remote file copy (Synchronize file trees)
S
 screen Multiplex terminal, run remote shells via ssh
 scp Secure copy (remote file copy)
 sdiff Merge two files interactively
 sed Stream Editor
 select Accept keyboard input
 seq Print numeric sequences
 set Manipulate shell variables and functions
 sftp Secure File Transfer Program
 shift Shift positional parameters
 shopt Shell Options
 shutdown Shutdown or restart linux
 sleep Delay for a specified time
 slocate Find files
 sort Sort text files
 source Run commands from a file
 split Split a file into fixed-size pieces
 ssh Secure Shell client (remote login program)
 strace Trace system calls and signals
 su Substitute user identity
 sudo Execute a command as another user
 sum Print a checksum for a file
 suspend Suspend execution of this shell
 symlink Make a new name for a file
 sync Synchronize data on disk with memory
T
 tail Output the last part of file
 tar Tape Archiver
 tee Redirect output to multiple files
 test Evaluate a conditional expression
 time Measure Program running time
 times User and system times
 touch Change file timestamps
 top List processes running on the system
 traceroute Trace Route to Host
 trap Run a command when a signal is set(bourne)
 tr Translate, squeeze, and/or delete characters
 true Do nothing, successfully
 tsort Topological sort
 tty Print filename of terminal on stdin
 type Describe a command
U
 ulimit Limit user resources
 umask Users file creation mask
 umount Unmount a device
 unalias Remove an alias
 uname Print system information
 unexpand Convert spaces to tabs
 uniq Uniquify files
 units Convert units from one scale to another
 unset Remove variable or function names
 unshar Unpack shell archive scripts
 until Execute commands (until error)
 uptime Show uptime
 useradd Create new user account
 usermod Modify user account
 users List users currently logged in
 uuencode Encode a binary file
 uudecode Decode a file created by uuencode
V
 v Verbosely list directory contents (`ls -l -b’)
 vdir Verbosely list directory contents (`ls -l -b’)
 vi Text Editor
 vmstat Report virtual memory statistics
W
 wait Wait for a process to complete
 watch Execute/display a program periodically
 wc Print byte, word, and line counts
 whereis Search the user’s $path, man pages and source files for a program
 which Search the user’s $path for a program file
 while Execute commands
 who Print all usernames currently logged in
 whoami Print the current user id and name (`id -un’)
 wget Retrieve web pages or files via HTTP, HTTPS or FTP
 write Send a message to another user
X
 xargs Execute utility, passing constructed argument lists
 xdg-open Open a file or URL in the user’s preferred application
Y
 yes  Print a string until interrupted
Now you know all Kali Linux commands and for future reference we also included a Kali commands PDF for you. Print it out to guide through Kali Linux while your offline.
Note :
If you are facing some trouble than contact me on.

0 comments:

Copyright © 2013 Anonymous Hacker