"Changed Too Recently" Youtube channel name changing Problem Solved 2018...
How to Make USB or Pen Drive Bootable without Using External Software only with CMD
Watch any website History
Hi friend i'm Abdul Rehmanin this video i'll show you how you can see any website history or past view or interface..... That how to website looks like 10 years ago or 15 years ago or i think you want to know when this site or web page created or uploaded......
I hopw this video increase to your knowledge......
So please don't forget to subscribe my channel CH Side, Because i make many videos like this for you so please don't forget and subscribe our channel for more new intresting videos like that.
Thanks for Watching.
If you find any Problem Contact me on :
Facebook :
www.facebook.com/Rehman000786
Twitter :
twitter.com/onlinetechlearn
Gmail :
technicalschool786@gmail.com
Fb Page :
https://www.facebook.com/Technical-Sc...
https://www.facebook.com/allfirmwaref...
https://www.facebook.com/androidtipsa...
https://www.facebook.com/pchardwarend...
https://www.facebook.com/Computer-Sof...
https://www.facebook.com/hackingpoint0/
Number :
+923031036758
Free Youtube Subscribers
Get free Youtube Subscribers
Get free youtube subscribers now for free . No Money just Subscriber my channel and click on Bell Icon and like my all Videos . After that text me on facebook page i'll give you 50 subscribers in only 2 hours.
This is not fake if you think that it is fake than you can skip it . But i want to say please try for first time then tell me about your channel and subsriber.
Click on Youtube Icon and Subscribe My Youtube Channel.
After Subscribe my channel please click on Bell icon and like my videos.
Than text me on My Facebook page.
Clik on Facebook icon ........
Thanks For Visiting Here
Metaspolit Hacking Tool
What is Metasploit??
Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.
Its a powerful tool used for penetration testing. Learning to work with metasploit needs a lot of efforts and time. Ofcourse to can learn metasploit overnight, it needs lots of practice and patience
Download Metasploit
Download Metasploit
Historical Background:
Since it’s development in the high-level language of Perl by Moore in 2003, there were two main alternates that occurred to Metasploit along with its framework. First, by 2007 the framework got entire redevelopment using Ruby programming language. Later, in 2009 Rapid7 adopted the project. Rapid7 is a security company which provides unified vulnerability management solutions.
Two of the main contributions of Rapid7 was the execution of Metasploit Express and Metasploit Pro. Metasploit Express, whose release was in 2010, functionally targets security teams who verify vulnerabilities. While it provides the user with an automated evidence collection, it allows them to use brute-force methods as well. Further, Metasploit Express integrates the Network Mapper (Nmap) and offers a user-friendly graphical user interface (GUI).
Additional features that distinguished Metasploit Pro came in 2010. The main focus of this edition was penetration testers and IT security teams. Quick Start Wizards/MetaModules, building and managing social engineering campaigns, an advanced Pro Console, web application testing, dynamic payloads for anti-virus evasion, integration with Nexpose for ad-hoc vulnerability scans, and Virtual Private Network (VPN) pivoting were all of the features characterizing Metasploit Pro.
Metasploit 4.0 was released in 2011 while its preceding version was Metasploit 3.0 released in 2006, having its following updates afterward. Fuzzing tools, such as providing random and unexpected inputs to a computer program for the sake of monitoring exceptions and crashes, were implemented to the old versions of the project in order to allow finding and discovering software vulnerabilities, not merelyexploiting known bugs.Accordingly, a third party Metasploit Module emerged in a way that scans for potential exploits of a software to provide reliable exploitability risk results and further recommends remediation to such bugs.
Just give a look at following basic steps for beginners to break into a system using metasploit after gathering some information about the target system.
1. Select a right exploit and then set the target.
2.Verify the exploit options to determine whether the target system is vulnerable to the exploit.
3.Select a payload
4.Execute the exploit.
2.Verify the exploit options to determine whether the target system is vulnerable to the exploit.
3.Select a payload
4.Execute the exploit.
You must be confused !!!!
Now carefully read the following basic terms to get an idea about these four steps mentioned above .I have defined the terms technically and side by side explained in layman language to clarify the things. I have taken an example that an attacker wants to break into a house . I hope my this approach will give you a great idea about these basic terms .
VULNERABILITY -A WEAKNESS WHICH ALLOWS AN ATTACKER TO BREAK INTO OR COMPROMISE A SYSTEM’S SECURITY
Like the main gate of house with a weak lock (can be easily opened) , a glass window of house(can be easily broken) etc can be the vulnerabilities in the systems which make it easy for an attacker to break into.
EXPLOIT – CODE WHICH ALLOWS AN ATTACKER TO TAKE ADVANTAGE OF A VULNERABILITY SYSTEM.
The set of different keys which he can try one by one to open the lock , the hammer with him which he can use to break the glass window etc can be the exploits.
PAYLOAD- ACTUAL CODE WHICH RUNS ON THE SYSTEM AFTER EXPLOITATION
Now Finally after exploiting the vulnerability and breaking in , he can have different things to do. He can Steal Money destroy the things or just can give a look and come back.. Deciding this is what we mean by setting the Payload.
Exploits:
Fundamentally, an exploit is referred to as a piece of software, a chunk of data, or a sequence of commands that utilizes a bug or vulnerability in order to cause theunintended or unanticipated behavior to occur on a computer system or software. Exploits identified by Metasploit have numbered around 1613 exploits. Such exploits exist in four main categories.
The first category is Android and Apple iOs which targets mobile phones. In the meanwhile, Firefox is another category for remote code execution for this browser. Another category targets certain operating systems such as Windows, Linux, Unix, Mac, Sun Solaris… etc. The remaining category is multi. Exploits not related to any specific platform belong here.
Payloads:
When it comes to computer networking and the internet, a payload describes the notion of having the eventual effect of a software virus being delivered to a user’s computer. Metaspoilt owns over 438 payloads. Some rampant ones of these payloads are Command Shell which grants users the privilege of running collection scripts and commands against the host.
Meterpreter is another payload. This allows Virtual Network Computing (VNC) for users and allows browsing upload and download files as well. Dynamic payloads are another type of payloads which generate some unique payloads to avoid anti-virusdefenses.
Metasploit Framework:
It is basically an open-source framework which accepts contributions by developers through GitHub.com website. Such contributions are mainly exploits and scanners. They are thereby reviewed by a team that has employees of Rapid7 and senior external contributors. The main developers of the framework are Moore, MartMiller, and spoon.
Metasploit Interfaces:
Other than Metasploit Express and Metasploit Pro, there are four other main available interfaces for Metasploit: Metasploit Framework Edition is the free version of Metasploit. It offers a command line interface, Zenmap, a compiler for Ruby, and a well-known ports-scanner. Metasploit Community Edition is another free version. This version is included in the main installer, and it offers several features such as manual exploitation, network discovery and module browsing.
Armitage is another free interface for it, which is a graphical cyber attackmanagement tool harnessed to visualize targets and recommend exploits based on the vulnerabilities. It is open source network security tool which allows for shared sessions, data, and communication through a single instance. Cobalt Strike is another interface in which it contains all the features of Armitage, adding post exploitation tool and report generation features. Nonetheless, this interface is provided by another company called Strategic Cyber LLC.
There are five basic steps in exploiting a system using Metasploit:
- Choose a certain exploit and configure it by writing the appropriate code to target a system. Then, exploit a certain bug in it.
- Check whether the target system is susceptible to the given exploit.
- Choose a certain payload to apply on the target system when managing to exploit it and get through it.
- Choose the appropriate encoding technique in order to deceive the intrusion-prevention system (IPS) and make it ignore the oncoming payload.
- Finally, execute the Exploit.
Some Commands used:
search<pattern>
It searches for a match for a given pattern. For example: “search xxx” will searchall occurrences of “xxx”
use<exploit name>
It tells the program to use a particular exploit
SET parameter
It sets the value for a given parameter
SETG parameter
It sets the value for a given parameter globally, to avoid resetting the parameters again and again later on.
exploit
Finally. this performs the attack on the target system.
I hope its enough friends, You will learn more with further tutorials when you will start working with metasploit practically.
Linux Commands
Kali Linux Basic Commands
A to Z
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.
Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer’s hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.
All Kali Linux Commands
Here below we are listing A-Z Kali Linux commands which will help you to ease of flow in work.
Kali Linux commands | Function |
---|---|
A | |
apropos | Search Help manual pages (man -k) |
apt-get | Search for and install software packages (Debian) |
aptitude | Search for and install software packages (Debian) |
aspell | Spell Checker |
awk | Find and Replace text, database sort/validate/index |
B | |
basename | Strip directory and suffix from filenames |
bash | GNU Bourne-Again Shell |
bc | Arbitrary precision calculator language |
bg | Send to background |
break | Exit from a loop |
builtin | Run a shell builtin |
bzip2 | Compress or decompress named files |
C | |
cal | Display a calendar |
case | Conditionally perform a command |
cat | Concatenate and print (display) the content of files |
cd | Change Directory |
cfdisk | Partition table manipulator for Linux |
chgrp | Change group ownership |
chmod | Change access permissions |
chown | Change file owner and group |
chroot | Run a command with a different root directory |
chkconfig | System services (runlevel) |
cksum | Print CRC checksum and byte counts |
clear | Clear terminal screen |
cmp | Compare two files |
comm | Compare two sorted files line by line |
command | Run a command – ignoring shell functions |
continue | Resume the next iteration of a loop |
cp | Copy one or more files to another location |
cron | Daemon to execute scheduled commands |
crontab | Schedule a command to run at a later time |
csplit | Split a file into context-determined pieces |
cut | Divide a file into several parts |
D | |
date | Display or change the date and time |
dc | Desk Calculator |
dd | Convert and copy a file, write disk headers, boot records |
ddrescue | Data recovery tool |
declare | Declare variables and give them attributes |
df | Display free disk space |
diff | Display the differences between two files |
diff3 | Show differences among three files |
dig | DNS lookup |
dir | Briefly list directory contents |
dircolors | Colour setup for `ls’ |
dirname | Convert a full pathname to just a path |
dirs | Display list of remembered directories |
dmesg | Print kernel & driver messages |
du | Estimate file space usage |
E | |
echo | Display message on screen |
egrep | Search files for lines that match an extended expression |
eject | Eject removable media |
enable | Enable and disable builtin shell commands |
env | Environment variables |
ethtool | Ethernet card settings |
eval | Evaluate several commands/arguments |
exec | Execute a command |
exit | Exit the shell |
expect | Automate arbitrary applications accessed over a terminal |
expand | Convert tabs to spaces |
export | Set an environment variable |
expr | Evaluate expressions |
F | |
false | Do nothing, unsuccessfully |
fdformat | Low-level format a floppy disk |
fdisk | Partition table manipulator for Linux |
fg | Send job to foreground |
fgrep | Search files for lines that match a fixed string |
file | Determine file type |
find | Search for files that meet a desired criteria |
fmt | Reformat paragraph text |
fold | Wrap text to fit a specified width |
for | Expand words, and execute commands |
format | Format disks or tapes |
free | Display memory usage |
fsck | File system consistency check and repair |
ftp | File Transfer Protocol |
function | Define Function Macros |
fuser | Identify/kill the process that is accessing a file |
G | |
gawk | Find and Replace text within files |
getopts | Parse positional parameters |
grep | Search files for lines that match a given pattern |
groupadd | Add a user security group |
groupdel | Delete a group |
groupmod | Modify a group |
groups | Print group names a user is in |
gzip | Compress or decompress named files |
H | |
hash | Remember the full pathname of a name argument |
head | Output the first part of files |
help | Display help for a built-in command |
history | Command History |
hostname | Print or set system name |
I | |
iconv | Convert the character set of a file |
id | Print user and group id’s |
if | Conditionally perform a command |
ifconfig | Configure a network interface |
ifdown | Stop a network interface |
ifup | Start a network interface up |
import | Capture an X server screen and save the image to file |
install | Copy files and set attributes |
J | |
jobs | List active jobs |
join | Join lines on a common field |
K | |
kill | Stop a process from running |
killall | Kill processes by name |
L | |
less | Display output one screen at a time |
let | Perform arithmetic on shell variables |
ln | Create a symbolic link to a file |
local | Create variables |
locate | Find files |
logname | Print current login name |
logout | Exit a login shell |
look | Display lines beginning with a given string |
lpc | Line printer control program |
lpr | Off line print |
lprint | Print a file |
lprintd | Abort a print job |
lprintq | List the print queue |
lprm | Remove jobs from the print queue |
ls | List information about files |
lsof | List open files |
M | |
make | Recompile a group of programs |
man | Help manual |
mkdir | Create new folders |
mkfifo | Make FIFOs (named pipes) |
mkisofs | Create an hybrid ISO9660/JOLIET/HFS filesystem |
mknod | Make block or character special files |
more | Display output one screen at a time |
mount | Mount a file system |
mtools | Manipulate MS-DOS files |
mtr | Network diagnostics (traceroute/ping) |
mv | Move or rename files or directories |
mmv | Mass Move and rename files |
N | |
netstat | Networking information |
nice | Set the priority of a command or job |
nl | Number lines and write files |
nohup | Run a command immune to hangups |
notify-send | Send desktop notifications |
nslookup | Query Internet name servers interactively |
O | |
open | Open a file in its default application |
op | Operator access |
P | |
passwd | Modify a user password |
paste | Merge lines of files |
pathchk | Check file name portability |
ping | Test a network connection |
pkill | Stop processes from running |
popd | Restore the previous value of the current directory |
pr | Prepare files for printing |
printcap | Printer capability database |
printenv | Print environment variables |
printf | Format and print data |
ps | Process status |
pushd | Save and then change the current directory |
pwd | Print Working Directory |
Q | |
quota | Display disk usage and limits |
quotacheck | Scan a file system for disk usage |
quotactl | Set disk quotas |
R | |
ram | ram disk device |
rcp | Copy files between two machines |
read | Read a line from standard input |
readarray | Read from stdin into an array variable |
readonly | Mark variables/functions as readonly |
reboot | Reboot the system |
rename | Rename files |
renice | Alter priority of running processes |
remsync | Synchronize remote files via email |
return | Exit a shell function |
rev | Reverse lines of a file |
rm | Remove files |
rmdir | Remove folders |
rsync | Remote file copy (Synchronize file trees) |
S | |
screen | Multiplex terminal, run remote shells via ssh |
scp | Secure copy (remote file copy) |
sdiff | Merge two files interactively |
sed | Stream Editor |
select | Accept keyboard input |
seq | Print numeric sequences |
set | Manipulate shell variables and functions |
sftp | Secure File Transfer Program |
shift | Shift positional parameters |
shopt | Shell Options |
shutdown | Shutdown or restart linux |
sleep | Delay for a specified time |
slocate | Find files |
sort | Sort text files |
source | Run commands from a file |
split | Split a file into fixed-size pieces |
ssh | Secure Shell client (remote login program) |
strace | Trace system calls and signals |
su | Substitute user identity |
sudo | Execute a command as another user |
sum | Print a checksum for a file |
suspend | Suspend execution of this shell |
symlink | Make a new name for a file |
sync | Synchronize data on disk with memory |
T | |
tail | Output the last part of file |
tar | Tape Archiver |
tee | Redirect output to multiple files |
test | Evaluate a conditional expression |
time | Measure Program running time |
times | User and system times |
touch | Change file timestamps |
top | List processes running on the system |
traceroute | Trace Route to Host |
trap | Run a command when a signal is set(bourne) |
tr | Translate, squeeze, and/or delete characters |
true | Do nothing, successfully |
tsort | Topological sort |
tty | Print filename of terminal on stdin |
type | Describe a command |
U | |
ulimit | Limit user resources |
umask | Users file creation mask |
umount | Unmount a device |
unalias | Remove an alias |
uname | Print system information |
unexpand | Convert spaces to tabs |
uniq | Uniquify files |
units | Convert units from one scale to another |
unset | Remove variable or function names |
unshar | Unpack shell archive scripts |
until | Execute commands (until error) |
uptime | Show uptime |
useradd | Create new user account |
usermod | Modify user account |
users | List users currently logged in |
uuencode | Encode a binary file |
uudecode | Decode a file created by uuencode |
V | |
v | Verbosely list directory contents (`ls -l -b’) |
vdir | Verbosely list directory contents (`ls -l -b’) |
vi | Text Editor |
vmstat | Report virtual memory statistics |
W | |
wait | Wait for a process to complete |
watch | Execute/display a program periodically |
wc | Print byte, word, and line counts |
whereis | Search the user’s $path, man pages and source files for a program |
which | Search the user’s $path for a program file |
while | Execute commands |
who | Print all usernames currently logged in |
whoami | Print the current user id and name (`id -un’) |
wget | Retrieve web pages or files via HTTP, HTTPS or FTP |
write | Send a message to another user |
X | |
xargs | Execute utility, passing constructed argument lists |
xdg-open | Open a file or URL in the user’s preferred application |
Y | |
yes | Print a string until interrupted |
Now you know all Kali Linux commands and for future reference we also included a Kali commands PDF for you. Print it out to guide through Kali Linux while your offline.
Note :
If you are facing some trouble than contact me on.
(Facebook)
(Gmail)
Subscribe to:
Posts (Atom)
3 comments: