Wordlists & Password Profiling with Cupp & Kali Linux

How To Password Profiling With Cupp – Common User Passwords Profiler

The most common form of authentication is the combination of a username and a password or passphrase. If both match values stored within a locally stored table, the user is authenticated for a connection. Password strength is a measure of the difficulty involved in guessing or breaking the password through cryptographic techniques or library-based automated testing of alternate values. Continue reading

Anonymous Surfing Kali Linux + Whonix TOR Gateway Part #2

Whonix is an operating system focused on anonymity, privacy and security.
It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation.

DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP.
Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. Continue reading

Anonymous Surfing Kali Linux + Whonix TOR Gateway Part #1

Whonix is an operating system focused on anonymity, privacy and security.
It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation.

DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP.
Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. Continue reading

Exploiting Windows 10 MSFvenom & Msfconsole Backdoor Shell

MsfVenom a Metasploit standalone payload generator.
msfvenom is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance.

It is necessary that the PC victim executes the generated file.
Tested with AVG Free and Microsoft Security Essential. No threat found.
How to run the code to the PC victim? Use the Social Engineering !!!

Vulnerable systems Windows XP / Vista / 7/ 8 / 8.1 / 10 and Server Versions Continue reading

Blocking Brute Force & Dictionary Attacks under Linux Using Fail2ban

Fail2ban scans log files and bans IPs that show the malicious signs — too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, courier, ssh, etc).

For more information visit

http://www.fail2ban.org/wiki/index.php/Main_Page

Websploit Kali Linux Find PhpMyAdmin

WebSploit Is An Open Source Project For:
Social Engineering Works
Scan,Crawler & Analysis Web
Automatic Exploiter
Support Network Attacks
Autopwn – Used From Metasploit For Scan and Exploit Target Service
wmap – Scan,Crawler Target Used From Metasploit wmap plugin
format infector – inject reverse & bind payload into file format
phpmyadmin Scanner
CloudFlare resolver Continue reading

Kali Linux 2.0 has now Released

kali-linux-2-0-released
kali-linux-2-0-released

Kali Linux  has been released yesterday, 11-Aug-2015. Kali Linux 2.0 is now with a major release in tools, distribution and user interface since March 2013. Here are the major changes that you can see in Kali Linux 2.0.

  • new 4.0 kernel
  • based on Debian Jessie
  • improved hardware and wireless drivers
  • support for variety of Desktop Environments (GNOME, KDE, xfce, mate, e17, lxde, i3wm)
  • updated penetration testing tools

and much more.