Skip to main content

Posts

how to create wishing page from linux

if you want to remove rockstardevil from website than paytm me 10 dollar !!!! contact detail - instagram rockstardevil34 For this Web App, you Need to create a Four Files 1 - index.php 2 - userwish.php 3 - db.php 4 - .htaccess First Create a Database on your Webserver After creating the Database run this SQL Query to create Tables for the Web App CREATE TABLE event_wishes ( id INT NOT NULL AUTO_INCREMENT, title VARCHAR (500) NOT NULL UNIQUE, str VARCHAR (500) NOT NULL UNIQUE, PRIMARY KEY (ID) ); 27 After creating Database Tables create Three files index.php - Homepage userwish.php - Greeting Page db.php - For MYSQL Database Connection Now Add this Below code on db.php File <?php $dbhost = 'localhost' ; $dbuser = 'YOUR DB USER' ; $dbpass = 'YOUR DB PASS' ; $dbname = 'YOUR DB NAME' ; $con=mysqli_connect($dbhost, $dbuser, $dbpass,$dbname) //connect to the database server ...

Book Review: Kali Linux Revealed by Raphael Hertzog

Book Review: "Kali Linux Revealed" "Kali Linux Revealed: Mastering the Penetration Testing Distribution", by Raphael Hertzog , Jim O'Gorman ( elwood ), and Mati Aharoni ( muts ), with a forward by Johnny Long , was probably the most underwhelming infosec book I've read all year. I was expecting to learn about hacking and information security and instead got a book on mostly the Debian OS. Don't get me wrong, it's a decent book about Debian Linux fundamentals and provides pretty core information for any Linux user. 'Kali Linux Revealed' (KLR) is not really about information security or the curated collection of tools that makes the Kali distribution so renowned, as much as it is about the underlying operating system that Kali is now built on, Debian (as opposed to the previous BackTrack releases built on Knoppix ). While the authors are up front about this in the introduction, I purchased the book based on the cover...

Firefox Add-ons a Hacker Must Have

11 Firefox Add-ons a Hacker Must Have 1. Tamper Data Tamper data is a great tool to view and modify HTTP/HTTPS headers and post parameters. We can alter each request going from our machine to the destination host with this. It helps in security testing web applications by modifying POST parameters. It can be used in performing XSS and SQL Injection attacks by modifying header data. Add Tamper data to Firefox: https://addons.mozilla.org/en-us/firefox/addon/tamper-data/ 2. Firebug Firebug is a nice add-on that integrates a web development tool inside the browser. With this tool, you can edit and debug HTML, CSS, and JavaScript live on any webpage to see the effect of changes. It helps while analyzing JS files to find XSS vulnerabilities. It’s a very helpful add-on for finding DOM based XSS for security testing professionals. Add Firebug to your browser: https://addons.mozilla.org/en-US/firefox/addon/firebug/ 3. Hackbar Hackbar is a simple penetration tool for Fir...

Download mp3 ,pdf ,zip or rar with google dork

Ever wondered how to hack Google for free music or eBooks. Well, here is a way to do that. To download free music, just enter the following query on Google search box and hit enter. ?intitle:index.of?mp3 eminem Now, you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3” with “pdf” or “zip” or “rar”. I hope you enjoy using Google for hacking stuffs on the Internet. If you’ve liked this post, please pass your comments. Cheers!

Kali Linux Cheat Sheet for Penetration Testers by rock star devil

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet for Penetration testers is a high level overview for typical penetration testing environment ranging from nmap, sqlmap, ipv4, enumeration, fingerprinting etc. Always view man pages if you are in doubt or the commands are not working as outlined here (can be OS based, version based  changes etc.) for the operating system you are using (such as BlackBox, Black Ubuntu, ParrotSec OS, Debian, Ubuntu etc.). I’ve also referenced some guides that I found useful in different sections and it might come in handy. Recon and Enumeration NMAP Commands Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedu...