Skip to main content

Posts

phishing attack from linux with 3g/4g mobile internet hotspot on wan

Setup Online to local machine Forwarding for SET Social Engineering Toolkit in Kali Linux You will follow the given steps to setup  forwarding. Go on ngrok.com and click on Sign Up Fill your detail and register. Download ngrok zip file, choose appropriate architecture as per your system (64bit/32bit). otherwise you will face problem. Extract the files Run terminal and reach at location you have extracted ngrok file. After sign up on ngrok.com you will get two commands written there. Execute both commands in sequence. Start SET Social Engineering toolkit Select 1 > 2 > 3 > 2 options after starting toolkit and hit enter after pressing each key. It will ask for IP Address, Copy forwarding link generated by ngrok and paste here. Give the website name you want to create phishing page. (ex - www.facebook.com , www.gmail.com) Send link to victim and wait for logging him/her After Login I hope you like this article if you have any question commen...

how to use mobile network hotspot wan for website in linux / install ngrok / portword with mobile hotspot

Share Your Local Web Server Publicly using ngrok  how to portword with linux mobile 3g 4g internet without router share you your website As a web developer, my workflow often includes writing a little code, firing up a local web server, and doing a quick smoke test to make sure things look alright. Occasionally, I'll encounter a situation where I'll need someone else (coworker, client, etc.) to provide some feedback on a design decision before moving forward. If I'm in the office, it's easy. I'll just call them over to take a look. However, there are times when I need to share my local changes with someone remotely and get feedback quickly . If the change is relatively minor, deploying to some staging environment might be overkill. How can I expose my local web server publicly so my clients can view my changes and provide immediate feedback ? What is ngrok? ngrok is a reverse proxy that creates a secure tunnel from a public endpoint to a...

how to create wishing page from linux

if you want to remove rockstardevil from website than paytm me 10 dollar !!!! contact detail - instagram rockstardevil34 For this Web App, you Need to create a Four Files 1 - index.php 2 - userwish.php 3 - db.php 4 - .htaccess First Create a Database on your Webserver After creating the Database run this SQL Query to create Tables for the Web App CREATE TABLE event_wishes ( id INT NOT NULL AUTO_INCREMENT, title VARCHAR (500) NOT NULL UNIQUE, str VARCHAR (500) NOT NULL UNIQUE, PRIMARY KEY (ID) ); 27 After creating Database Tables create Three files index.php - Homepage userwish.php - Greeting Page db.php - For MYSQL Database Connection Now Add this Below code on db.php File <?php $dbhost = 'localhost' ; $dbuser = 'YOUR DB USER' ; $dbpass = 'YOUR DB PASS' ; $dbname = 'YOUR DB NAME' ; $con=mysqli_connect($dbhost, $dbuser, $dbpass,$dbname) //connect to the database server ...

Book Review: Kali Linux Revealed by Raphael Hertzog

Book Review: "Kali Linux Revealed" "Kali Linux Revealed: Mastering the Penetration Testing Distribution", by Raphael Hertzog , Jim O'Gorman ( elwood ), and Mati Aharoni ( muts ), with a forward by Johnny Long , was probably the most underwhelming infosec book I've read all year. I was expecting to learn about hacking and information security and instead got a book on mostly the Debian OS. Don't get me wrong, it's a decent book about Debian Linux fundamentals and provides pretty core information for any Linux user. 'Kali Linux Revealed' (KLR) is not really about information security or the curated collection of tools that makes the Kali distribution so renowned, as much as it is about the underlying operating system that Kali is now built on, Debian (as opposed to the previous BackTrack releases built on Knoppix ). While the authors are up front about this in the introduction, I purchased the book based on the cover...

Firefox Add-ons a Hacker Must Have

11 Firefox Add-ons a Hacker Must Have 1. Tamper Data Tamper data is a great tool to view and modify HTTP/HTTPS headers and post parameters. We can alter each request going from our machine to the destination host with this. It helps in security testing web applications by modifying POST parameters. It can be used in performing XSS and SQL Injection attacks by modifying header data. Add Tamper data to Firefox: https://addons.mozilla.org/en-us/firefox/addon/tamper-data/ 2. Firebug Firebug is a nice add-on that integrates a web development tool inside the browser. With this tool, you can edit and debug HTML, CSS, and JavaScript live on any webpage to see the effect of changes. It helps while analyzing JS files to find XSS vulnerabilities. It’s a very helpful add-on for finding DOM based XSS for security testing professionals. Add Firebug to your browser: https://addons.mozilla.org/en-US/firefox/addon/firebug/ 3. Hackbar Hackbar is a simple penetration tool for Fir...