Skip to main content

Posts

Showing posts from 2016

How to Secure your Linux System

Today I'm going to demonstrate how to reset Kali Linux root password so  it may be common for some Linux distributions. When you use Linux  as a default operating system you need to secure your system before someone can break it. first,  watch the demonstration and follow the steps. 

Lets Hack Facebook

Create Facebook Phishing site Warning & Disclaimer:  Making a phishing page is not illegal, but using a phishing page is illegal. This tutorial is just to show you, "How to create phishing page?". If you use this to hack anyone account, then I AM not responsible for it. Do anything at your own risk. The creating Facebook phishing site is the most popular topic in today. so today I am going to explain how to create the best phishing site and how it sends to victims. The tutorial has 3 parts Mirror Facebook page create phishing page hosts site URL Masking Let's start.... Mirror Facebook Page Create best phishing page you need some skills that are social engineer skill. what is the social engineer skill ?? basically, social engineering is the get idea about victims looking her/his facebook ,body or chatting and grab his or her likes. Today I am going to phishing guy or girl who loves free gifts like iPhone 6 Now you n

Remote Desktop to AWS Windows 2012

 Right click on Instance and select connect ·           Now pop-up came and asked to select you key pair then locate key file on computer or you can paste key file contained then click Decrypt Password  ·          Now you can see your Windows instance Username and Password ·          Copy your Public DNS and start Windows Remote Desktop Connection so when it started paste DNS to first textbox and also type user name as Administrator all steps were done next click Connect button ·          Now you can see new window appear and ask password of Administrator account copy the password before we get and paste it and click ok   Finally, new window opens and asked security certificates click yes ·          Connection was done

Shodan Search engine

Shodan Search engine Tutorial 1 Shodan  is a  search engine  that lets the user find specific types of computers (routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of  service banners , which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server. Actually Shodan is good search engine for hacking purpose. example i want to find on all cisco products in lk domain(in Sri Lanka) lets try  Click me  and type on search bar  cisco country:lk  we ca n see many devices  connect to internet .  but free edition they give 5 pages only. Filters  city:  Find devices in a particular city country:   Find devices in a particular country geo: you can pass it coordinates hostname: find values that match the hostname net:

Squid Proxy Server

Install and Configure Squid Proxy Server  Introduction  Squid is an excellent open source web caching proxy package but is requires quite a lot of tuning to achieve the kind of performance seen in commercial proxies. This report present several independently useful ideas for tuning a web caching system  Squid Proxy overview  Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin. Squid supports caching of many different kinds of Web objects, including those accessed through HTTP and FTP. Caching frequently requested Web pages, media files, and other content accelerates response time and reduces bandwidth congestion. A Squid proxy server is generally installed on a separate server than the Web server with the original files. Squid works by tracking object use over the network. Squid will initially act as an intermediary, simply passing the client's request on to the server and saving a copy of the request