Posts

Showing posts from 2018

HOW TO USE PROXY CHAINS ?

What is Proxy Chains? Proxy Chains is a UNIX program that hooks network-related libc functions in dynamically linked programs via a preloaded DLL and redirects the connections through SOCKS4a/5 or HTTP proxies. This is open source software for GNU/Linux systems. A tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP. proxyresolv - DNS resolving. Used to resolve host names via proxy or TOR. When to use it? What for? Why? *When you want two (or more) different proxies in chain: Like: your_host <--> proxy 1 (TOR) <--> proxy 2 (HTTP or SOCKS4/5) <--> target_host *  You may need it when the only way out from your LAN is through proxy server o r to get out from behind restrictive firewall that filters some ports in outgoing traffic. * Y ou ...

AFTER INSTALLING UBUNTU, WHAT TO DO NEXT ? HOW TO INSTALL VARIOUS REQUIRED TOOLS ?

Don't worry i will cover everything in this post, So lets start with 1. C hecking for update: search for “software updater” in all show application.Open this and click on check for update. 2. Install all missing/additional drivers: a)   search for software and updates. b) Click on additional drivers. c)   Click on do not use. d) Follow the instruction appear on the screen. 3. Install GNOME Tweak tools: Gnome tweak tools used for providing access to lot of customization setting along with reset to defaults options. Type: "sudo apt-get install gnome-tweak-tool -y" To run tweak tool search “tweak" in show application. 4.Enable firewall for enhanced security: Type: " sudo ufw enable" "   sudo ufw status" Now how to specify any services or ports in ufw "sudo ufw allow ssh" or you can also specify any ports "sudo ufw allow 22 tcp" if you need graphical interf...

HOW TO ENABLE MONITOR MODE ON ANY WIRELESS ADAPTER CONNECT TO KALI LINUX MACHINE ?

What is Monitor Mode? Monitor Mode , or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received from the wireless network. Unlike promiscuous mode , which is also used for packet sniffing , monitor mode allows packets to be captured without having to associate with an access point or ad hoc network Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the eight modes that 11 wireless cards can operate in: Master (acting as an access point), Managed (client, also known as station), Ad hoc , Repeater , Mesh , Wi-Fi Direct , TDLS and Monitor mode. How to Enable Monitor Mode in Kali Linux? Follow this below steps in sequence order to turn on monitor mode in your Linux machine. Open terminal type: airmon-ng - this command is used to view details of Wi-Fi adapter which you connect to the machine. ifcon...

HOW TO CHANGE OR SPOOF MAC ADDRESS IN KALI LINUX ?

Why Do We Need To Change MAC Address? The Question arising in your mind that what is MAC Address? and why do we need to Change MAC Address? For Instance, let us understand by simple example you are working in a company where your MAC address is Blacklisted so you are not allowed to use the Company's Network or the Internet, Therefore, you are not permitted to use the internet, So what you will do now? The best way to use the internet is either make your MAC address white list or just change your MAC address so that there is no record for your new MAC address in the Company's Blacklisted MAC address. So that's why we need to change the MAC address of the Machine. What is MAC Address? MEDIA ACCESS CONTROL or also known as MAC Address is also known as hardware or Physical Address. It is 48 bit in size & it is Hexadecimal. Moreover, It is an address which is assigned to the network adapter or network interface card usually by the manufacturer. www.coffer....

HOW TO INSTALL VMWARE ON UBUNTU 18.04 TLS ?

Open terminal and type:             1. sudo apt-get install build-essential    Now after this type           2. wget -O ~/vmware.bin https://www.vmware.com/go/getworkstation-linux   After downloading          3. sudo bash ~/vmware.bin   Enter the product key            4. YZ35U-4PED5-M881Z-87WEV-NY2XA It Is Installed Successfully  :) We Highly Appreciate Your Feedback,  Support Us To Produce More And More. Enjoy Have A Good Time :) If You Have Any Problem Please Comment Below Or Contact Admin: bsolutionhub@gmail.Com You Can Also Follow Us On Instagram – Best Solution Hub Youtube - https://www.youtube.com/channel/UCaLbWxPKrkXz0ulzSNFAAlg/

HOW TO INSTALL KALI LINUX -THE MODERN DAY HACKER'S OS

You're seeing this post probably because you want to install Kali Linux in your PC, if you don't you came here just to see what's this thing 'Kali Linux'... So it is a modified of Linux made for hackers... You can for example hack WPA/WPA2 (internet passwords). It's basically the perfect OS for the hackers, the 'Hackers' Paradise'. Setup - Virtual Machine (VMWare, VirtualBox) - μTorrent/BitTorrent Tutorial Step 1 - Install VirtualBox. ATENTION: Install VirtualBox version 4.3.12 because the latest version (4.3.14) is having some problems with some antivirus... So i recommend you to download version 4.3.12. Step 2 - Search on Google for Kali Linux and click in the first website (official one), select the Downloads tab and download the 'Kali Linux 32 bit ISO' with torrent not direct or it will take forever to download. Step 3 - Now open up VirtualBox and click on 'New' (top left). Name it Kali Linux 1.0.8 (or whatever vers...

RED ALERT: Over 20 Million Users Installed Malicious Ad Blockers From Chrome Store

Image
If you have installed any of the below-mentioned Ad blocker extension in your Chrome browser, you could have been hacked. A security researcher has spotted five malicious ad blockers extension in the Google Chrome Store that had already been installed by at least 20 million users. Unfortunately, malicious browser extensions are nothing new. They often have access to everything you do online and could allow its creators to steal any information victims enter into any website they visit, including passwords, web browsing history and credit card details. Discovered by Andrey Meshkov, co-founder of Adguard, these five malicious extensions are copycat versions of some legitimate, well-known Ad Blockers. Creators of these extensions also used popular keywords in their names and descriptions to rank top in the search results, increasing the possibility of getting more users to download them. "All the extensions I've highlighted are simple rip-offs with a few lines of ...

Top Ways How Hackers Can Hack Facebook Accounts In 2018

I will show number of ways to Hack Facebook Account that all hackers usually use to hack Facebook Account. So beware from hackers and protect your facebook account from hackers. Our site provides only security tips to protect your facebook account from hackers . We sharing only these methods because if you know how to hack you must know how to secure. Must read carefully all these methods, beware from all attacks, and protect your facebook account from hackers. Note :- This post is only for security purpose don't try any illigal activity and i'm just shared these methods because protect our facebook account from these types of hacking attacks Mostly Hackers use these methods to hack facebook account 2016, So protect yourself from hackers. Must Read this post, and beware from hackers #1 Hack Facebook Account Password By Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. ...

HOW TO FIND A MS WORD FILE THAT HAS CLOSED WITHOUT SAVING ?

HOW TO RECOVER A UNSAVED MICROSOFT OFFICE FILES THAT WAS CLOSED WITHOUT SAVING? It is a location where you can find the file in which you are working and accidentally it doesn’t save then you can find the file from this method C:\Users\BRAVO\AppData\Local\Microsoft\Office\UnsavedFiles Or Search “.asd “ in my computer search bar. We Highly Appreciate Your Feedback,  Support Us To Produce More And More. Enjoy Have A Good Time :) If You Have Any Problem Please Comment Below Or Contact Admin: bsolutionhub@gmail.com You Can Also Follow Us On Instagram – Best Solution Hub Youtube - https://www.youtube.com/channel/UCaLbWxPKrkXz0ulzSNFAAlg/