Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Ajay yadav
38 articles
NMAP Cheat Sheet
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ...
Read MoreExecuting C# code in Linux
The .NET centric applications are meant to windows operating system up till now, but now Microsoft has introduced a new cross-platform application called Mono which enables the execution of the application developed under the .NET platform in Linux environment by giving an impression in such a way that as if we are running Linux package rather than executing .exe file.MonoMono is an open-source utility that allows the developer to execute .NET centric applications on other platforms such as Mac or Linux as it provides an installation package for Windows platform to compile and execute .NET assemblies on Windows OS without ever ...
Read MoreMalicious QR Code with QRGen
The QR codes are machine-readable data formats used for anything that needs to be scanned automatically. It is possible to exploit the common vulnerabilities using exploits packed into custom QR codes as it is everywhere, from product packaging to airline boarding passes, etc. Hacker used a tool QRGen that create malicious QR codes to target vulnerable devices. QR code attacks are potent because humans can't read or understand the information contained in a QR code without scanning it, potentially exposing any device used to attempt to decipher the code to the exploit contained within. A human can't spot a malicious ...
Read MoreAndroid app Vulnerability Scanner
AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. We share our personal data through mobile apps if they are not secure its mean we not secured, let start Find vulnerability of android Mobile App - App security. Through this we can...find vulnerability in Appcheck the codeDangerous shell commandcollect information of appRequirementsBasic knowledge of LinuxApp which you testKali Linux MachineNow clone the Androbug – Framework. This framework is android vulnerability scanner tool; This tool is help-full for hacker and android penetration tester.git clone https://github.com/AndroBugs/AndroBugs_Frameworkgitcd AndroBugs_Frameworkpython androbugs.py -f /root/Desktop/Secure.apk -o ...
Read MoreBuild Your Own Botnet
BYOB provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily implement their own code and add cool new features without having to write a RAT or Command & Control server from scratch.FeaturesNothing Written To The Disk − clients never write anything to the disk - not even temporary files because remote imports allow arbitrary code ...
Read MoreHow to Bypass YouTube ADs
Sometimes the random ads are irritating in YouTube video. I am showing how you can bypass YouTube Ads by using a simple trick.What to do?Open your browser.Visit YouTube.com URL.When you visit your favorite video on YouTube, on address bar, you need to add a dot [.]Done.POC ExampleWhen you visit a YouTube video, Url looks like YouTube.com/xyz, and here you will need to add youtube.com./xyz in URL.https://www.youtube.com/watch?v=xyz (Showing ADs)https://www.youtube.com./watch?v=xyz (Not Show ADs)Note - It will work on the desktop. For mobile browser, you need to use a desktop version of the video page.How does it worksIt's a commonly forgotten edge case, ...
Read MoreCover the Tracks using covermyass
It is imperative to fully cover your tracks you made on the systems during assault. This tool is designed for pen testing "covering tracks" phase, before exiting the infected server. Or, permanently disable system logs for post-exploitation.This tool allows you to clear log files such as −/var/log/messages # General message and system related stuff/var/log/auth.log # Authenication logs/var/log/kern.log # Kernel logs/var/log/cron.log # Crond logs/var/log/maillog # Mail server logs/var/log/boot.log # System boot log/var/log/mysqld.log # MySQL database server log file/var/log/qmail # Qmail log directory/var/log/httpd # Apache access and error logs directory/var/log/lighttpd # Lighttpd access and error logs directory/var/log/secure # Authentication log/var/log/utmp # Login ...
Read MoreAndroid Debug Bridge Mode
Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The ADB is typical, used to communicate with a smartphone, tablet, smartwatch, set-top box, or any other device that can run the Android operating system. We can do things on an Android device that may not be suitable for everyday use, like, install apps outside of the Play Store, debug apps, access hidden features, and bring up a UNIX shell, etc. For security reasons, Developer Options need to be unlocked and you need to have USB Debugging Mode enabled as well. Not only that, ...
Read MorePentesting using Docker
You will learn how to configure vulnerable web applications (DVWA) with the help of docker in easy steps. Docker is a third-party tool developed to create an isolated environment to execute any application. These applications are run using containers. These containers are unique because they bring together all the dependencies of an application into a single package and deploy it. Hit these commands to install and configure it as;apt updateapt install docker.iosystemctl start dockersystemctl enable dockerConfigure DVWA on DockerDamn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid ...
Read MoreTheZoo Repository Live Malware Analysis
theZoo's allows the study of malware and enable people who are interested in malware analysis to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment.git clone https://github.com/ytisf/theZoocd theZoopip install --user -r requirements.txtpython theZoo.pyI recommend running them in a VM which has no internet connection (or an internal virtual network if you must) and without guest additions or any equivalents. Some of them are worms and will automatically try to spread out. Running them unconstrained means that you will infect yourself or others with ...
Read More