tag:blogger.com,1999:blog-74382302206446888222019-03-15T02:21:45.049-07:00Learn Cyber Securityhack clash of clans, instagram hack, snapchat hack, kali linux, candy crush hack, hack whatsappAdnan Anjumnoreply@blogger.comBlogger950125tag:blogger.com,1999:blog-7438230220644688822.post-41559526836010978902017-10-16T03:00:00.000-07:002017-10-16T09:19:21.316-07:00Hack WPA2-PSK clients with Key Re-installation Attacks
Mathy Vanhoef discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive Adnan Anjumnoreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-77784506314806335112017-05-20T07:18:00.000-07:002017-06-29T07:27:39.712-07:00WannaCry Ransomware | Solution | Fix
Since the WannaCry ransomware ripped through the internet in May 2017, infecting hundreds of thousands of machines and locking up critical systems from health care to transportation, cryptographers have searched for a cure. Finding a flaw in WannaCry’s encryption scheme, after all, could decrypt all those systems without any ransom.
Now one French researcher says he’s found at least a hint ofAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-43609678914673443592016-12-26T11:44:00.001-08:002016-12-26T11:44:15.865-08:00Hack Clash of Clans , Coins, elixir, Gems,
freemium mobile MMO strategy video game Clash of clans developed and published by Supercell. August 2, 2012, The game was released for iOS platforms and on October 7, 2013 on Google Play for Android. you can easily cheat coc or coc hack is not a big deal.
Click here to Download Android Apk
To generate onlineClick Here
Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com2Newark, NJ, USA40.734770989672406 -74.152221679687540.638468489672405 -74.3135831796875 40.831073489672406 -73.9908601796875tag:blogger.com,1999:blog-7438230220644688822.post-25131312724296954282013-12-31T10:56:00.000-08:002013-12-31T10:56:22.975-08:00Sharing my Penetration Testing Tools with Source
After conducting Penetration Tests over the last 15 years i have a huge collection of windows and linux tools which help you to conduct penetration tests. They cover what backtrack tools, nessus, metasploit and many other cool dev's did not do the job for me.Tool categories are:webscanner, smtp scanner, ipv6 scanner, android trojans, stealth keyloggers, stealth remote control software Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com2tag:blogger.com,1999:blog-7438230220644688822.post-2068544083905337172012-12-29T13:41:00.000-08:002012-12-29T13:41:08.350-08:00WordPress Asset-Manager PHP File Upload Vulnerability##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
require 'msf/core/exploit/php_exe'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include MsfAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-67988752732507464852012-12-29T13:35:00.005-08:002012-12-29T13:38:21.514-08:00Executing SMB Relay Attacks via SQL Server using MetasploitIn this blog, I’ll provide a brief overview of SMB Relay attacks and
show how they can be initiated through a Microsoft SQL Server. I will
also provide some practical examples that show how to use new Metasploit
modules to gain unauthorized access to SQL Servers during a penetration
test. Below is a summary of what will be covered in this blog:
A Brief History of SMB Relay
Using SQL Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-52942972830620737762012-12-29T13:32:00.002-08:002012-12-29T13:32:57.483-08:00SQL Fingerprint Xmas ReleasedMicrosoft SQL Server fingerprinting can be a time
consuming process, because it involves trial and error methods to
determine the exact version. Intentionally inserting an invalid input to
obtain a typical error message or using certain alphabets that are
unique for certain server are two of the many ways to possibly determine
the version, but most of them require authentication, permissionsAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-33607160407451033612012-09-24T10:57:00.000-07:002013-12-31T11:49:58.684-08:00Online Penetration Testing Tools [Private]
Word Press
Remote Code Execution , BruteForce via IP , Theme ScaNne via IP , Theme ScaNne , Site Extracte. Joomla
Turbo Brute Force , Token ScaNe Server, ScaNner Site Extracte,
vBulletin
vB SQL[4.0.x =>4.1.3] , vB Brut Force [Proxy]
Sql
SQL Server ScaNne, SQL Target ScanNer, SQL Dork ScaNne, SQL Injection Helpe,r Admin Finder. LFI
LFI Server ScaNner, LFI ToOl'z Kit, LFI Inject Shell, LFI Adnan Anjumnoreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-22660919717381407662012-07-24T11:52:00.000-07:002012-07-24T11:52:14.392-07:00Metasploit Nmap VersionFor those of you wondering why metasploit uses nmap 5.61 instead of 6.01 when you do
an nmap scan in metasploit its because metasploit has its own nmap built in and the metasploit devs haven't upgraded it yet
if you want to use Nmap 6.01 in metasploit do the following.
Code:
su
mv /opt/metasploit/common/bin/nmap /opt/metasploit/common/bin/nmap.bak
ln -s /usr/local/bin/nmap /opt/metasploit/commonAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-74315852043412428382012-07-23T12:17:00.000-07:002012-07-23T12:17:23.294-07:00Metasploit Penetration Testing Cookbook
Download Metasploit Penetration Testing Cookbook
Set up a complete penetration testing environment using metasploit and virtual machines
Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
Avail of exclusive Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-60350367906391674332012-07-23T11:40:00.000-07:002012-07-23T11:40:51.347-07:00Real-World Security Tests Using MetasploitThe Perl-based Metasploit was designed to be a robust exploit development system. It just so happens that you can use it to run previously developed exploits against your own systems. You can use its security testing features to see if your systems vulnerable to penetration and how they react when specific payloads are sent their way.
Outside of common Web application tests such as SQL Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-76470334228338418252012-07-23T11:12:00.000-07:002012-07-23T11:12:02.893-07:00Owasp Xelenium - XSS Scanner Xelenium is a security testing tool that can be used to identify the security vulnerabilities present in the web application. Xelenium uses the open source functional test automation tool 'Selenium' as its engine and has been built using Java swing.
Xelenium has been designed considering that it should obtain very few inputs from users in the process of discovering the bugs.
Current Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-31913643023072502542012-03-12T05:28:00.000-07:002012-03-12T05:28:32.253-07:00Download BackTrack 5 R2BackTrack 5R2 comes in several flavours and architectures.
Download BackTrack 5R2 32bit Gnome
Download BackTrack 5R2 32bit KDE
DownloadBackTrack 5R2 64bit Gnome
Download BackTrack 5R2 64bit KDE
Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com2tag:blogger.com,1999:blog-7438230220644688822.post-80412092331868233452012-01-13T20:20:00.000-08:002012-01-13T20:21:06.994-08:00Metasploit Framework Post Exploitation - Windows Security Center
Quick demo as part of post exploitation phase with Metasploit Framework and some tips about the Windows Security Center and the system notificationsAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com1tag:blogger.com,1999:blog-7438230220644688822.post-22137393246486808142012-01-13T20:15:00.000-08:002012-01-13T20:15:20.721-08:00DEFT Linux 7 Computer Forensic Live Cd - ReleasedDEFT (Digital Evidence & Forensic Toolkit) is a customised distribution of the Lubuntu live Linux CD. It is an easy-to-use system that includes excellent hardware detection and some of the best open-source applications dedicated to incident response and computer forensics.
New features:
- Based on Lubuntu 11.10
- Installable Distro
- Linux kernel 3.0.0-12, USB 3 ready
- Libewf 20100226
- Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-85394152630361648272012-01-12T17:22:00.000-08:002012-01-12T17:23:01.268-08:00Hack Windows 7 with MetasploitIn this tutorial i will exploit a Windows 7 Sp1 OS using Metasploit. i will be using the exploit/multi/handler module which “provides all of the features of the Metasploit payload system to exploits that have been launched outside of the framework“
Before we fire up Metasploit, we need to create a payload in order to gain a meterpreter shell. To create a payload type this in the terminal withoutAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-87034898964734854842012-01-09T14:34:00.001-08:002012-01-09T14:34:58.904-08:00MS11-100 DoS PoC exploit publishedIf you have not patched yet for vulnerability MS11-100 you might want to do it ASAP, because the DoS PoC exploit for this vulnerability has been published three days ago.
More information about the vulnerability and patches at http://technet.microsoft.com/en-us/security/bulletin/ms11-100Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-27092467651031263052012-01-09T14:30:00.000-08:002012-01-09T14:30:02.202-08:00Simple Mail Server - SMTP Authentication Bypass VulnerabilityTitle: Simple Mail Server - SMTP Authentication Bypass Vulnerability
Software : Simple Mail Server
Software Version : 2011-12-30
Vendor: http://simplemailsvr.sourceforge.net/
Class: Origin Validation Error
CVE:
Remote: Yes
Local: No
Published: 2012-01-08
Updated:
CVSS2 Base: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
Impact : Medium (4 < 6.4 < 8)
Bug Description :
Simple Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com1tag:blogger.com,1999:blog-7438230220644688822.post-65309736534821685392012-01-06T07:42:00.000-08:002012-01-06T07:55:02.535-08:00Perform Smart SSL Cipher Enumeration:SSL SmartSSLSmart, a highly flexible and interactive tool aimed at improving efficiency and reducing the false positives during SSL testing.
Among other things, SSLSmart simply an advanced and highly flexible Ruby based smart SSL cipher enumeration tool. It is an open source, cross platform, free tool. It was programmed because a number of tools on the Windows platform allow users to test for supported Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-19985975462935440622011-12-31T13:24:00.000-08:002011-12-31T13:24:47.357-08:00Bypass Intrusion Detection/Prevention Signatures*Please note that this does not include the multitude of configuration errors (disabled by default checks like POST search/bad preprocessor configurations like minimum fragment length) nor network vs. host-based issues like fragment reassembly.For configuration errors by default, please check http://cvs.snort.org....cgi/snort/doc/ and read appropriate preproc documents for disabled checks. By Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-51108802567719666662011-12-31T13:17:00.000-08:002011-12-31T13:17:16.699-08:00Writing Shell Code On/For WindowsIntroductionThis article/tutorial assumes you have some common sense and some knowledge.I won't be explaining what shell code, DLL's, Memory Adresses etc...You should know that before starting on this.EnvironmentInitially we will be focusing on creating Windows Assembly; however, Linux is reallygood for developing assembly and shell code. But because we are on windows we'lluse Cygwin.Download theAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-60558842600252083442011-12-31T13:10:00.000-08:002011-12-31T13:10:07.079-08:00Password Security Scanner v.1.00This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords. The security information of every stored password includes the total number of characters, number of numeric characters, number of lowercase/uppercase characters, number of repeating characters, Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-67989101173671587172011-11-28T13:18:00.000-08:002011-11-28T13:18:14.332-08:00How To Hack Facebook
After watching this video you are now able to build keylogger server with default options for some advance options you can explore various builder functions.
Last Update Date: 10/11/2011 (Curing update.)
Latest Version: v1.78
Project Neptune (1.7 MiB )
Project Neptune includes many features that separate it from other programs and simply make it the best. Each of it,s functions are entirelyAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com7tag:blogger.com,1999:blog-7438230220644688822.post-48487869351762662082011-10-21T12:30:00.000-07:002011-10-21T12:30:04.749-07:00Free Comodo Internet Security Pro 2012 one year license keyComodo Internet Security Pro 2012 which is priced at $49.99. This promo will allow users to use the latest pro version completely free for a year.
Free Comodo Internet Security Pro 2012 Comodo Internet Security Pro comes with powerful cloud based Antivirus, Antispyware, and an excellent award winning firewall with defense plus technology that provides high-level of protection. The 2012 Adnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0tag:blogger.com,1999:blog-7438230220644688822.post-30056493683714267212011-10-17T05:30:00.000-07:002011-10-17T05:30:10.975-07:00Official GNOME Shell ExtensionsOfficial GNOME Shell Extensions Available In The WebUpd8 GNOME 3 PPA For Ubuntu 11.10The latest official GNOME Shell Extensions (version 3.2.0) are now available in the WebUpd8 GNOME 3 PPA for Ubuntu 11.10 Oneiric Ocelot. This PPA is an attempt to have all the stable GNOME 3.2 packages that aren't available in the official Ubuntu 11.10 repositories in a single place. Please note that I did notAdnan Anjumhttps://plus.google.com/110311237631564786309noreply@blogger.com0