Tuesday, December 31, 2013

Deep Purple - Soldier of Fortune

Read full details here:
Deep Purple - Soldier of Fortune

This is the era of Computing and we are the “Soldier of Fortune”.
Thanks all my fans, visitors, readers and supporters.
Here’s my favorite song dedicated to everyone. Hope 2013 was fantastic and wishing everyone a happy and prosperous 2014.

Happy New YEAR!!!

Artist: Deep Purple
Album: Stormbringer, 1974
Title: Soldier of Fortune
Songwriters: Ritchie Blackmore, David Coverdale



Read the rest of it here: Deep Purple - Soldier of Fortune

Saturday, December 28, 2013

Enable USB Boot in Gigabyte Motherboard

Read full details here:
Enable USB Boot in Gigabyte Motherboard


I've got this Gigabyte Motherboard GA-P35-DS3L (rev. 2.0) in my old desktop running Q6600 Quad Code CPU and 4GB RAM. I've used this computer for last 5 years and to be honest, it's still superb compared to some newer machines I've used recently. I installed Windows 7 and Kali Linux on it and after almost 2 years I decided it's time to reformat and re-install everything from scratch. Easier said than done. I put a USB disk with Windows 7 on it and rebooted. My Gigabyte motherboard doesn't detect it Live USB! I can honestly say, it did last time I tried. Naturally, I thought, I must've messed up my Live Windows 7 USB stick. So, I tried Linux (Kali Linux, Ubuntu, Arch .. you name it), still Gigabyte motherboard doesn't detect any of the Live USB's. I so started looking to motherboard to figure out how to enable USB boot in Gigabyte Motherboard.


Read the rest of it here: Enable USB Boot in Gigabyte Motherboard

Thursday, December 19, 2013

Auto login root user at system start in Kali Linux - GNOME and KDE

Read full details here:
Auto login root user at system start in Kali Linux - GNOME and KDE


Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni and Devon Kearns of Offensive Security developed it by rewriting BackTrack, their previous forensics Linux distribution.
By default root is the only user account in Kali Linux. It doesn’t present any option to create another user during installation. It however presents an option to set root password during installation. You need root privileges to run pretty much everything in Kali Linux. You can create another non root standard user (See previous post: Add remove user (standard user/non-root) in Kali Linux) for day to day use given that Kali is your Primary Linux distribution but it might get tedious to type in the root password every time you login. This guide will show you how to make a simple few line changes to allow your auto login root  user at system start or boot time in both KDE and GNOME Desktop.








Read the rest of it here: Auto login root user at system start in Kali Linux - GNOME and KDE

Wednesday, December 18, 2013

Fix "WARNING: The following packages cannot be authenticated!" in Kali Linux

Read full details here:
Fix "WARNING: The following packages cannot be authenticated!" in Kali Linux

I just reinstalled Kali 1.0.5 and successfully did apt-get update and apt-get upgrade. But when I am trying to do an apt-get dist-upgrade I get this error
“WARNING: The following packages cannot be authenticated!”
Obviously I don’t want to install un-authenticated package. So I cancelled. Did some Googling and different people in different versions of Linux seems to have similar problem, however there wasn’t any clean solution specific for Kali Linux. I finally managed to figure it out and decided to write a small guide on it. So, next time someone else having the same issue, all they need to do is follow my guide and it will be fixed.

Fix WARNING The following packages cannot be authenticated! in Kali Linux - 1 - blackMORE Ops


Read the rest of it here: Fix "WARNING: The following packages cannot be authenticated!" in Kali Linux

Monday, December 16, 2013

Installing Tor In Kali Linux

Read full details here:
Installing Tor In Kali Linux

How to install Tor - logo - blackMORE Ops

What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. This guide guides your through installing tor in Kali Linux.

Why anonymity matters?

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.



Read the rest of it here: Installing Tor In Kali Linux

Thursday, December 12, 2013

How to change hostname in Kali Linux?

Read full details here:
How to change hostname in Kali Linux?


Kali Linux is becoming popular and more and more users are using it to try out different things. When installing kali, you get to choose a hostname, but in case you accepted the default hostname (kali) and later want to change it, here’s a How to guide to change hostname in Kali Linux.
Now...



Read the rest of it here: How to change hostname in Kali Linux?

How to change hostname in Kali Linux?

Read full details here:
How to change hostname in Kali Linux?


Kali Linux is becoming popular and more and more users are using it to try out different things. When installing kali, you get to choose a hostname, but in case you accepted the default hostname (kali) and later want to change it, here’s a How to guide to change hostname in Kali Linux.
Now...



Read the rest of it here: How to change hostname in Kali Linux?

Monday, December 9, 2013

Triple Boot Arch Linux XFCE with Linux Mint and Windows 7

Read full details here:
Triple Boot Arch Linux XFCE with Linux Mint and Windows 7


Triple Boot Arch Linux XFCE with Linux Mint and Windows 7
Arch Linux is an independently developed, i686/x86-64 general purpose GNU/Linux distribution versatile enough to suit any role. Development focuses on simplicity, minimalism, and code elegance. Arch is installed as a minimal base system,...



Read the rest of it here: Triple Boot Arch Linux XFCE with Linux Mint and Windows 7

Wednesday, December 4, 2013

Useful Google hacks

Read full details here: Useful Google hacks

I’ve been searching Internet and found lots of interesting info about how to use Google for hacks and different intuitive ways to use search strings to get useful information. Googledorks already uses these to compile their lists. However I was unable to find some information and explanations in there. So I’ve decided to compile a nice guide for Useful Google Hacks and Tricks for readers and myself. I’ve included as much credits I can at the bottom of this post including authors websites, however, if I’ve missed any, feel free to comment and I’ll ensure they are included. Also note that, these information’s are publicly available in many websites, so it was quite hard for me to credit original authors/finders.

Useful Google Hacks

Google is #1 ranked search engine in modern Internet. They are a giant who got access to your website, your mobile, your eCommerce site, your IRC site and god knows what else. That means they get a massive amount of information’s and data. Out of those there’s always the chance of leaked sensitive data such as server config, password file, backup file, proprietary materials such as eBooks, Music, PDF, Word Documents, Serial Number etc. In this post I will try to show how to use Google hacks to gather information and looks for exploitable information. If you find something important, please try to contact the owner and report the search string to Google rather than abusing it. I am not responsible how readers might or mights not use the information provided below.




Hacking Security Cameras

Now this is a known one, We’ve all tried it at some point. I am not even sure if this is allowed or not, but I definitely think IP cameras should be more secured so that people can’t look into your Baby Monitor or simple Home Security Cameras. Different vendors provided product specific patches in different times, be sure to spread the word so that you’re not the victim of unsolicited prying.
There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.
You now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.
intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or eBooks. Well here is a way to do that. To download free music just enter the following query on Google search box and hit enter.
“?intitle:index.of?mp3 eminem“
Now you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of Eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “Eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.
Read the rest of it here: Useful Google hacks

Sunday, December 1, 2013

How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome

Read full details here:
How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome


Continued from How to Install Google Chrome in Kali Linux? – Part 2 – Installation
Running Google Chrome in Kali Linux
You have follow choices to run Google Chrome in Kali Linux:

Run Google Chrome as a Standard user in Kali Linux

Create a Standard non-root user and run Google...



Read the rest of it here: How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome

How to Install Google Chrome in Kali Linux? - Part 2 - Installation

Read full details here:
How to Install Google Chrome in Kali Linux? - Part 2 - Installation


Install Google Chrome in Kali Linux:
 
From our previous post (How to Install Google Chrome in Kali Linux? – Part 1 – Discussion)we know that we can install Google Chrome in two different ways:

Download and Install .deb package from Google.
Install Google Chrome by adding Google Rep...



Read the rest of it here: How to Install Google Chrome in Kali Linux? - Part 2 - Installation

How to Install Google Chrome in Kali Linux? - Part 1 - Discussion

Read full details here:
How to Install Google Chrome in Kali Linux? - Part 1 - Discussion



Google Chrome is a web browser developed by Google. It used the WebKit layout engine until version 27 and, with the exception of its iOS releases, from version 28 and beyond uses the WebKit fork Blink. It was first released as a beta version for Microsoft Windows on September 2, 2008, and as a...



Read the rest of it here: How to Install Google Chrome in Kali Linux? - Part 1 - Discussion

Thursday, November 28, 2013

How to fix GDBus.Error:org.freedesktop.PolicyKit1.Error.Failed: An authentication agent already exists for the given subject error in Kali, LMDE or Debian Linux?

Read full details here:
How to fix GDBus.Error:org.freedesktop.PolicyKit1.Error.Failed: An authentication agent already exists for the given subject error in Kali, LMDE or Debian Linux?


This is a small guide on How to fix GDBus.Error:org.freedesktop.PolicyKit1.Error.Failed: An authentication agent already exists for the given subject error in Kali, LMDE or Debian Linux.
How to fix GDBus.Error:org.freedesktop.PolicyKit1.Error.Failed
Background:
I use gdm3+XFCE on my box (amd64,...



Read the rest of it here: How to fix GDBus.Error:org.freedesktop.PolicyKit1.Error.Failed: An authentication agent already exists for the given subject error in Kali, LMDE or Debian Linux?

How to fix "not starting portmapper is not running ... (warning)" in Debian or Kali Linux?

Read full details here:
How to fix "not starting portmapper is not running ... (warning)" in Debian or Kali Linux?



This is a small guide on How to fix “not starting portmapper is not running … (warning)” in Debian or Kali Linux.
Fixing “not starting portmapper is not running … (warning)”:
In most Kali or Debian installation users see this warning while booting their...



Read the rest of it here: How to fix "not starting portmapper is not running ... (warning)" in Debian or Kali Linux?

How to install and configure printers on Linux (cups and foomatic-db)?

Read full details here:
How to install and configure printers on Linux (cups and foomatic-db)?



This is a small guide on How to install configure printers on Linux (cups and foomatic-db)?.
We will be using cups, cups-client and foomatic-db for this purpose. Foomatic is a database-driven system for integrating free software printer drivers with common spoolers under Unix. It supports CUPS,...



Read the rest of it here: How to install and configure printers on Linux (cups and foomatic-db)?

How to change repositories to a different mirror?

Read full details here:
How to change repositories to a different mirror?



This is a guide on How to change repositories to a different mirror that applies to all Linux distributions. Often you would feel the auto selected mirror via GeoIP is not the fastest one of you’re just paranoid like me who would want to select a mirror from a specific country. This guide...



Read the rest of it here: How to change repositories to a different mirror?

How to hack Remote PC (Windows 2003 server) with Metasploits

Read full details here: How to hack Remote PC with Metasploits (Windows 2003 server)

This is a a detailed step by step guide on How to hack Remote PC with Metasploits (Windows 2003 server). I’ve used BackTrack 5 and Windows 2003 server in a virtual environment. The ease of hacking is scary and readers, sysadmins are advised to update their Windows 2003 server to the latest patch/service pack and use additional antivirus, firewalls to protect them from similar situation. Exactly same commands can be used on Kali Linux, Ubuntu, Debian or any Linux that got Metasploits installed. In fact you can just do the whole thing from a Virtual Machine or USB and leave no trace whatsoever.



The author takes no responsibility on how this tutorial is being used by readers and this is for educational purpose only.

  1. Contents
  2. Introduction
  3. Metasploit quick guide
    • search
    • show exploits
    • show payloads
    • show options
    • info
    • use
    • set RHOST
    • set RPORT
    • set PAYLOAD
    • set LPORT
    • exploit
    • help
  4. Lab Setup
  5. Objective
  6. Detailed Steps
    • Step 1 – Scan with nmap for open ports
    • Step 2 – Open msfconsole
    • Step 3 – Search RPC exploit in Metasploit
    • Step 4 – Gather info about target exploit
    • Step 5 – Activate exploit
    • Step 6 – Configure exploit
    • Step 7 – Set payload for exploit
    • Step 8 – Launch exploit and establish connection
    • Step 9 – Perform an action on pentested server

Introduction

Metasploit is simple to use and is designed with ease-of-use in mind to aid Penetration Testers.
I will be taking you through this demo in BackTrack 5 R3, so go ahead and download that if you don’t already have it:
http://www.backtrack-linux.org/downloads/
The reason for using BackTrack 5 R3 is because it has the correct Ruby Libraries.
Metasploit framework has three work environments,
  1. The msfconsole,
  2. The msfcli interface and
  3. The msfweb interface.
However, the primary and the most preferred work area is the ‘msfconsole’. It is an efficient command-line interface that has its own command set and environment system.
Metasploit quick guide
Before executing your exploit, it is useful to understand what some Metasploit commands do. Below are some of the commands that you will use most. Graphical explanation of their outputs would be given as and when we use them while exploiting some boxes in later part of the article.
  1. search : Typing in the command search along with the keyword lists out the various possible exploits that have that keyword pattern.
  2. show exploits : Typing in the command show exploits‘ lists out the currently available exploits. There are remote exploits for various platforms and applications including Windows, Linux, IIS, Apache, and so on, which help to test the flexibility and understand the working of Metasploit.
  3. show payloads : With the same ‘show‘ command, we can also list the payloads available. We can use a ‘show payloads’ to list the payloads.
  4. show options : Typing in the command ‘show options‘ will show you options that you have set and possibly ones that you might have forgotten to set. Each exploit and payload comes with its own options that you can set.
  5. info : If you want specific information on an exploit or payload, you are able to use the ‘info’ command. Let’s say we want to get complete info of the payload ‘winbind’. We can use ‘info payload winbind‘.
  6. use : This command tells Metasploit to use the exploit with the specified name
  7. set RHOST : This command will instruct Metasploit to target the specified remote host.
  8. set RPORT : This command sets the port that Metasploit will connect to on the remote host.
  9. set PAYLOAD : This command sets the payload that is used to a generic payload that will give you a shell when a service is exploited.
  10. set LPORT : This command sets the port number that the payload will open on the server when an exploit is exploited. It is important that this port number be a port that can be opened on the server (i.e.it is not in use by another service and not reserved for administrative use), so set it to a random 4 digit number greater than 1024, and you should be fine. You’ll have to change the number each time you successfully exploit a service as well.
  11. exploit : Actually exploits the service. Another version of exploit, rexploit reloads your exploit code and then executes the exploit. This allows you to try minor changes to your exploit code without restarting the console
  12. help : The ‘help’ command will give you basic information of all the commands that are not listed out here.
Now that you are ready with all the basic commands you need to launch your exploit. Let’s choose a couple of scenarios to get control of a remotely connected machine.

Lab Setup:

Victim Machine
OS: Microsoft Windows Server 2003
IP: IP: 192.168.42.128
Attacker (Our) Machine
OS: BackTrack 5 R3
Kernel version: Linux bt 2.6.38 #1 SMP Thu Mar 17 20:52:18 EDT 2011 i686 GNU/Linux
Metasploit Version: Built in version of metasploit 3.8.0-dev
IP: 192.168.42.128

Objective

The only information provided to us about the remote server is that it is a Windows 2003 Server and the Objective is to gain shell access of this remote server.

Detailed Steps

Step 1 – Scan with nmap for open ports

Perform an nmap scan of the remote server 192.168.42.129.
The output of the nmap scan shows us a range of ports open which can be seen below in Figure 1.

Read the rest of it here: How to hack Remote PC with Metasploits (Windows 2003 server)

How to fix broken Menu in Kali Linux

Read full details here:
How to fix broken Menu in Kali Linux



How to fix broken Menu in Kali Linux
If you have a broken menu in Kali Linux, for example,

You deleted menu items
You reordered them and now want the old menu back
You accidentally dragged one into another
You renamed them
You removed some applications and can’t remember which one
You...



Read the rest of it here: How to fix broken Menu in Kali Linux

How to install/remove MATE Desktop Environment in Kali Linux

Read full details here:
How to install/remove MATE Desktop Environment in Kali Linux



How to install/remove MATE Desktop Environment in Kali Linux
MATE is a fork of GNOME 2. It provides an intuitive and attractive desktop environment using traditional metaphors for Linux and other Unix-like operating systems.
MATE is under active development to add support for new technologies...



Read the rest of it here: How to install/remove MATE Desktop Environment in Kali Linux

How to add official Kali Linux Repositories?

Read full details here:
How to add official Kali Linux Repositories?



How to add official Kali Linux Repositories?
This is a small guide on How to add official Kali Linux Repositories.
Kali Linux source.list Repositories page: Official Link
We’ve seen many people break their Kali Linux installations by following unofficial advice, or arbitrarily populating their s...



Read the rest of it here: How to add official Kali Linux Repositories?

How to add official Kali Linux Repositories?

Read full details here:
How to add official Kali Linux Repositories?



How to add official Kali Linux Repositories?
This is a small guide on How to add official Kali Linux Repositories.
Kali Linux source.list Repositories page: Official Link
We’ve seen many people break their Kali Linux installations by following unofficial advice, or arbitrarily populating their s...



Read the rest of it here: How to add official Kali Linux Repositories?

How to install/remove MATE Desktop Environment in Kali Linux

Read full details here:
How to install/remove MATE Desktop Environment in Kali Linux



How to install/remove MATE Desktop Environment in Kali Linux
MATE is a fork of GNOME 2. It provides an intuitive and attractive desktop environment using traditional metaphors for Linux and other Unix-like operating systems.
MATE is under active development to add support for new technologies...



Read the rest of it here: How to install/remove MATE Desktop Environment in Kali Linux

How to install/remove Cinnamon Desktop Environment in Kali Linux

Read full details here:
How to install/remove Cinnamon Desktop Environment in Kali Linux



How to install/remove Cinnamon Desktop Environment in Kali Linux
Cinnamon is a GTK+-based desktop environment. It originally started as a fork of the GNOME Shell, which is a user interface, and was initially developed by (and for) Linux Mint.
The Linux Mint development team was initially unsure...



Read the rest of it here: How to install/remove Cinnamon Desktop Environment in Kali Linux

How to install/remove LXDE Desktop Environment in Kali Linux

Read full details here:
How to install/remove LXDE Desktop Environment in Kali Linux



How to install/remove LXDE Desktop Environment in Kali Linux
LXDE is a free and open source desktop environment for Unix and other POSIX compliant platforms, such as Linux or BSD. The goal of the project is to provide a desktop environment that is fast and energy efficient. The name LXDE stands...



Read the rest of it here: How to install/remove LXDE Desktop Environment in Kali Linux

How to install/remove GNOME Desktop Environment on Kali Linux

Read full details here:
How to install/remove GNOME Desktop Environment on Kali Linux



 
How to install/remove GNOME Desktop Environment on Kali Linux
GNOME is a desktop environment and graphical user interface that runs on top of a computer operating system. It is composed entirely of free and open source software and is developed by both volunteers and paid contributors,...



Read the rest of it here: How to install/remove GNOME Desktop Environment on Kali Linux

How to install/remove LXDE Desktop Environment in Kali Linux

Read full details here:
How to install/remove LXDE Desktop Environment in Kali Linux



How to install/remove LXDE Desktop Environment in Kali Linux
LXDE is a free and open source desktop environment for Unix and other POSIX compliant platforms, such as Linux or BSD. The goal of the project is to provide a desktop environment that is fast and energy efficient. The name LXDE stands...



Read the rest of it here: How to install/remove LXDE Desktop Environment in Kali Linux

How to install/remove different KDE Desktop Environments in Kali Linux

Read full details here:
How to install/remove different KDE Desktop Environments in Kali Linux



How to install/remove different KDE Desktop Environments in Kali Linux
K Desktop Environment (KDE) was founded in 1996 by Matthias Ettrich, who was then a student at the Eberhard Karls University of Tübingen. At the time, he was troubled by certain aspects of the Unix desktop. Among his ...



Read the rest of it here: How to install/remove different KDE Desktop Environments in Kali Linux

How to install/remove XFCE Desktop Environment in Kali Linux

Read full details here:
How to install/remove XFCE Desktop Environment in Kali Linux



 
How to install/remove XFCE Desktop Environment in Kali Linux
XFCE is a free software desktop environment for Unix and Unix-like platforms, such as Linux, Solaris, and BSD. It aims to be fast and lightweight, while still being visually appealing and easy to use. It consists of separately...



Read the rest of it here: How to install/remove XFCE Desktop Environment in Kali Linux

How to permanently switch Desktop Environments

Read full details here:
How to permanently switch Desktop Environments



A small guide for How to Permanently Switching Desktop Environments in Linux.
Permanently Switch Desktop Environments

Use the following to make a selected Desktop Environment your primary one (i.e. Make Gnome or KDE etc. your default desktop environment.)
update-alternatives --config...



Read the rest of it here: How to permanently switch Desktop Environments

vi Cheat Sheet - Basic

Read full details here:
vi Cheat Sheet - Basic



This is a Basic vi Cheat Sheet. A small guide to help readers use vi editor more efficiently.
This part contains the simple vi commands.
vi is a screen-oriented text editor originally created for the Unix operating system. The portable subset of the behavior of vi and programs based on it, and...



Read the rest of it here: vi Cheat Sheet - Basic

How to install Firefox in Kali Linux

Read full details here:
How to install Firefox in Kali Linux



This is a small and quick guide on How to install Firefox in Kali Linux.
Mozilla Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version for Android, by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Firefox uses the Gecko...



Read the rest of it here: How to install Firefox in Kali Linux

How to increase TX Power Signal Strength of WiFi

Read full details here:
How to increase TX Power Signal Strength of WiFi



This is a small guide on How to increase TX Power Signal Strength of WiFi
This guide contains 3 different methods to increase your TX Power or Signal Strength of your Wifi Wireless card. It also includes 2 ways to make those changes kick in at boot time so that you can enjoy the extra power...



Read the rest of it here: How to increase TX Power Signal Strength of WiFi

How to Install Flash in Kali Linux

Read full details here:
How to Install Flash in Kali Linux


How to Install Flash in Kali Linux

This is a small guide with instructions that users can copy paste and make Flash work in their Kali Linux. Copy paste supported instruction to make life simpler.
Now lets move on to instructions …
Instructions on How to Install Flash in Kali...



Read the rest of it here: How to Install Flash in Kali Linux

How to Install Java JDK in Kali Linux

Read full details here:
How to Install Java JDK in Kali Linux



How to Install Java JDK in Kali Linux
This is a small guide with instructions that users can copy paste and make Java work in their Kali Linux. Thanks to purehate for providing original instructions. I’ve modified his instruction to suit my needs and I hope this will benefit users as...



Read the rest of it here: How to Install Java JDK in Kali Linux

How to Monitor Laptop CPU Temperature and Hard Disk in Linux - CLI Command Line and Visual

Read full details here:
How to Monitor Laptop CPU Temperature and Hard Disk in Linux - CLI Command Line and Visual


This is a small guide on How to Monitor Laptop CPU Temperature and Hard Disk in Linux – CLI Command Line and Visual. In this guide we will show few methods to get temperatures.
Commonly used tools to Monitor Laptop CPU Temperature and Hard Disk:

cat temperature file. (no additional ...



Read the rest of it here: How to Monitor Laptop CPU Temperature and Hard Disk in Linux - CLI Command Line and Visual

How to check your Laptop Battery Status from CLI Command Line in Linux

Read full details here:
How to check your Laptop Battery Status from CLI Command Line in Linux


How to check your Laptop Battery Status from CLI Command Line in Linux
The tool used to check your Laptop Battery Status from CLI Command Line in Linux is called acpi.

ACPI (Advanced Configuration and Power Interface)  is an open industry specification co-developed by Hewlett-Packard, Intel, M...



Read the rest of it here: How to check your Laptop Battery Status from CLI Command Line in Linux

Install AMD ATI Driver (fglrx) in Kali Linux 1.x

Read full details here:
Install AMD ATI Driver (fglrx) in Kali Linux 1.x



I always had issues with ATI/Intel gfx cards in pretty much every version of Linux I’ve used. Kali is no different. Following guide would help to resolve the problem for everyone with similar issues. Many thanks to ‘Sani Morphic’ for his original post. Also big thanks goes to...



Read the rest of it here: Install AMD ATI Driver (fglrx) in Kali Linux 1.x

How to benchmark Pyrit

Read full details here:
How to benchmark Pyrit


This is a short guide on How to benchmark Pyrit
Assuming you managed to setup CUDA and Pyrit correctly, move on to the code section.
If not, go back and follow this guide: How to Install Nvidia Kernel Module Cuda and Pyrit

 
Benchmarking Pyrit:
# pyrit benchmark
The Pyrit...



Read the rest of it here: How to benchmark Pyrit

How to Install Nvidia Kernel Module Cuda and Pyrit in Kali Linux

Read full details here:
How to Install Nvidia Kernel Module Cuda and Pyrit in Kali Linux


This will guide you through the process on installing Nvidia Cuda and Pyrit in Kali Linux
Download Pyrit and Cpyrit:

Nvidia Cuda Toolkit https://developer.nvidia.com/cuda-toolkit
I used the Version 5.5 Self Extracting Installer for 64-Bit OS.
pyrit http://pyrit.googlecode.com
cpyrit...



Read the rest of it here: How to Install Nvidia Kernel Module Cuda and Pyrit in Kali Linux

How to Install Avro Phonetic Keyboard or ibus-avro in Debian, Kali, LMDE (Mint) Linux

Read full details here:
How to Install Avro Phonetic Keyboard or ibus-avro in Debian, Kali, LMDE (Mint) Linux


ibus-avro

Avro Phonetic Bangla typing for Linux
ibus-avro is the port of popular Avro Phonetic Bangla typing method to Linux. This software works as an Engine (plugin) of IBus and let users type in English and on-the-fly transliterate them phonetically to Bangla.
Notable features of Avro...



Read the rest of it here: How to Install Avro Phonetic Keyboard or ibus-avro in Debian, Kali, LMDE (Mint) Linux

CLI ifconfig - How to setup IP addess from Command Line in Linux

Read full details here:
CLI ifconfig - How to setup IP addess from Command Line in Linux


Did you even had trouble with Network Manager or ifconfig and felt that you need to try to set up static IP address from command line / CLI ifconfig? I accidentally removed Gnome (my bad, wasn’t paying attention and did an apt-get autoremove -y .. how bad is that.. ) So I had a problem, I...



Read the rest of it here: CLI ifconfig - How to setup IP addess from Command Line in Linux

Pause Unpause Linux Boot Screen

Read full details here:
Pause Unpause Linux Boot Screen



How many time you wanted to pause unpause linux boot screen to check out some errors? This screen goes away too fast and you’re then prompted with login screen. Once logged in, you’re too busy doing something else that you completely forgot that error that slided through boot screen...



Read the rest of it here: Pause Unpause Linux Boot Screen

WPSCAN and quick wordpress security

Read full details here:
WPSCAN and quick wordpress security


This is a quick and simple guide utilizing wpscan to scan wordpress and fix some security issues. Very simple and easy to follow.
Readers: Please read WPSCAN and quick wordpress security – Fixing Direcroty Listing – Part 2 of this series that outlines on how to fix Directory...



Read the rest of it here: WPSCAN and quick wordpress security

Cracking Wifi WPA/WPA2 passwords using Reaver-WPS

Read full details here: Cracking Wifi WPA/WPA2 passwords using Reaver-WPS

Overview:

Reaver-wps performs a brute force attack against an access point’s WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP’s wireless settings can be reconfigured. This post outlines the steps and command that helps cracking Wifi WPA/WPA2 passwords using Reaver-WPS.
While Reaver-wps does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.


Readers, note that I’ve since written another post where I could crack a password in 14.21 seconds. using pyrit cowpatty and WiFite combination attack with dictionary.The whole process takes less than 10 minutes.
Those who would like to try more ways of cracking Wifi WPA WPA2 passwords, you can also use HashCat or cudaHashcat or oclHashcat to crack your unknown Wifi WPA WPA2 passwords. The benefit of using Hashcat is, you can create your own rule to match a pattern and do a Brute-force attack. This is an alternative to using dictionary attack where dictionary can contain only certain amount of words but a brute-force attack will allow you to test every possible combinations of given charsets. Hashcat can crack Wifi WPA/WPA2 passwords and you can also use it to crack MD5, phpBB, MySQL and SHA1 passwords. Using Hashcat is an good option as if you can guess 1 or 2 characters in a password, it only takes few minutes. For example: if you know 3 characters in a password, it takes 12 minutes to crack it. If you know 4 characters in a password, it takes 3 minutes. You can make rules to only try letters and numbers to crack a completely unknown password if you know a certain Router’s default password contains only those. Possibilities of cracking is a lot higher in this way.
Important Note: Many users try to capture with network cards that are not supported. You should purchase a card that supports Kali Linux including injection and monitor mode etc. A list can be found in 802.11 Recommended USB Wireless Cards for Kali Linux. It is very important that you have a supported card, otherwise you’ll be just wasting time and effort on something that just won’t do the job.




Read the rest of it here: Cracking Wifi WPA/WPA2 passwords using Reaver-WPS

Fixing PulseAudio configured for per-user sessions ... (warning) in Kali Linux and Debian

Read full details here:
Fixing PulseAudio configured for per-user sessions ... (warning) in Kali Linux and Debian



What is PulseAudio:
PulseAudio is a sound system for POSIX OSes, meaning that it is a proxy for your sound applications. It allows you to do advanced operations on your sound data as it passes between your application and your hardware. Things like transferring the audio to a different machine,...



Read the rest of it here: Fixing PulseAudio configured for per-user sessions ... (warning) in Kali Linux and Debian

Enable Laptop mode to save power and lower CPU temp

Read full details here:
Enable Laptop mode to save power and lower CPU temp



Laptop mode explained:
Laptop mode is used to minimize the time that the hard disk needs to be spun up, to conserve battery power on laptops. It has been reported to cause significant power savings.
Laptop mode is controlled by the knob /proc/sys/vm/laptop_mode. This knob is present for all...



Read the rest of it here: Enable Laptop mode to save power and lower CPU temp

Helpful ATIconfig fglrx commands

Read full details here:
Helpful ATIconfig fglrx commands



ATI Proprietary Linux Driver (ATIconfig fglrx) Features
The ATI Proprietary Linux driver (ATIconfig fglrx) provides TV Output support for ATI graphics cards that support TV out. The ATI Proprietary Linux (ATIconfig fglrx) driver also allows for the following monitor arrangements:

Single Head ...



Read the rest of it here: Helpful ATIconfig fglrx commands

How to install/remove different Desktop Environment or Window Manager in Kali Linux 1.x

Read full details here:
How to install/remove different Desktop Environment or Window Manager in Kali Linux 1.x



This guide explains how to install/remove different Desktop Environment or Window Manager in Kali Linux 1.x such as Gnome, KDE, XFCE, LXDE and MATE Desktops.
An X window manager is a window manager which runs on top of the X Window System, a windowing system mainly used on Unix-like ...



Read the rest of it here: How to install/remove different Desktop Environment or Window Manager in Kali Linux 1.x