Tuesday, December 31, 2013

Deep Purple - Soldier of Fortune

Read full details here:
Deep Purple - Soldier of Fortune

This is the era of Computing and we are the “Soldier of Fortune”.
Thanks all my fans, visitors, readers and supporters.
Here’s my favorite song dedicated to everyone. Hope 2013 was fantastic and wishing everyone a happy and prosperous 2014.

Happy New YEAR!!!

Artist: Deep Purple
Album: Stormbringer, 1974
Title: Soldier of Fortune
Songwriters: Ritchie Blackmore, David Coverdale



Read the rest of it here: Deep Purple - Soldier of Fortune

Saturday, December 28, 2013

Enable USB Boot in Gigabyte Motherboard

Read full details here:
Enable USB Boot in Gigabyte Motherboard


I've got this Gigabyte Motherboard GA-P35-DS3L (rev. 2.0) in my old desktop running Q6600 Quad Code CPU and 4GB RAM. I've used this computer for last 5 years and to be honest, it's still superb compared to some newer machines I've used recently. I installed Windows 7 and Kali Linux on it and after almost 2 years I decided it's time to reformat and re-install everything from scratch. Easier said than done. I put a USB disk with Windows 7 on it and rebooted. My Gigabyte motherboard doesn't detect it Live USB! I can honestly say, it did last time I tried. Naturally, I thought, I must've messed up my Live Windows 7 USB stick. So, I tried Linux (Kali Linux, Ubuntu, Arch .. you name it), still Gigabyte motherboard doesn't detect any of the Live USB's. I so started looking to motherboard to figure out how to enable USB boot in Gigabyte Motherboard.


Read the rest of it here: Enable USB Boot in Gigabyte Motherboard

Thursday, December 19, 2013

Auto login root user at system start in Kali Linux - GNOME and KDE

Read full details here:
Auto login root user at system start in Kali Linux - GNOME and KDE


Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni and Devon Kearns of Offensive Security developed it by rewriting BackTrack, their previous forensics Linux distribution.
By default root is the only user account in Kali Linux. It doesn’t present any option to create another user during installation. It however presents an option to set root password during installation. You need root privileges to run pretty much everything in Kali Linux. You can create another non root standard user (See previous post: Add remove user (standard user/non-root) in Kali Linux) for day to day use given that Kali is your Primary Linux distribution but it might get tedious to type in the root password every time you login. This guide will show you how to make a simple few line changes to allow your auto login root  user at system start or boot time in both KDE and GNOME Desktop.








Read the rest of it here: Auto login root user at system start in Kali Linux - GNOME and KDE

Wednesday, December 18, 2013

Fix "WARNING: The following packages cannot be authenticated!" in Kali Linux

Read full details here:
Fix "WARNING: The following packages cannot be authenticated!" in Kali Linux

I just reinstalled Kali 1.0.5 and successfully did apt-get update and apt-get upgrade. But when I am trying to do an apt-get dist-upgrade I get this error
“WARNING: The following packages cannot be authenticated!”
Obviously I don’t want to install un-authenticated package. So I cancelled. Did some Googling and different people in different versions of Linux seems to have similar problem, however there wasn’t any clean solution specific for Kali Linux. I finally managed to figure it out and decided to write a small guide on it. So, next time someone else having the same issue, all they need to do is follow my guide and it will be fixed.

Fix WARNING The following packages cannot be authenticated! in Kali Linux - 1 - blackMORE Ops


Read the rest of it here: Fix "WARNING: The following packages cannot be authenticated!" in Kali Linux

Monday, December 16, 2013

Installing Tor In Kali Linux

Read full details here:
Installing Tor In Kali Linux

How to install Tor - logo - blackMORE Ops

What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. This guide guides your through installing tor in Kali Linux.

Why anonymity matters?

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.



Read the rest of it here: Installing Tor In Kali Linux

Thursday, December 12, 2013

How to change hostname in Kali Linux?

Read full details here:
How to change hostname in Kali Linux?


Kali Linux is becoming popular and more and more users are using it to try out different things. When installing kali, you get to choose a hostname, but in case you accepted the default hostname (kali) and later want to change it, here’s a How to guide to change hostname in Kali Linux.
Now...



Read the rest of it here: How to change hostname in Kali Linux?

How to change hostname in Kali Linux?

Read full details here:
How to change hostname in Kali Linux?


Kali Linux is becoming popular and more and more users are using it to try out different things. When installing kali, you get to choose a hostname, but in case you accepted the default hostname (kali) and later want to change it, here’s a How to guide to change hostname in Kali Linux.
Now...



Read the rest of it here: How to change hostname in Kali Linux?

Monday, December 9, 2013

Triple Boot Arch Linux XFCE with Linux Mint and Windows 7

Read full details here:
Triple Boot Arch Linux XFCE with Linux Mint and Windows 7


Triple Boot Arch Linux XFCE with Linux Mint and Windows 7
Arch Linux is an independently developed, i686/x86-64 general purpose GNU/Linux distribution versatile enough to suit any role. Development focuses on simplicity, minimalism, and code elegance. Arch is installed as a minimal base system,...



Read the rest of it here: Triple Boot Arch Linux XFCE with Linux Mint and Windows 7

Wednesday, December 4, 2013

Useful Google hacks

Read full details here: Useful Google hacks

I’ve been searching Internet and found lots of interesting info about how to use Google for hacks and different intuitive ways to use search strings to get useful information. Googledorks already uses these to compile their lists. However I was unable to find some information and explanations in there. So I’ve decided to compile a nice guide for Useful Google Hacks and Tricks for readers and myself. I’ve included as much credits I can at the bottom of this post including authors websites, however, if I’ve missed any, feel free to comment and I’ll ensure they are included. Also note that, these information’s are publicly available in many websites, so it was quite hard for me to credit original authors/finders.

Useful Google Hacks

Google is #1 ranked search engine in modern Internet. They are a giant who got access to your website, your mobile, your eCommerce site, your IRC site and god knows what else. That means they get a massive amount of information’s and data. Out of those there’s always the chance of leaked sensitive data such as server config, password file, backup file, proprietary materials such as eBooks, Music, PDF, Word Documents, Serial Number etc. In this post I will try to show how to use Google hacks to gather information and looks for exploitable information. If you find something important, please try to contact the owner and report the search string to Google rather than abusing it. I am not responsible how readers might or mights not use the information provided below.




Hacking Security Cameras

Now this is a known one, We’ve all tried it at some point. I am not even sure if this is allowed or not, but I definitely think IP cameras should be more secured so that people can’t look into your Baby Monitor or simple Home Security Cameras. Different vendors provided product specific patches in different times, be sure to spread the word so that you’re not the victim of unsolicited prying.
There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.
You now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.
intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or eBooks. Well here is a way to do that. To download free music just enter the following query on Google search box and hit enter.
“?intitle:index.of?mp3 eminem“
Now you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of Eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “Eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.
Read the rest of it here: Useful Google hacks

Sunday, December 1, 2013

How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome

Read full details here:
How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome


Continued from How to Install Google Chrome in Kali Linux? – Part 2 – Installation
Running Google Chrome in Kali Linux
You have follow choices to run Google Chrome in Kali Linux:

Run Google Chrome as a Standard user in Kali Linux

Create a Standard non-root user and run Google...



Read the rest of it here: How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome

How to Install Google Chrome in Kali Linux? - Part 2 - Installation

Read full details here:
How to Install Google Chrome in Kali Linux? - Part 2 - Installation


Install Google Chrome in Kali Linux:
 
From our previous post (How to Install Google Chrome in Kali Linux? – Part 1 – Discussion)we know that we can install Google Chrome in two different ways:

Download and Install .deb package from Google.
Install Google Chrome by adding Google Rep...



Read the rest of it here: How to Install Google Chrome in Kali Linux? - Part 2 - Installation

How to Install Google Chrome in Kali Linux? - Part 1 - Discussion

Read full details here:
How to Install Google Chrome in Kali Linux? - Part 1 - Discussion



Google Chrome is a web browser developed by Google. It used the WebKit layout engine until version 27 and, with the exception of its iOS releases, from version 28 and beyond uses the WebKit fork Blink. It was first released as a beta version for Microsoft Windows on September 2, 2008, and as a...



Read the rest of it here: How to Install Google Chrome in Kali Linux? - Part 1 - Discussion