Menu

Wednesday, December 23, 2015

Kali Linux Command Tutorial

COMMANDS



a
apropos : Search Help manual pages (man -k)
apt-get : Search for and install software packages (Debian)
aptitude : Search for and install software packages (Debian)
aspell : Spell Checker
awk : Find and Replace text, database sort/validate/index



b
basename :  Strip directory and suffix from filenames
bash : GNU Bourne-Again SHell
bc : Arbitrary precision calculator language
bg :  Send to background
break : Exit from a loop
builtin : Run a shell builtin
bzip2 : Compress or decompress named file(s)



c
cal : Display a calendar
case :  Conditionally perform a command
cat : Concatenate and print (display) the content of files
cd :  Change Directory
cfdisk :  Partition table manipulator for Linux
chgrp :  Change group ownership
chmod : Change access permissions
chown : Change file owner and group
chroot : Run a command with a different root directory
chkconfig : System services (runlevel)
cksum : Print CRC checksum and byte counts
clear : Clear terminal screen
cmp :  Compare two files
comm :  Compare two sorted files line by line
command :  Run a command - ignoring shell functions
continue : Resume the next iteration of a loop
cp :  Copy one or more files to another location
cron :  Daemon to execute scheduled commands
crontab : Schedule a command to run at a later time
csplit : Split a file into context-determined pieces
cut : Divide a file into several parts



d
date : Display or change the date & time
dc : Desk Calculator
dd : Convert and copy a file, write disk headers, boot records
ddrescue : Data recovery tool
declare : Declare variables and give them attributes
df : Display free disk space
diff :  Display the differences between two files
diff3 : Show differences among three files
dig : DNS lookup
dir : Briefly list directory contents
dircolors : Colour setup for `ls'
dirname : Convert a full pathname to just a path
dirs : Display list of remembered directories
dmesg :  Print kernel & driver messages
du : Estimate file space usage



e
echo : Display message on screen
egrep : Search file(s) for lines that match an extended expression
eject : Eject removable media
enable : Enable and disable builtin shell commands
env : Environment variables
ethtool : Ethernet card settings
eval : Evaluate several commands/arguments
exec : Execute a command
exit : Exit the shell
expect : Automate arbitrary applications accessed over a terminal
expand : Convert tabs to spaces

export : Set an environment variable
expr : Evaluate expressions



f
false : Do nothing, unsuccessfully
fdformat : Low-level format a floppy disk
fdisk : Partition table manipulator for Linux
fg : Send job to foreground
fgrep : Search file(s) for lines that match a fixed string
file : Determine file type
find : Search for files that meet a desired criteria
fmt : Reformat paragraph text
fold : Wrap text to fit a specified width.
for : Expand words, and execute commands
format : Format disks or tapes
free : Display memory usage
fsck : File system consistency check and repair
ftp : File Transfer Protocol
function : Define Function Macros
fuser : Identify/kill the process that is accessing a file



g
gawk : Find and Replace text within file(s)
getopts :  Parse positional parameters
grep : Search file(s) for lines that match a given pattern
groupadd :  Add a user security group
groupdel  : Delete a group
groupmod : Modify a group
groups : Print group names a user is in
gzip : Compress or decompress named file(s)



h
hash : Remember the full pathname of a name argument
head : Output the first part of file(s)
help : Display help for a built-in command
history : Command History
hostname : Print or set system name



i
iconv : Convert the character set of a file
id : Print user and group id's
if : Conditionally perform a command
ifconfig :  Configure a network interface
ifdown : Stop a network interface
ifup Start a network interface up
import : Capture an X server screen and save the image to file

install : Copy files and set attributes



j
jobs : List active jobs
join :  Join lines on a common field



k
kill : Stop a process from running
killall :  Kill processes by name



l
less : Display output one screen at a time
let : Perform arithmetic on shell variables
ln : Create a symbolic link to a file
local : Create variables
locate :  Find files
logname : Print current login name
logout :  Exit a login shell
look : Display lines beginning with a given string
lpc : Line printer control program
lpr :  Off line print
lprint : Print a file
lprintd :  Abort a print job
lprintq : List the print queue
lprm : Remove jobs from the print queue
ls : List information about file(s)
lsof : List open files


m
make : Recompile a group of programs
man : Help manual
mkdir :  Create new folder(s)
mkfifo : Make FIFOs (named pipes)
mkisofs : Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod : Make block or character special files
more : Display output one screen at a time
mount : Mount a file system
mtools : Manipulate MS-DOS files
mtr : Network diagnostics (traceroute/ping)
mv : Move or rename files or directories
mmv : Mass Move and rename (files)



n
netstat :  Networking information
nice : Set the priority of a command or job
nl : Number lines and write files
nohup : Run a command immune to hangups
notify-send : Send desktop notifications

nslookup : Query Internet name servers interactively



o
open : Open a file in its default application
op : Operator access



p
passwd : Modify a user password
paste : Merge lines of files
pathchk : Check file name portability
ping : Test a network connection
pkill : Stop processes from running
popd : Restore the previous value of the current directory
pr : Prepare files for printing
printcap : Printer capability database
printenv : Print environment variables
printf : Format and print data
ps : Process status
pushd : Save and then change the current directory
pwd : Print Working Directory



q
quota : Display disk usage and limits
quotacheck : Scan a file system for disk usage
quotactl : Set disk quotas



r
ram : ram disk device
rcp : Copy files between two machines
read : Read a line from standard input
readarray : Read from stdin into an array variable
readonly : Mark variables/functions as readonly
reboot : Reboot the system
rename :  Rename files
renice : Alter priority of running processes
remsync : Synchronize remote files via email
return : Exit a shell function
rev : Reverse lines of a file
rm : Remove files
rmdir : Remove folder(s)
rsync : Remote file copy (Synchronize file trees)



s
screen : Multiplex terminal, run remote shells via ssh
scp :  Secure copy (remote file copy)
sdiff : Merge two files interactively
sed :  Stream Editor
select : Accept keyboard input
seq : Print numeric sequences
set : Manipulate shell variables and functions
sftp : Secure File Transfer Program
shift : Shift positional parameters
shopt : Shell Options
shutdown : Shutdown or restart linux
sleep : Delay for a specified time
slocate : Find files
sort : Sort text files
source : Run commands from a file `.'
split : Split a file into fixed-size pieces
ssh : Secure Shell client (remote login program)
strace : Trace system calls and signals
su : Substitute user identity
sudo : Execute a command as another user
sum : Print a checksum for a file
suspend : Suspend execution of this shell
symlink : Make a new name for a file
sync : Synchronize data on disk with memory



t
tail : Output the last part of file
tar : Tape ARchiver
tee : Redirect output to multiple files
test : Evaluate a conditional expression
time : Measure Program running time
times : User and system times
touch : Change file timestamps
top : List processes running on the system
traceroute : Trace Route to Host
trap : Run a command when a signal is set(bourne)
tr : Translate, squeeze, and/or delete characters

true : Do nothing, successfully
tsort : Topological sort
tty : Print filename of terminal on stdin
type : Describe a command



u
ulimit : Limit user resources

umask : Users file creation mask
umount : Unmount a device
unalias : Remove an alias
uname : Print system information
unexpand : Convert spaces to tabs
uniq : Uniquify files
units : Convert units from one scale to another
unset : Remove variable or function names
unshar : Unpack shell archive scripts
until : Execute commands (until error)
uptime : Show uptime
useradd : Create new user account
userdel : Delete a user account
usermod : Modify user account
users : List users currently logged in
uuencode : Encode a binary file
uudecode : Decode a file created by uuencode



v
v : Verbosely list directory contents (`ls -l -b')
vdir : Verbosely list directory contents (`ls -l -b')
vi : Text Editor
vmstat : Report virtual memory statistics



w
wait : Wait for a process to complete
watch: Execute/display a program periodically
wc : Print byte, word, and line counts
whereis : Search the user's $path, man pages and source files for a program
which : Search the user's $path for a program file

while : Execute commands
who : Print all usernames currently logged in
whoami : Print the current user id and name (`id -un')
wget : Retrieve web pages or files via HTTP, HTTPS or FTP

write : Send a message to another user



x
xargs : Execute utility, passing constructed argument list(s)
xdg-open : Open a file or URL in the user's preferred application.
yes : Print a string until interrupted

Wednesday, December 16, 2015

SQL Injection Attack Basic Concepts..




•SQL injection is a software vulnerability that occurs when data entered by users is sent to the SQL interpreter as a part of a SQL query.


... You can search Sql injunction vulnerable websites using google dorks List


•Attackers provide specially crafted input data to the SQL interpreter and trick the interpreter to execute unintended commands.
•Attackers utilize this vulnerability by providing specially crafted input data to the SQL interpreter in such a manner that the interpreter is not able to distinguish between the intended commands and the attacker’s specially crafted data. The interpreter is tricked into executing unintended commands.


..But there have some ways to Prevent SQL injuction Attack..


•A SQL injection attack exploits security vulnerabilities at the database layer. By exploiting the SQL injection flaw, attackers can create, read, modify or delete sensitive data.
SQL Injections: The Most Prevalent Type of Application Security Vulnerability
With more than 20 percent of all web vulnerabilities being attributed to SQL injection, this is the second most common software vulnerability. Therefore, having the ability to find and prevent SQL injection should be top of mind for web developers and security personnel. In general, a SQL injection attack exploits a web application that does not properly validate or encode user-supplied input and then uses that input as part of a query or command against a back-end database. For example, a typical form may ask for an ID and create a URL: "http://www.somewebsite.com/id/id.asp?id=somedata". An attacker using SQL injection may enter "somedata or 1=1". If the web application does not properly validate or encode the user-supplied data and sends it directly to the database, the reply to the query will expose all IDs in the database, since the condition "1=1" is always true. This is a basic example, but it illustrates the importance of sanitizing user-supplied data before using it in a query or command.





Saturday, December 12, 2015

Using Whatsapp without number or Sim

Step 1.
 If you already using whatsapp in your phone just save all the files and photos, then delete the whatsapp account.
Step 2.
 Now download the whatsapp and install it.
Step 3.
 As we all know whatsapp need a verification of your mobile number, our main aim is to use whatsapp without phone number. So lock your messages in your phone by changing the phone to Fight mode.


Step 4.
 Now Open your install whatsapp and enter your phone number.


Step 5.
  So it will not send messages to the sever and not verify your number.
Step 6.
 Now verification is not completed. Whatsapp ask you  verify in alternative way, then choose verify through sms or Check through sms and enter your email address.
Step 7.
 Click on "Submit" and with out waiting a minute click on cancel. There ends your Authorization process.
Step 8.
  Now you required to spoof that message. (Install a Spoof text message for android and Fake-a-message for iPhone.)
Step 9.
 Now go to Outbox and copy the message  details and send it to the false verification.
Step 10.
 Use this false details in the false verification
To:+447900347295 From: + (country code ) ( mobile number ) Message: Your e-mail address
  
Step 11.
 A message will be send to that fake number and now you are ready to use the whatsapp.
Enjooy....

Friday, December 11, 2015

Google Dork List (New)

Here I would like to share some google dork list..
It will help you to find out the Vulnerability of websites for SQL INJUCTION..




inurl:index.php?id=
inurl:gallery.php?catid=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
l:news.php?id=
inurl:avd_start.php?av
inurl:communique_detail.php?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:show_an.php?id=
inurl:loadpsb.php?id=
inurl:spr.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurl:roductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:category.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurlrod_info.php?id=
inurl:shop.php?do=part&id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurlost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=


c4cyber.blogspot.com


inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:shop_category.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:event.php?id=
inurl:sql.php?id=
inurl:show_an.php?id=
inurl:spr.php?id=
inurl:main.php?id=
inurl:read.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:fellows.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:shop_category.php?id=
inurl:news-full.php?id=
l:news_display.php?getid=
inurl:event.php?id=
inurl:sql.php?id=
inurl:review.php?id=
inurl:ages.php?id=
inurl:read.php?id=
inurl:iniziativa.php?in=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:material.php?id=
inurl:galery_info.php?ld=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:art.php?idm=
inurl:title.php?id=
inurl:index.php?id=
inurl:trainers.php?id=
inurl:login.asp
index of:/admin/login.asp
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:pageid=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:sem.php3?id=
inurl:news.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:spr.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewphoto.php?id=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:newscat.php?id=
inurl:rubrika.php?idr=
inurl:art.php?idm=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:productdetail.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:newsone.php?id=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:lay_old.php?id=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:gallery.php?id=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:dublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:rod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:pinions.php?id=
inurl:spr.php?id=
inurlages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurlarticipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurlrod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurlerson.php?id=
inurlroductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:band_info.php?id=
inurl:roduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:roduit.php?id=
inurl:op.php?id=
inurl:shopping.php?id=
inurl:roductdetail.php?id=
inurl:lost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:age.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:roduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:read.php?id=
"inurl:admin.asp"
 "inurl:login/admin.asp"
 "inurl:admin/login.asp"
 "inurl:adminlogin.asp"
 "inurl:adminhome.asp"
 "inurl:admin_login.asp"
 "inurl:administratorlogin.asp"
 "inurl:login/administrator.asp"
 "inurl:administrator_login.asp"
 inurl:"id=" & intext:"Warning: mysql_fetch_assoc()
 inurl:"id=" & intext:"Warning: mysql_fetch_array()
 inurl:"id=" & intext:"Warning: mysql_num_rows()
 inurl:"id=" & intext:"Warning: session_start()
 inurl:"id=" & intext:"Warning: getimagesize()
 inurl:"id=" & intext:"Warning: is_writable()
 inurl:"id=" & intext:"Warning: getimagesize()
 inurl:"id=" & intext:"Warning: Unknown()
 inurl:"id=" & intext:"Warning: session_start()
 inurl:"id=" & intext:"Warning: mysql_result()
 inurl:"id=" & intext:"Warning: pg_exec()
 inurl:"id=" & intext:"Warning: mysql_result()
 inurl:"id=" & intext:"Warning: mysql_num_rows()
 inurl:"id=" & intext:"Warning: mysql_query()
 inurl:"id=" & intext:"Warning: array_merge()
 inurl:"id=" & intext:"Warning: preg_match()
 inurl:"id=" & intext:"Warning: ilesize()
 inurl:"id=" & intext:"Warning: filesize()
 inurl:"id=" & intext:"Warning: require

A simple tuto of Keyloggers



keylogging hacking concepts - most easy way to hack any pc ..
basically keylogger are the special hacking software .when you install them in any computer then they are totally undetecteble at all . means if in your pc somebody installed the keylogger then you never find out any how ..
after the keylogger successfully installed in any pc .there is two part .one operator and second is victim .once keylogger installed in victim pc the operator can access all activity of the victims computer anywhere ..some famous keylogger are .




Spyagent-

this is award wining keylogger you can track all typing activity of any victim.you track all run programme and also find all saved file in victim pc . at spyagent website all introduction is given ..how to use it in simple way

Refog keylogger

this advanced keylogger is so famous in these day .by using this you also can get anytime screenshot of any victim pc and one time you can handel lots of victims pc.and it is totally undetecteble from antivirus ..for more please go for website




Winspy keylogger

the world famous keylogger is the most famous the all hacker and cyber expert team ..there are lot's of intresting features are existing in it and at official site .all introduction is availeble for using it..