Sunday, 21 August 2011
Basic Web Server Version Fingerprinting Using Telnet Client
Hi this time I am presenting you a simple quick tip that can be used to fingerprint the web servers. This can be quite handy for basic fingerprinting to determine web server version.
At first, open your command prompt/terminal and then type:
If everything is working fine, type either of the below in the terminal(as per the protocol version) and then press ENTER twice to get result from the server:
or
It will output some HTML content with the basic web server information at the end. Sample output would like below:
Note that this method works only if the web server provides the HEAD method as one of its methods(Other methods you might have commonly heard are GET, and POST).
Read more...
At first, open your command prompt/terminal and then type:
telnet
If everything is working fine, type either of the below in the terminal(as per the protocol version) and then press ENTER twice to get result from the server:
HEAD/ HTTP/1.1
or
HEAD/ HTTP/1.0
It will output some HTML content with the basic web server information at the end. Sample output would like below:
Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 Server at ds01.nepallink.net Port 80
Note that this method works only if the web server provides the HEAD method as one of its methods(Other methods you might have commonly heard are GET, and POST).
Read more...
Basic Web Server Version Fingerprinting Using Telnet Client
2011-08-21T14:51:00+05:45
Cool Samar
fingerprinting|
Comments
Labels:
fingerprinting
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Friday, 19 August 2011
Open Source Anti-theft Solution For MAC, PCs and Phones
Prey is an open source application that helps us track the lost laptops or phones. Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use.
In order to understand more about the project, visit the Official website.
Also try this video tutorial for configuring the Prey application.
I hope it becomes useful for you. :)
Read more...
In order to understand more about the project, visit the Official website.
Also try this video tutorial for configuring the Prey application.
I hope it becomes useful for you. :)
Read more...
Open Source Anti-theft Solution For MAC, PCs and Phones
2011-08-19T13:33:00+05:45
Cool Samar
anti-theft|security|software|
Comments
Labels:
anti-theft,
security,
software
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Wally: Advanced Utility To Change Wallpaper
Wally is a Qt4 wallpaper changer using multiple sources like files, folders, FTP remote folders, Flickr, Yahoo!, Panoramio, Pikeo, Ipernity, Photobucket, Buzznet, Picasa and Smugmug images. It is available in many languages. Supported Linux window managers are GNOME, KDE 3, KDE 4, Xfce 4, BlackBox, FluxBox, Window Maker, and FVWM.
Features
· Runs on Win32, Linux and MacOSX platforms
· History support
· Many wallpaper layouts available on all platforms
· EXIF data available over picture and in system tray tooltip
· Save downloaded photos
· Proxy support
Wally Download Page
It is available in ubuntu repository so you can install easily from ubuntu software center.
Read more...
Features
· Runs on Win32, Linux and MacOSX platforms
· History support
· Many wallpaper layouts available on all platforms
· EXIF data available over picture and in system tray tooltip
· Save downloaded photos
· Proxy support
Wally Download Page
It is available in ubuntu repository so you can install easily from ubuntu software center.
Read more...
Wally: Advanced Utility To Change Wallpaper
2011-08-19T13:17:00+05:45
Cool Samar
graphics|linux|software|ubuntu|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Anonymous and Encrypted Torrent Download With Anomos
Anomos is a free and open source standalone anonymous and encrypted torrent client so if you are too concerned about anonymity, why not try this torrent client. Anomos is available for all major platforms including windows, linux and OSX.
Anomos Quote:
Anomos is a pseudonymous, encrypted multi-peer-to-peer file distribution protocol. It is based on the peer/tracker concept of BitTorrent in combination with an onion routing anonymization layer, with the added benefit of end-to-end encryption. By combining these technologies, we have created a platform where by no party outside of the trusted tracker will have any information about who a peer is or what they are downloading.
smwhite
Anomos is designed to be easy to use – you won’t even be aware of the security that it provides. Anybody who is already familiar with BitTorrent won’t have to do anything differently, other than use ‘atorrent’ files rather than ‘torrent’ files.
For more technical details, please see this blog post.
For downloads and more information, visit the Anomos Official Site.
Read more...
Anomos Quote:
Anomos is a pseudonymous, encrypted multi-peer-to-peer file distribution protocol. It is based on the peer/tracker concept of BitTorrent in combination with an onion routing anonymization layer, with the added benefit of end-to-end encryption. By combining these technologies, we have created a platform where by no party outside of the trusted tracker will have any information about who a peer is or what they are downloading.
smwhite
Anomos is designed to be easy to use – you won’t even be aware of the security that it provides. Anybody who is already familiar with BitTorrent won’t have to do anything differently, other than use ‘atorrent’ files rather than ‘torrent’ files.
For more technical details, please see this blog post.
For downloads and more information, visit the Anomos Official Site.
Read more...
Anonymous and Encrypted Torrent Download With Anomos
2011-08-19T12:45:00+05:45
Cool Samar
anonymity|security|torrent|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
BleachBit : Disk Cleanup Utility For Windows and Linux
Bleachbit is a free and open-source utility that can be used to clean Junk space to free disk space and maintain privacy.
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean 90 applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source.
Downloads and more information available at Bleachbit SourceForge Page.
Read more...
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean 90 applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source.
Downloads and more information available at Bleachbit SourceForge Page.
Read more...
BleachBit : Disk Cleanup Utility For Windows and Linux
2011-08-19T12:24:00+05:45
Cool Samar
linux|security|software|windows|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
How To Crack Windows 7
This guide is not written by me as I never use windows 7 but one hacker friend of mine found this and sent it to me so I thought why not post for everyone out there to try this stuff to have no need of activating their windows 7.
If anyone knows who was the original author of this little guide, please post in the comment so that I can edit this post to give proper credit to the author.
First you will have to download Windows 7 loader from the link below:
http://www.datafilehost.com/download-ba73398b.html
Click install.
After that;
Remove update KB971033
1. Click start and search 'windows update'
2. Hit Installed Updates. If that link isn't there, hit "view update history" and hit the "installed updates" link at the top.
3. Find update KB971033.
4. Right click it and hit 'uninstall'
5. Restart your compy ;p
6. Go into Windows update again
7. Find the update KB971033
8. Right-click and hit 'hide update from installing'
If that didn't work, open a cmd and type:
Then you never have to activate again:D
Read more...
If anyone knows who was the original author of this little guide, please post in the comment so that I can edit this post to give proper credit to the author.
First you will have to download Windows 7 loader from the link below:
http://www.datafilehost.com/download-ba73398b.html
Click install.
After that;
Remove update KB971033
1. Click start and search 'windows update'
2. Hit Installed Updates. If that link isn't there, hit "view update history" and hit the "installed updates" link at the top.
3. Find update KB971033.
4. Right click it and hit 'uninstall'
5. Restart your compy ;p
6. Go into Windows update again
7. Find the update KB971033
8. Right-click and hit 'hide update from installing'
If that didn't work, open a cmd and type:
slmgr.vbs -rearm
Then you never have to activate again:D
Read more...
How To Crack Windows 7
2011-08-19T10:36:00+05:45
Cool Samar
cracking|windows|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
IPV6 Attacking Toolkit - THC-ipV6 Toolkit Released
The famous hackers group The Hacker Choice(THC) has released a set of tools to attack the IPv6 protocol. IPv6 is the descendant of IPv4 protocol which was purposed due to exhaustion of the IPv4 pool.
THC writes:
THC is proud to be the first who are releasing an comprehensive attack toolkit for the IPv6 protocol suite. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. Included is a fast and easy to use packet crafting library to create your own attack tools.
For more information on the project, visit the THC IPv6 Project Page.
Download Here
Read more...
THC writes:
THC is proud to be the first who are releasing an comprehensive attack toolkit for the IPv6 protocol suite. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. Included is a fast and easy to use packet crafting library to create your own attack tools.
For more information on the project, visit the THC IPv6 Project Page.
Download Here
Read more...
IPV6 Attacking Toolkit - THC-ipV6 Toolkit Released
2011-08-19T09:59:00+05:45
Cool Samar
hacking|internet protocol|security|software|
Comments
Labels:
hacking,
internet protocol,
security,
software
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Backtrack 5 R1 Released
The most widely used linux-based penetration testing distro, BackTrack had a new release yesterday. Backtrack 5 R1 was released on August 18 which adds 30 new tools in the famous hacker's distro.
Offsec team says:
We are really happy with this release, and believe that as with every release, this is our best one yet. Some pesky issues such as rfkill in VMWare with rtl8187 issues have been fixed, which provides for a much more solid experience with BackTrack.
We’ve released Gnome and KDE ISO images for 32 and 64 bit (no arm this release, sorry!), as well as a VMWare image of a 32 bit Gnome install, with VMWare Tools pre-installed.
For downloads, visit Backtrack Download Page.
Read more...
Offsec team says:
We are really happy with this release, and believe that as with every release, this is our best one yet. Some pesky issues such as rfkill in VMWare with rtl8187 issues have been fixed, which provides for a much more solid experience with BackTrack.
We’ve released Gnome and KDE ISO images for 32 and 64 bit (no arm this release, sorry!), as well as a VMWare image of a 32 bit Gnome install, with VMWare Tools pre-installed.
For downloads, visit Backtrack Download Page.
Read more...
Backtrack 5 R1 Released
2011-08-19T09:25:00+05:45
Cool Samar
backtrack|hacking|linux|security|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Subscribe to:
Posts (Atom)