All right my little noob’s so due to my google dorks post i mite as well show u how to use them in an attack so since my man nife did sqlmap u can check it out here –> Sql-map basics I am going two show you how two use JSQL on kali so frist …
Author Archives: Laughing man
Google dorks
this a list few google dorks view_items.php?id= home.php?cat= item_book.php?CAT= www/index.php?page= schule/termine.php?view= goods_detail.php?data= storemanager/contents/item.php?page_code= view_items.php?id= customer/board.htm?mode= help/com_view.html?code= n_replyboard.php?typeboard= eng_board/view.php?T****= prev_results.php?prodID= bbs/view.php?no= gnu/?doc= zb/view.php?uid= global/product/product.php?gubun= m_view.php?ps_db= productlist.php?tid= product-list.php?id= onlinesales/product.php?product_id= garden_equipment/Fruit-Cage/product.php?pr= product.php?shopprodid= product_info.php?products_id= productlist.php?tid= showsub.php?id= productlist.php?fid= products.php?cat= products.php?cat= product-list.php?id= product.php?sku= store/product.php?productid= products.php?cat= productList.php?cat= product_detail.php?product_id= product.php?pid= view_items.php?id= more_details.php?id= county-facts/diary/vcsgen.php?id= idlechat/message.php?id= podcast/item.php?pid= products.php?act= details.php?prodId= socsci/events/full_details.php?id= ourblog.php?categoryid= mall/more.php?ProdID= archive/get.php?message_id= review/review_form.php?item_id= english/publicproducts.php?groupid= …
How to stay anonymous online
so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even when using proxy chains and tunneling true tor you are not fully anonymous as u dns is still showing this defeats the reason …
Man in the Middle simple attack
so today we are going to learn man in the middle attack. What is a man in the middle attack?? well a man in the middle attack is when a hacker connect’s to a WiFi network mostly public WiFi from here he can alter the connection between the router and the client with this we …
hacking wps with bully
Welcome to another one by the laughing man whoop whoop so we are going to hack a WiFi with bully now wps have 8 numbers in it this makes it easier to brute and take lot less time well depending on your system mine is a 4g dual core with 8gb swap i rock it …
Basic Netcat part one
Net cat started of as a network analysis tool in 1995 till it was left on supported then nmap man toke over and revamped it to the Swiss army knife of having due to the many jobs this one tool can perform EX port scanning banner grabbing port forwarding to a simple web site server …
How to set Burp suite proxy
Burp suite is one the best tools for web app testing it has many options e.g SQL injection, Brute force fuzzing etc.. Burp suite is installed on Kali Linux so u don’t have to in stall to run in open terminal and type burp suite or go to applications in the left hand top corner …
Installing Kali Linux In Virtual Box
Today we are going to be installing Kali Linux in virtual box. First, open virtual box and hit the new button. Then, this menu will pop up, for type hit Linux and for version hit Debian. You can name it whatever you want but for the sake of this I will just name it Kali. …
BASICS OF BASH SCRIPTING
Bash aka (shell) is used mostly in the Unix and Linux systems this the commands we use Example ls list files in a directory or are mostly use cd changes the shells current working directory. Bash is great to write scripts with as it easy to learn and faster to script so open your fav …
KALI LINUX CTF BLUEPRINTS
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. DMCA take down cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links …