Skip to main content

Posts

Showing posts from April 9, 2017

Best Vulnerability Scanners Tools

Best Vulnerability Scanners Tools    The scanners which assess the vulnerability of a network or a computer to security attacks are known as Vulnerability Scanners. The tools might function differently, however all of them aim to provide an analysis on how vulnerable the system or a network is. Here is a list of the best ones:   Nessus Nessus is the world’s most popular vulnerable scanner topping the list in the years 2000, 2003 and in the year 2006 survey on security tools. It’s a free to use vulnerability scanner for personal use in the non enterprise environment. OpenVAS This scanner is tipped by many to be the most advanced vulnerability scanner in the world and is a powerful and comprehensive tool for scanning as well as providing solutions for vulnerability management. It is free software and is maintained daily. Nipper It is a parser for network infrastructure and its full form is Network Infrastructure Parser. This open sour...

shadow Brokers leaked files

Exploits EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other...

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks A New Attack method called “XSSJacking” a type of Web application Clickjacking, Pastejacking and Self-XSS  Web application based Attack Discovered by the Security Researcher Dylan Ayrey. While Clickjacking vulnerability existing in particular page, this attack will trigger Self-XSS. “Self – XSS is a social engineering attack used to gain control of victims’ web accounts.In a self – XSS attack, the victim of the attack accidentally runs malicious code in his/her own web browser, thus exposing it to the attacker “ Clickjacking Attack performs when an attacker to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. How “XSSJacking” Works...

hackers heroes of the computer revolution

hackers heroes of the computer revolution view book

How To access Deep Anonymous web and know its Secretive and Mysterious activities

How To access Deep Anonymous web and know its Secretive and Mysterious activities What is Deep Web The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The opposite term to the deep web is the surface web. The deep web includes many very common uses such as web mail, online banking but also paid for services with a paywall such as video on demand, and many more. This part of the Internet is known as the Deep Web, and it is about 500 times the size of the Web that we know. The Deep Web vs. The Dark Web Deep Web is  the portion of the Internet that is hidden from conventional search engines, as by encryption; the aggregate of unindexed websites The  Dark Web   on the other hand, is defined as “the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser: ...

new CIA leaks

new CIA leaks direct link

Hack-with-Github/Kali-Linux

Hack-with-Github/Kali-Linux   for more information press here  

How can I monitor the CPU temperature under linux?

How can I monitor the CPU temperature under linux  i'll explain in this post how can you monitor the cpu temperature by different methods method 1 you need the lm-sensors package.  I thought I should mention that in addition to installing the package, you should run the sensors-detect command to identify the kernel modules that need to be loaded.  If you haven't done this, manually run this once and check if it detects any sensors on board your computer. $ sudo sensors-detect # sensors-detect revision 5249 (2008-05-11 22:56:25 +0200) This program will help you determine which kernel modules you need to load to use lm_sensors most effectively. It is generally safe and recommended to accept the default answers to all questions, unless you know what you're doing.     If you're lucky, your laptop will support an array of sensors. If not, you may still find a basic set of sensors for the CPU:     $ sensors acp...