Skip to main content

Posts

Root Nexus 5 on Android MRA58K Marshmallow and Install Custom Recovery (2017)

Prerequisites to root Nexus 5 on Android 6.0 MRA58K Marshmallow: Create a backup of all important data on your Nexus 5 device. Creating a Nandroid backup of your device is highly recommended. Download and install USB drivers for Nexus 5 in your computer. Enable USB debugging option by pressing Menu > Settings > Applications. Navigate and tap on Developer Options to ensure that USB Debugging is enabled. Your device needs to be on MRA58K Marshmallow before you follow this guide to root it. Ensure that your Nexus 5 carries more than 70% of charge. How to root Nexus 5 on Android 6.0 MRA58K Marshmallow: We have already shared with you the steps to flash Android 6.0 MRA58K  on Nexus 5. Once updated, you can now proceed to root Nexus 5 on Android 6.0 MRA58K Marshmallow. Required files: Download Android SDK and install it. Set it up with platform-tools and USB drivers package in SDK. Download Despair Kernel and SuperSU v2.49 (BETA-SuperSU-v2.49.zip) for Nexus 5 on your ...

Wordpress hacking - How to install / run wpscan on windows xp / windows 7 / windows 10

HOW TO RUN WPSCAN ON WINDOWS Byrockstardevil Requirements: rubyinstaller Development Kit for rubyinstaller curl DLL for windows : libcurl.dll 1 - install rubyinstaller you must have Ruby 2.2.3 version . download links here : http://rubyinstaller.org/downloads/ for more info : https://github.com/oneclick/rubyinstaller/wiki 2 - install Development Kit for rubyinstaller download link : http://rubyinstaller.org/downloads/ how to install : https://github.com/oneclick/rubyinstaller/wiki/Development-Kit if you face that problem  "unknown encoding name -  (ArgumentError)" just type "chcp 1252" in cmd and hit enter 3 - install libcurl.dll A - Download libcurl.dll from : http://www.confusedbycode.com/curl/ B - copy libcurl.dll copy  libcurl.dll into ruby bin folder or wpscan folder and make sure to add it to your PATH. I also added .DLL to PATHEXT ex : C:\Ruby21-x64\bin\ you can visit : http://www.computerhope.com/issues/ch000549.htm to know to set the p...

How to successfully hack website in 2017

The reason why a lot of newbies and non-professional hackers fail to get a successful hacking is because they don´t want to wait, most of time they want a magic button where they can click and that´s all, but in the reality it does not work like that, the first thing you have to do is a good reconnaissance about your target, for those familiar with the software development is easier to understand what i mean, you can not develop a good software without a good documentation, just like the UML in software industry here is the same, we need info about the target to make our tasks easier. My Advice on Good Recon What are the services they are running? Figure out stuffs like open ports, software and versions on the server, and try to look for the exploit in case there is at least one online, or you can just make your own exploit. Tools that i recommend for this section are nmap,whatweb and nikto and of course some others made by Mr_ Nakup3nda  or you. Did they writ...

acccheck

This tool is designed as a password dictionary attack tool, that targets Windows Authentication via SMB protocol. It's a wrapper script around 'smbclient' binary and as a result is dependent on it for its execution. Server Message Block (SMB) Protocol is a network file sharing protocol and as implemented in Microsoft Windows is known as Microsoft SMB Protocol. The set of message packets that defines a particular version of the protocol is called a dialect. The Common Internet File System (CIFS) Protocol is a dialect of SMB. Both SMB and CIFS are also available on VMS, several versions of Unix, and other operating systems. SMB can run on top of the Session Layer: Directly over TCP, port 445 ; Via the NetBIOS API, which in turn can run on several transports; On UDP ports 137, 138 & TCP ports 137, 139 (NetBIOS over TCP/IP); On several legacy protocols such as NBF (incorrectly referred to as NetBEUI). The SMB “Inter-Process Communication” (IPC) system provides named pipes ...

The Kali Linux Certified Professional (KLCP)

After almost two years in the making, it is with great pride to  announce Kali Linux Certified Professional certification – the first and only official certification program that validates one’s proficiency with the Kali Linux distribution. If you’re new to the Information Security field or are looking to take your first steps towards a new career in InfoSec , the KLCP is a “must have” foundation certification. Built on the philosophy that “you’ve got to walk before you can run”, the KLCP will give you direct experience with your working environment and a solid foundation toward a future with any professional InfoSec work. As we continually see, those entering the Offensive Security PWK program with previous working experience with Kali, and a general familiarity with Linux, tend to do better in the real world OSCP exam. For those of you who already have some experience in the field, the KLCP provides a solid and thorough study of the Kali Linux Distribution– learnin...

Upcoming Book- Kali Linux Revealed: Mastering the Penetration Testing Distribution

More exciting news! In the past year, Kali Linux Official Team has been working internally on an Official Kali Linux book – Kali Linux Revealed: Mastering the Penetration Testing Distribution . This is the first official Kali book from Offsec Press , and is scheduled for release on June 5th, 2017 . Kali Linux Revealed will be available in both hard copy and online formats. Keeping the Kali Linux spirit, the online version of the book will be free of charge, allowing anyone who wishes to hone their skills and improve their knowledge of Kali to do so at no cost. This book, together with our official Kali documentation site will encompass the body of knowledge for the Kali Linux Certified Professional   (KLCP) .