Thursday, 20 December 2018

D.O.A. - Bloodied But Unbowed 1983

Classic record now and Bloodied But Unbowed is the truth of it. D.O.A. has slogged forward from the west coast of north America, criss-crossing the continent on a shoestring, infecting friends and strangers with an alien virus, a dangerous aggressive way of viewing the world. Talk minus action equals zero. Use your brain, think for yourself, speak out, take action or let the silence bury you alive. This blazing hot quartet, led by Canada's godfather of punk Joe Shithead Keithley on vocals and guitar, along with the incredible Chuck Biscuits on drums, the rock n' roll madman Randy Rampage on bass and the outrageous Dave Gregg on guitar blazed a wide swath through western counter culture. The Damage To Date: 1978-83, Alternative Tentacles, only hits!


Wednesday, 19 December 2018

See save WiFi password in PC


          See save WiFi password in PC

Hello guys, How are you? i hope you are good. many time you you forget your WiFi password and you can't connect with internet, then there is only option to reset the Router and it's annoying.but, today in this post i'll tell you how can you see your WiFi password in PC/LAPTOP.




·        
       
       Open command prompt. win+R⇈⇉

·         Type “wmic” without quotes hit enter.

·         Type “quit” without quotes then enter.

·         Then type “netsh wlan show profile” enter.

·         Now simply type “netsh wlan show profiles “wifi network name” ”

·         Type “netsh wlan show profiles wifi name key=clear” hit enter.

·         Done……. See key content show in cmd….


KLAXON - 1984

The Klaxons are an Italian punk band with post-punk influences, active since 1979. Historical formation and milestone of the Roman music scene, they are still today one of the reference bands of Italian punk, formed 1979 in Rome by the meeting of Andrea Morelli (bass/vocals), Lorenzo Tovoli (guitar/vocals) and Fabrizio Ferraro (drums). The first live performance takes place at the Roman Club Uonna. They also play in all the events organized at the time by Radio Red Wave and Radio Proletaria. In 1983 they released their first EP with five pieces, one of which, "Religion", came in first place in the Punk Charts Italia ranking in the Rockerilla newspaper. This little compilation was released via Sydney Town and tracks 1-5 were originally released on the "The Kids Today" EP, track 6 is from the "Quelli Che Urlano Ancora.." comp., tracks 7-9 are previously unreleased. Solid stuff!


Usefull Tools For A Hacker


* __0trace__    1.5    A hop enumeration tool    http://jon.oberheide.org/0trace/
* __3proxy__    0.7.1.1    Tiny free proxy server.    http://3proxy.ru/
* __3proxy-win32__    0.7.1.1    Tiny free proxy server.    http://3proxy.ru/
* __42zip    42__    Recursive Zip archive bomb.    http://blog.fefe.de/?ts=b6cea88d
* __acccheck__    0.2.1    A password dictionary attack tool that targets windows authentication via the SMB protocol.    http://labs.portcullis.co.uk/tools/acccheck/
* __ace    1.10__    Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface    http://ucsniff.sourceforge.net/ace.html
* __admid-pack 0.1__    ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.    http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
* __adminpagefinder    0.1__    This python script looks for a large amount of possible administrative interfaces on a given site.    http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
* __admsnmp    0.1__    ADM SNMP audit scanner.
* __aesfix    1.0.1__    A tool to find AES key in RAM    http://citp.princeton.edu/memory/code/
* __aeskeyfind    1.0__    A tool to find AES key in RAM    http://citp.princeton.edu/memory/code/
* __aespipe    2.4c__    Reads data from stdin and outputs encrypted or decrypted results to stdout.    http://loop-aes.sourceforge.net/aespipe/
* __afflib    3.7.3__    An extensible open format for the storage of disk images and related forensic information.    http://www.afflib.org
* __afpfs-ng    0.8.1__    A client for the Apple Filing Protocol (AFP)    http://alexthepuffin.googlepages.com/
* __against    0.2__    A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.    http://nullsecurity.net/tools/cracker.html
* __aiengine    339.58dfb85__    A packet inspection engine with capabilities of learning without any human intervention.    https://bitbucket.org/camp0/aiengine/
* __aimage    3.2.5__    A program to create aff-images.    http://www.afflib.org
* __air    2.0.0__    A GUI front-end to dd/dc3dd designed for easily creating forensic images.    http://air-imager.sourceforge.net/
* __airflood    0.1__    A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.    http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
* __airgraph-ng    2371__ Graphing tool for the aircrack suite    http://www.aircrack-ng.org
* __airoscript    45.0a122ee__    A script to simplify the use of aircrack-ng tools.    http://midnightresearch.com/projects/wicrawl/
* __airpwn    1.4__    A tool for generic packet injection on an 802.11 network.    http://airpwn.sourceforge.net
* __allthevhosts 1.0__    A vhost discovery tool that scrapes various web applications    http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
* __american-fuzzy-lop    0.89b__    A practical, instrumentation-driven fuzzer for binary formats.    https://code.google.com/p/american-fuzzy-lop/
* __androguard    1.9__    Reverse engineering, Malware and goodware analysis of Android applications and more.    https://code.google.com/p/androguard/
* __androick    5.35048d7__    A python tool to help in forensics analysis on android.    https://github.com/Flo354/Androick
* __android-apktool    1.5.2__    A tool for reengineering Android apk files.    http://forum.xda-developers.com/showthread.php?t=1755243
* __android-ndk    r9c__    Android C/C++ developer kit.    http://developer.android.com/sdk/ndk/index.html
* __android-sdk-platform-tools    r19__    Platform-Tools for Google Android SDK (adb and fastboot)    http://developer.android.com/sdk/index.html
* __android-sdk    r22.3__    Google Android SDK    http://developer.android.com/sdk/index.html
* __android-udev-rules    8340.db8ef4a__    Android udev rules.    https://github.com/bbqlinux/android-udev-rules
* __androidsniffer    0.1__    A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.    http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
* __anontwi    1.0__    A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.    http://anontwi.sourceforge.net/
* __aphopper    0.3__    AP Hopper is a program that automatically hops between access points of different wireless networks.    http://aphopper.sourceforge.net/
* __apnbf    0.1__    A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.    http://www.c0decafe.de/
* __arachni    1.0.6__    A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.    https://www.arachni-scanner.com
* __arduino    1.0.5__    Arduino SDK (includes patched avrdude and librxtx)    http://arduino.cc/en/Main/Software
* __argus    3.0.8__    Network monitoring tool with flow control.    http://qosient.com/argus/
* __argus-clients    3.0.8__    Network monitoring client for Argus.    http://qosient.com/argus/
* __armitage    141120__    A graphical cyber attack management tool for Metasploit.    http://www.fastandeasyhacking.com/
* __arp-scan    1.9__    A tool that uses ARP to discover and fingerprint IP hosts on the local network    http://www.nta-monitor.com/tools/arp-scan/
* __arpalert    2.0.12__    Monitor ARP changes in ethernet networks    http://www.arpalert.org/
* __arpantispoofer    1.0.1.32__    A utility to detect and resist BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is also a handy helper for gateways which don't work well with ARP.    http://arpantispoofer.sourceforge.net/
* __arpoison    0.6__    The UNIX arp cache update utility    http://www.arpoison.net
* __arpon    2.7__    A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.    http://arpon.sourceforge.net/
* __arpwner    26.f300fdf__    GUI-based python tool for arp posioning and dns poisoning attacks.    https://github.com/ntrippar/ARPwner
* __artillery    1.0.2__    A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system    https://www.trustedsec.com/downloads/artillery/
* __asleap    2.2__    Actively recover LEAP/PPTP passwords.    http://www.willhackforsushi.com/Asleap.html
* __asp-audit    2BETA__    An ASP fingerprinting tool and vulnerability scanner.    http://seclists.org/basics/2006/Sep/128
* __athena-ssl-scanner    0.5.2__    a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.    http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
* __atstaketools    0.1__    This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.    http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
* __auto-xor-decryptor    3.6a1f8f7__    Automatic XOR decryptor tool.    http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
* __autopsy    2.24__    A GUI for The Sleuth Kit.    http://www.sleuthkit.org/autopsy
* __azazel    10.401e3aa__    A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.    https://github.com/chokepoint/azazel
* __b2sum    20140114__    BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.    https://blake2.net/
* __backcookie    44.cbf5b8b__    Small backdoor using cookie.    https://github.com/mrjopino/backcookie
* __backdoor-factory    98.89d87b2__    Patch win32/64 binaries with shellcode.    https://github.com/secretsquirrel/the-backdoor-factory
* __backfuzz    36.8e54ed6__    A network protocol fuzzing toolkit.    https://github.com/localh0t/backfuzz
* __balbuzard    65.546c5dcf629c__    A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).    https://bitbucket.org/decalage/balbuzard/
* __bamf-framework    35.30d2b4b__    A modular framework designed to be a platform to launch attacks against botnets.    https://github.com/bwall/BAMF
* __basedomainname    0.1__    Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.    http://www.morningstarsecurity.com/research
* __batman-adv    2013.4.0__    batman kernel module, (included upstream since .38)    http://www.open-mesh.net/
* __bbqsql    1.2__    SQL injection exploitation tool.    https://github.com/neohapsis/bbqsql
* __bdfproxy    38.43e83e4__    Patch Binaries via MITM: BackdoorFactory + mitmProxy    https://github.com/secretsquirrel/BDFProxy
* __bed    0.5__    Collection of scripts to test for buffer overflows, format string vulnerabilities.    http://www.aldeid.com/wiki/Bed
* __beef    0.4.5.0.181.g80a9f8e__    The Browser Exploitation Framework that focuses on the web browser    http://beefproject.com/
* __beholder    0.8.9__    A wireless intrusion detection tool that looks for anomalies in a wifi environment.    http://www.beholderwireless.org/
* __beleth    36.0963699__    A Multi-threaded Dictionary based SSH cracker.    https://github.com/chokepoint/Beleth
* __bfbtester    2.0.1__    Performs checks of single and multiple argument command line overflows and environment variable overflows    http://sourceforge.net/projects/bfbtester/
* __bgp-md5crack    0.1__    RFC2385 password cracker    http://www.c0decafe.de/
* __bing-ip2hosts    0.4__    Enumerates all hostnames which Bing has indexed for a specific IP address.    http://www.morningstarsecurity.com/research/bing-ip2hosts
* __bing-lfi-rfi    0.1__    This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.    http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html
* __binwalk    2.0.1__    A tool for searching a given binary image for embedded files.    http://binwalk.org
* __binwally    3.ca092a7__    Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).    https://github.com/bmaia/binwally
* __bios_memimage    1.2__    A tool to dump RAM contents to disk (aka cold boot attack).    http://citp.princeton.edu/memory/code/
* __birp    60.1d7c49f__    A tool that will assist in the security assessment of mainframe applications served over TN3270.    https://github.com/sensepost/birp
* __bittwist    2.0__    A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.    http://bittwist.sourceforge.net/
* __bkhive    1.1.1__    Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.    http://sourceforge.net/projects/ophcrack
* __blackarch-menus    0.2__    BlackArch specific XDG-compliant menu    http://www.blackarch.org/
* __blackhash    0.2__    Creates a filter from system hashes    http://16s.us/blackhash/
* __bletchley    0.0.1__    A collection of practical application cryptanalysis tools.    https://code.google.com/p/bletchley/
* __blindelephant    7__    A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations    http://blindelephant.sourceforge.net/
* __blindsql    1.0__    Set of bash scripts for blind SQL injection attacks    http://www.enye-sec.org/programas.html
* __bluebox-ng    66.4a73bb4__    A GPL VoIP/UC vulnerability scanner.    https://github.com/jesusprubio/bluebox-ng
* __bluebugger    0.1__    An implementation of the bluebug technique which was discovered by Martin Herfurt.    http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html

Website Hacking (SQLInjection Using kali linux)




The danger of website SQL injection.
Among the biggest threats to application security, website SQL injection ranks among the most dangerous risks. In website SQL injections, cyber criminals are able to hack a website by tricking the site into sending unexpected SQL commands to a database. This is often accomplished by entering specific data into a web form field – if the application doesn’t properly clean untrusted data before adding it to an SQL query, attackers can enter their own SQL commands for the database to execute. By getting an application to modify a website SQL query, attackers can control application behavior, alter the data without authorization or access the data for criminal purposes.
While the steps to prevent website SQL injection are fairly easy and straightforward, many companies lack the enterprise data protection protocols and solutions that can help to eradicate website SQL weaknesses.
Stop website SQL attacks with Veracode.
Veracode provides leading application security testing solutions that can help to easily prevent website SQL injection as well as many additional threats. Our cloud-based suite of application testing services enable developers and IT administrators to test for flaws and weaknesses throughout the software development lifecycle, from inception through production. Our SaaS-based offerings allow organizations to quickly and easily adopt powerful testing technology without capital expense. And with accurate results returned quickly, developers can effectively mitigate website SQL risks and other threats without hindering aggressive development timelines.
Our test results identify a wide variety of risks in applications – from broken authentication and session management to cross site scripting, buffer overflow vulnerabilities, cryptographically insecure storage and the presence of other flaws and malware software. Developers can rely on our step-by-step remediation advice to quickly find and fix flaws in software in development or production.
Veracode technology for preventing website SQL threats.
Veracode provides several on-demand services that can help to identify and remediate website SQL injection weaknesses in applications.
  • Veracode Static Analysis is an automated process for testing micro services and web, mobile and desktop applications. Our technology scans compiled binaries, eliminating the need for access to source code. Veracode Static Analysis supports all widely used languages and development frameworks.
  • Veracode Web Application Scanning uses both static and dynamic testing to perform lightweight scans on thousands of websites and web applications in parallel, prioritizing risks by severity to help speed remediation. Web Application Scanning can also run authenticated scans on critical applications to systematically reduce risk and continuously monitor security status.
Learn more about mitigating website SQL injection with Veracode, or visit our AppSec knowledgebase to get answers to questions like “What is spoof?” and “What is cache poisoning?”