Posts

How to get ip address of all the connected device on the network on linux using cli #nmap #network #connecteddevices #linuxcommands #kalilinux #linux #linuxserver

  #nmap #network #connecteddevices #linuxcommands #kalilinux #linux #linuxserver  To get all the IP addresses available on a network in Linux (Kali), you can use the following methods: **Method 1: Using `nmap`** You can use `nmap` to scan the network and list all the IP addresses. Here's an example: ```bash nmap -sP 192.168.1.0/24 ``` Replace `192.168.1.0/24` with the IP address range of your network. **Explanation:** * `-sP` option tells `nmap` to perform a ping scan, which sends an ICMP echo request packet to each IP address in the specified range. * `192.168.1.0/24` is the IP address range in CIDR notation, where `192.168.1.0` is the network address and `24` is the subnet mask. **Method 2: Using `arp-scan`** You can use `arp-scan` to scan the network and list all the IP addresses. Here's an example: ```bash arp-scan -q 192.168.1.0/24 ``` Replace `192.168.1.0/24` with the IP address range of your network. **Explanation:** * `-q` option tells `arp-scan` to suppress the header

Cybersecurity Month

 Cybersecurity Month, observed in October, is an initiative to raise awareness about the importance of cybersecurity and promote best practices to protect personal and organizational data. It often features educational campaigns, workshops, and resources to help individuals and businesses strengthen their cyber defenses.  Each week may focus on different themes, such as: 1. **Recognizing and Reporting Phishing**: Educating about phishing scams and how to identify suspicious emails and links. 2. **Securing Your Devices**: Emphasizing the importance of using strong passwords, enabling two-factor authentication, and keeping software updated. 3. **Protecting Personal Information**: Discussing how to safeguard sensitive information, both online and offline. 4. **Cybersecurity at Work**: Encouraging businesses to implement strong security policies and provide training to employees. It’s a great time to reflect on your own cybersecurity practices and make improvements! why october October was

Forensic Tools #forensic #hacking

 ### Network Forensic Tools - Nmap - Wireshark - Xplico - Snort - TCPDump - The Sleuth Kit ### Email Forensic Tools - MailXaminer - MailPro+ - Xtraptor - Aid4Mail - eMailTrackerPro - Autopsy ### Mobile Forensics Tools - Elcomsoft iOS Forensic Toolkit - Mobile Verification Toolkit - Oxygen Forensic - MOBILedit - Cellebrite UFED - MSAB XRY ### OSINT Tools - Maltego - Nmap - OSINT Framework - Shodan - Recon-ng - TheHarvester ### Live Forensics Tools - OS Forensics - Encase Live - CAINE - F-Response - Kali Linux Forensic Mode ### Memory Forensics Tools - Volatility - Dumptl - memDump - Access data FTK Imager - Hibernation Recon - WindowSCOPE ### Malware Analysis Tools - Wireshark - YARA - Malwarebytes - VirusTotal - Cuckoo Sandbox - IDA Pro ### Data Recovery Tools - Recuva - EaseUS Data Recovery - TestDisk - Stellar Data Recovery - PhotoRec - Disk Drill ### Cloud Forensic Tools - Magnet AXIOM - MSAB XRY Cloud - Azure CLI

Ethical Hacking Tools #kalilinux #hacking #ethicalhacking #hackingtools #ethicalhackingtools

 1. Kali Linux 2. Wireshark 3. Nmap 4. Burp Suite 5. Gophish 6. Aircrack-ng 7. Have I Been Pwned 8. Metasploit Framework 9. Nikto 10. Hack The Box 11. pfSense 12. Cyber Chef 13. Snort 14. Ghidra 15. Deshashed 16. OpenVAS 17. OSSEC 18. SQLMap 19. Remnux 20. Zed Attack Proxy Tools:- Information Gathering: Nmap Shodan Maltego TheHarvester Recon-NG Amass Censys OSINT Framework Netlas.io -  Netlas.io is designed to gather and analyze publicly available information, making it useful for cybersecurity professionals and ethical hackers. Gobuster Red Hawk - Information Gathering and Vulnerability Analysis. Password Cracking: John The Ripper Hydra Hashcat OPHCrack Medusa THC-Hydra Cain & Abel Wireless Hacking: Aircrack-NG Wifite Kismet TCPDump Airsnort Netstumbler Reaver Software Engineering: GoPhish HiddenEye SocialFish EvilURL Evilginx Vulnerability Scanning: OpenVAS Nessus AppScan LYNIS Retina Nexpose Forensics: SleuthKit Autopsy Volatility Guymager Foremost Binwalk Wireshark Exploitation

Security Privacy OS(Operating System) #security #privacy #secureos #WhonixOS #TailsOS #QubesOS #DebianSecurity #GrapheneOS #PrivacyOS #SecureOS #AnonymousBrowsing #Cybersecurity #DataPrivacy #LinuxSecurity #OpenSource #OnlinePrivacy #MobileSecurity #PrivacyFirst

 1.Whonix 2.Tails 3.Debian 4.Quebes OS 5.Graphene OS ### Tags: - Whonix OS - Tails OS - Qubes OS - Debian Security - Graphene OS - Privacy-Focused OS - Secure Operating Systems - Anonymous Browsing - Cybersecurity Tools - Open Source Security - Data Privacy OS - Linux Privacy Tools - Security-Centric Linux Distributions - Mobile Privacy OS (for Graphene OS) - Qubes OS Security

fsmon - Monitoring tool #tools

 **fsmon** is a lightweight file system monitoring tool designed to monitor changes in a specified directory or file system. It can be used to track file modifications, creations, deletions, and other events. Here are some key features and functionalities: 1. **Real-time Monitoring**: fsmon can provide real-time notifications about changes happening in the monitored file system. 2. **Event Types**: It typically tracks various events, such as file access, modifications, deletions, and more. 3. **Configurability**: Users can usually specify which directories or files to monitor and set up filters for events of interest. 4. **Lightweight**: It is designed to be efficient and consume minimal system resources. 5. **Cross-Platform**: Many implementations of file monitoring tools like fsmon are available on multiple platforms, including Linux, Windows, and macOS. 6. **Logging and Alerts**: Some versions may include options for logging changes or sending alerts to users when significant change

How To Customize Linux Bootloaders ... #customization #linuxcustomization #kalilinuxcustomization

 /etc/default/grub - add this line at the end GRUB_THEME=/boot/grub/themes/Telsa/theme.txt  sudo update-grub - then done reboot. and u r good to go. How to fix the resolution problem type c vbeinfo  or videoinfo in the second or third line u will find the resolution then reboot open /etc/default//grub/ and uncooment the below line then update the resolution #GRUB_GFXMODE=640x480 /boot/grub/themes/ /boot/grub/ - background image.png

SMS, Email and Call B@mbi@g #tools

Image
Clone the repositoty of tbomb and run the bash file.

Ftp server #linux #services

 To enable and use an FTP server on Kali Linux, you can use `vsftpd` (Very Secure FTP Daemon). Here’s a step-by-step guide: ### 1. Install vsftpd First, install `vsftpd` using the following command: ```bash sudo apt update sudo apt install vsftpd ``` ### 2. Configure vsftpd After installation, you need to configure the FTP server. The configuration file is located at `/etc/vsftpd.conf`. Open the configuration file with a text editor: ```bash sudo nano /etc/vsftpd.conf ``` ### 3. Basic Configuration Make the following changes to the configuration file for a basic setup: - Uncomment the following lines:   ```plaintext   write_enable=YES   local_umask=022   ```    - Add or modify the following lines to ensure proper functionality:   ```plaintext   anonymous_enable=NO   local_enable=YES   chroot_local_user=YES   ``` ### 4. Create FTP Directory and Set Permissions Create a directory for the FTP users and set the appropriate permissions. For example, you can create a directory called `ftp` u

How to run bash script from anywhere in terminal in kali #kalilinux #commands

Image
  4.  Add the Scripts Directory to Your PATH run the script from the anywhere in the terminal To easily run your scripts from any location in the terminal, add the  scripts  directory to your PATH. Open your  .bashrc  file: Important make sure that u check your terminal shell name. After that change this 1.shebang from file #!/bin/bash #!/bin/zsh and vice versa bash Copy code nano ~/.bashrc or ~/.zshrc Add the following line at the end of the file: bash Copy code export PATH= $PATH :~/scripts OR echo 'export PATH=$PATH:~/scripts' >> ~/.bashrc source ~/.bashrc Save and close the file, then reload your  .bashrc : bash Copy code source ~/.bashrc

How to remove password from kali linux #linux #commands

 sudo passwd -d $(whoami)

Cyberchef #tools

Image

How to change grub boot background in kali linux #kali #customization #kalicustomization

 Bg Img Link -  https://drive.google.com/file/d/1kNZpTRMecrhvGmZjHRVJV4QZD2plxF18/view Open file manager Go to other location go to boot/grub/themes/kali  

John The Ripper & other tools - A password cracking tool

 John the ripper Installation John the ripper github Usage john hashfilepath --wordlist different kinds of hashing algorithm hashidentifier - hash analyzer hashid github python3 hashid.py hash given md5 - possible john  —format=raw-md5 wordlist=/home/kal i/Desktop/rockyou. txt hash.txt zip2john h.zip > h.txt john --word...=/home/....  h.txt john --show h.txt rssid - ssh private file key ssh2john id.rsa > ssh.txt john --word...=/home/....  ssh.txt john --show ssh.txt **PWDump7

Jam network and calls using 200rs device esp32

https://www.instagram.com/reel/C9QOHlYi83J/?igsh=MXVvcTFmbWZjNTJvNw==

Wordlist of password

Image
Seclist GitHub Rockyou.txt /Usr/share/wordlists - tons of password Rockyou2024.txt - leaked password of the year 2024. Link :- https://disk.yandex.ru/d/1spMBmxcEnN95g Or generate your wordlist related to the victim.

F-Society

Image
 #informationgathering #passwordattacks #wirelesstesting #exploitationtool #webhacking #privatewebhacking #postexploitation #sniffingandspoofing

Wifi Hacking - Evil Twin Attack , Arduino - Esp8266

 https://www.youtube.com/watch?v=W940MOmDZJY Arduino

Hackers Search Engine #serchengines

1. **Censys** 2. **Spiderfoot** 3. **Maltego** 4. **Shodan** 5.**FOFA** https://www.instagram.com/p/DCmFk7Gy3YB/?utm_source=ig_web_copy_link

Location Tracking

Image
1.Zphisher 2.TrackDown 3.IpTracker 4.Clifty 5.seeker

CamPhish

Image
    Step:1 Clone repo from Github: https://github.com/Kihyu/Camphish.git Step:2 Run the camphish.sh file.

PasteJacking

 https://www.youtube.com/watch?v=mddjFXvk3HI Step 1: git clone https://github.com/D4Vinci/PasteJacker.git Step:2 Run setup.py main.py

Kali linux tools part-5 #kali

Image
Tools for Kali Linux! As a bug bounty hunter, you'll want to familiarize yourself with the various tools available in Kali Linux to help you identify, hack, and exploit bugs, vulnerabilities, and more in systems for which permission and authorization have been granted. Here are some of the most popular tools in Kali Linux: Information Gathering Nmap - Network mapping and port scanning Nessus - Vulnerability scanning OpenVAS - Vulnerability scanning Maltego - Network reconnaissance DNSRecon - DNS reconnaissance Whois - Domain name lookup nslookup - DNS lookup Dig - DNS lookup Vulnerability Scanning Nessus - Vulnerability scanning OpenVAS - Vulnerability scanning ZAP - Web application scanning Burp Suite - Web application scanning SQLMap - SQL injection scanning W3af - Web application scanning Password Cracking John the Ripper - Password cracking Aircrack-ng - Wireless password cracking Hashcat - Password cracking Cain and Abel - Password cracking Ophcrack - Password cracking Web App

60 Hacking Commands You Need to know

Commands ping ip ping -s 1300 -f ip hping3 -S -V --flood ip https://www.dropbox.com/scl/fi/ocopfldgm321nn3tutr3r/top_60_hacking_commands_cheat_sheet.pdf?rlkey=rj8itrl0h3ckgdd5gyj0lqpkg&st=dxlxaq4w&dl=0

Linux Networking Commands part-4

Sure! Here’s a comprehensive list of Linux networking commands, particularly useful for Kali Linux: ### Basic Networking Commands 1. **`ifconfig`**: Configure and display network interfaces.    - `ifconfig -a`: Display all interfaces, even if down.    - `ifconfig eth0 up/down`: Bring an interface up or down. 2. **`ip`**: More modern and powerful command to configure network interfaces.    - `ip addr`: Show IP addresses.    - `ip link set eth0 up/down`: Bring an interface up or down.    - `ip route`: Show routing table. 3. **`ping`**: Check the network connection to a host.    - `ping google.com`: Ping Google to check internet connectivity. 4. **`traceroute`**: Trace the route packets take to a destination.    - `traceroute google.com` 5. **`netstat`**: Network statistics, showing connections, routing tables, interface statistics.    - `netstat -tuln`: List listening ports. 6. **`ss`**: Similar to `netstat`, but more modern.    - `ss -tuln`: List listening ports. 7. **`dig`**: DNS looku