Persistent mount for luks with unlock Key

Categories: Linux, Security, tech

creating a encrypted disk with luks our  Little problem here to mount a encrypted disk  automatically on boot so no need to enter the pass for mounting but this risky if the machine theft happen because we will use a key inside the system and it will be leaked if our machine stolen so lets […]

Linux Disk Encryption with LUKS

Categories: Linux, Security

today we going to make an encrypted disk partition list prepare our partition I have a new disk in  /dev/sdb I will create a partition 100 on it with fdisk

RPM integrity and scripts

Categories: Linux, Security

Yum repository comes with gpg  and md5 support to verify the validity of the package You can list installed gpg keys in your system via

It will show the unique id for the installed keys in your  system gpg-pubkey-e8562897-459f07a4 gpg-pubkey-217521f6-45e8a532 To list all information related to a key rpm -qi pgp-key-unique-id

  It […]

nmap cheat sheet

Categories: Security

nmap scan sheet cheat 😀 Host Discovery

arp scan

Stealth Scan

  Idle Scan

  Version Scan

port forward & pivoting with meterpreter

Categories: Security, tech

Let’s assume u attacked machine with 2 nic cards our IP is 10.0.0.5 first, one ip is 10.0.0.10 that you reach it from and in ifconfig shows, the machine has a different  IP 10.0.2.30 you can scan the network 10.0.2.x via meterpreter arp_scan

we can connect to the RDP server of the machine 10.0.2.30 […]

MetaSploit Payload to Executable EXE

Categories: Security

SMASH THE STACK LEVEL6

Categories: Security, tech

Smash The Stack  Level 6

this app take 2 argument 1 – username 2- password it takes it then say hi also, it checks ur env language and change the msg

let’s make some love with gdb btw without change ur language, it will not overwrite the EIP

Get Environment Variable memory Address

Categories: Security

some time u put the shellcode inside  the environment and u will need the address of it to build ur payload here is a simple C code to get the address

   

Duplicate File Finder By MD5SUM

Categories: Python, Security

Hello this is a simple script to find the duplicated files by md5sum so if u have 2 files with the same content  but with different   names, u still can catch them

TrueCrypt Password bruteforce

Categories: Python, Security

hello, guys, this  script will simply mount the container with the password form the given password list