RedHat Packaging Security with yum

Categories: Linux

RedHat comes with a mitigated package called RHSA (RedHat security advisory) This RHSA comes with a unique id  like CVE Contain the date of fix and these type packages  come for the applications that shipped from RedHat Example RHSA-2015:0291 For listing available updates for application

For quick installation to security batches

nmap cheat sheet

Categories: Security

nmap scan sheet cheat 😀 Host Discovery

arp scan

Stealth Scan

  Idle Scan

  Version Scan

Convert VirtualBox HardDisk To VMware

Categories: Linux

hello in this article we will simply convert vhd file (VirtualBox disk image) to VMware disk   our VirtualBox disk is “systemdisk.vhd” we will use qemu emulator to convert the disk our target app to do the convert is qemu-img

 

port forward & pivoting with meterpreter

Categories: Security, tech

Let’s assume u attacked machine with 2 nic cards our IP is 10.0.0.5 first, one ip is 10.0.0.10 that you reach it from and in ifconfig shows, the machine has a different  IP 10.0.2.30 you can scan the network 10.0.2.x via meterpreter arp_scan

we can connect to the RDP server of the machine 10.0.2.30 […]

IPTABLES redirect all ports to one port

Categories: Firewall, Linux

hello this  iptables rule to redirect all incoming traffic from all ports to one port example 80 on ip 192.168.1.10

enjoy

MetaSploit Payload to Executable EXE

Categories: Security

RedHat / Centos Repository you must have

Categories: Linux

RedHat and centos come with the default repo so you have to install additional repos to get all your software from yum   epel ius remi rpmfroge

  enjoy   this list for 64bit system centos 7 u can customise  the links as you got the link

MySQL force delete rows

Categories: Databases

MySQL check if there is a relation between rows before deleting it it will raise an error can’t delete or update a parent row we need to till mysql to stop this check

to reactivate it

  enjoy

SMASH THE STACK LEVEL6

Categories: Security, tech

Smash The Stack  Level 6

this app take 2 argument 1 – username 2- password it takes it then say hi also, it checks ur env language and change the msg

let’s make some love with gdb btw without change ur language, it will not overwrite the EIP

Get Environment Variable memory Address

Categories: Security

some time u put the shellcode inside  the environment and u will need the address of it to build ur payload here is a simple C code to get the address