Friday, August 21, 2015

View Source Website And Hack Website



The first rule when you wanna attack some site, you must be F12 View source that site to find some info the site, may be that is a Wordpress version, Joomla version, may be password too with this video...

How To Upload Shell On The Website [Easy]



My target is find some upload form for upload php script on server!
so what can I do? A lot of method to bypass upload php script and execute your srcipt for read all server victim.

Local Attack Basic For Newbie



Just remember some command and you can execute local attack some server easy, non security with my tutorial and security more your site.

Deface Website Without Shell

When you have only Admin Panel, so what can you do without shell?
Do you wanna upload some topic in that site to show your rush? Really not professional huh ^^
Let me help you, just only Admin Panel, you can Deface that site without shell.

Local Attack Server Windows

Bypass back connect and read config with some command:
type, dir, cd ,net user, net view, adduser v.v...

Thursday, August 20, 2015

Protect Your Admin Panel With Htaccess

Go to your folder wanna protect from some attacker :)

Create file .htaccess with a content:

Wednesday, August 19, 2015

Linux Iptables allow or block ICMP ping request

=> Zero (0) is for echo-reply

=> Eight (8) is for echo-request.

To enable ICMP ping incoming client request use following iptables rule (you need to add following rules to script).

My default firewall policy is blocking everything.
Task: Enable or allow ICMP ping incoming client request

Linux Iptables Avoid IP Spoofing And Bad Addresses Attacks

Spoofing and bad address attack tries to fool the server and try to claim that packets had come from local address/network.

How to: Linux Iptables block common attacks

30 Commands In Nmap Examples For Sys/Network Admins

Nmap ("Network Mapper") is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.