Showing headlines posted by blackMOREOps

Linux file system hierarchy v2.0

What is a file in Linux? What is file system in Linux? Where are all the configuration files? Where do I keep my downloaded applications? Is there really a filesystem standard structure in Linux? Well, the above image explains Linux file system hierarchy in a very simple and non-complex way.

Website Password hacking using WireShark

  • http://www.blackmoreops.com; By blackMORE Ops (Posted by blackMOREOps on Apr 21, 2015 6:39 PM EDT)
  • Story Type: Security
Did you knew every time you fill in your username and password on a website and press ENTER, you are sending your password?

CVE-2014-9034: Denial of Service Attack Proof of Concept PHP Exploit for WordPress

CVE-2014-9034 was published recently, highlighting an issue that “allows remote attackers to cause a denial of service (CPU consumption) via a long password that is improperly handled during hashing” due to phpass usage.

Old school linux terminal fun revisited. Random fortune quotes using random cowsay in Linux terminal

fortune is a simple program that displays a pseudorandom message from a database of quotations that first appeared in Version 7 Unix. The most common version on modern systems is the BSD fortune, originally written by Ken Arnold. Distributions of fortune are usually bundled with a collection of themed files, containing sayings like those found on fortune cookies (hence the name), quotations from famous people, jokes, or poetry.

14 top data recovery softwares for Linux

  • http://www.blackmoreops.com; By blackMORE Ops (Posted by blackMOREOps on Dec 8, 2014 12:08 PM EDT)
  • Groups: Linux
Data recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

Hack website password using WireShark

This is the simplest hacking guide that works on any HTTP enabled authentication website. It even worked on Facebook (when HTTP was the authentication method). Who can do it? Anyone from any operating system, be that a Linux, Windows or Mac with Wireshark. The implications are massive, but do we even realize it in our everyday usage?

What happens when you put slow loris DOS attack on steroid?

  • http://www.darkmoreops.com/; By blackMORE Ops (Posted by blackMOREOps on Sep 23, 2014 8:16 AM EDT)
  • Story Type: Tutorial
SlowHTTPTest is a highly configurable tool that simulates some Application Layer Denial of Service attacks. It works on majority of Linux platforms, OSX and Cygwin – a Unix-like environment and command-line interface for Microsoft Windows.

Connect to WiFi network from command line in Linux

How many of you failed to connect to WiFi network in Linux? Did you bumped into issues like the followings in different forums, discussion page, blogs? I am sure everyone did at some point. This guide will take you through the steps for connecting to a WPA/WPA2 WiFi network from command line. It is useful when you've lost GUI or you'r GNOME, KDE desktop crashed and all you got is our old friend Command Line.

Fix Linux display issues

Find HorizSync VertRefresh rates to fix Linux display issue – Why my display is stuck at 640×480? I have a NVIDIA GTX460 Graphics card on my current machine and a Acer 22" Monitor. After installing NVIDIA driver, my display was stuck at 640x480 and no matter what I do, nothing fixed it. This is an unusual problem with NVIDIA driver. I am assuming Intel and ATI driver might have similar issues.

Identify USB Driver on Linux.

This guide shows how you can identify USB Driver Chipset(most commonly Wireless) Information on Linux. Often users troll different forums and blogs to find out they can identify which driver their PCI or USB device is using. This guide applies to all possible scenarios and any Linux OS namely Ubuntu, Debian, Mint, CentOS, Fedora etc.

Identify PCI and USB Wired and Wireless Driver in Linux

This guide shows how you can identify PCI Driver Chipset Information on Linux. Often users troll different forums and blogs to find out they can identify which driver their PCI or USB device is using. This guide applies to all possible scenarios

Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux

Oxford Dictionary got 171,476 words. I'm #cracking my #Wifi #WPA2 password at 159159186.00 PMK's per second. Need I say more? There are just too many guides on Cracking Wifi WPA/WPA2 passwords using different methods. Everyone has their own take on it. Personally, I think there’s no right or wrong way of cracking a Wireless Access Point. Following way is my way and I found it extremely efficient and fast during my tests for Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux where I attacked with Dictionary using either cuda or calpp (cal++) and at the same time I used WiFite to fast track a few things. This whole process was used in Kali Linux and it took me less than 10 minutes to crack a Wifi WPA/WPA2 password using pyrit cowpatty WiFite combination using my laptop running a AMD ATI 7500HD Graphics card.

World Live DDoS attack maps – Live DDoS Monitoring

To protect your website, you need to be able to block or absorb malicious traffic. Webmasters can talk to their hosting provider about DDoS attack protection. They can also route incoming traffic through a reputable third-party service that provides distributed caching to help filter out malicious traffic — reducing the strain on existing web servers. Most such services require a paid subscription, but often cost less than scaling up your own server capacity to deal with a DDoS attack.

Securing SSH with two factor authentication using Google Authenticator

Two-step verification (also known as Two-factor authentication, abbreviated to TFA) is a process involving two stages to verify the identity of an entity trying to access services in a computer or in a network. This is a special case of a multi-factor authentication which might involve only one of the three authentication factors (a knowledge factor, a possession factor, and an inheritance factor) for both steps. If each step involves a different authentication factor then the two-step verification is additionally two-factor authentication.