The Ultimate Hacking
for penetration testers .............
Thursday, July 6, 2017
SECFND 210-255Implementing Cisco Cybersecurity Operations Exam and SECOPS 210-250 Understanding Cisco Cybersecurity Fundamentals [DUMPS]
FOR UPDATED Implementing Cisco Cybersecurity Operations Exam DUMPS you can email me at cryptographickeyx.509@gmail.com I will mail you the dumps immidiatly after payment
SECFND 210-250 $70
SECOPS 210-255 $70
CHALLENGE SECFND 210-250 $100
CHALLENGE SECFND 210-255 $100
Challenge Dumps to finish all chapters with golden medal is also available
Accepted Currency
- Bitcoin (BTC)
- Perfect Money (PM)
Friday, November 25, 2016
ADD PROGRAM TO RUN COMMAND EXECUTOR
ADD PROGRAM TO RUN COMMAND EXECUTOR
The RUN program is a small program is is use in quick command execution, without going into Command Prompt.
TO SET PROGRAM TO RUN FOLLOW THE STEPS THAT FOLLOW:
1. Start + E
2. at the top click on "system properties"
3. on the side bar click on "advanced system settings"
4. click on "environmental variables"
5. click on "new "
6. type the "variable name" of your choice, Note: command to execute the program
7. click on browse as indicated by the picture
8. locate the location of the program
9. click ok, and ok again, to close the box
1. from your home screen (Desktop)
2. press: Start + R
3. type the name of the program (variable name) as in SECTION 1:6, in my own case I typed: notepad++
4. click ok...
you are free to post your comment or questions!...
The RUN program is a small program is is use in quick command execution, without going into Command Prompt.
SECTION ONE: SETTING PROGRAM
TO SET PROGRAM TO RUN FOLLOW THE STEPS THAT FOLLOW:
1. Start + E
2. at the top click on "system properties"
3. on the side bar click on "advanced system settings"
4. click on "environmental variables"
5. click on "new "
6. type the "variable name" of your choice, Note: command to execute the program
7. click on browse as indicated by the picture
8. locate the location of the program
9. click ok, and ok again, to close the box
SECTION TWO: RUNNING
TO RUN THE PROGRAM
1. from your home screen (Desktop)
2. press: Start + R
3. type the name of the program (variable name) as in SECTION 1:6, in my own case I typed: notepad++
4. click ok...
you are free to post your comment or questions!...
Tuesday, November 22, 2016
How solve x64bit not showing in Virturalbox and VM Ware Problem
A lot of people do get across this problem of their system not showing
x64bit among the list of OS in their VIRTUALIZATION SOFTWARES or Not
Functioning, and blame their OS, Processor, the system manufacturers, the
software and so on.
well this problem is mainly because of these three factors
● The Virtualization Technology is off from you BIOS
● The Virtualization software (Virtual Machine or Virtual Box) version is 32bit only.
● The Microsoft Virtualization software (Hyper V) is enabled
Virtualization Technology (VT), also known as Vanderpool, this technology enables a CPU to behave as if you have several independent computers, in order to allow many OS (operating systems) to run at the same time on same computer.
x86 = 32bit = i386
x64 = 64bit
What causes you to see 32bit list of operating system without the 64bit, while you have 64bit OS running.
let's take these problems one after the other
○ Turn off your computer completely
○ power it on
○ look for the appropriate button to press for BIOS menu, as show in most boot screen "X" = boot menu
○ "X" represent the key indicate in your own boot screen, like in mine is F2
○ After getting to boot menu check under security or Advance settings or any other tab there for "Virtualization Technology" if using intel also for "Intel Virtualization Technology"
○ use the appropriate button of enabling and enable it
○ press F10 to save changes and Exit
This problem is not common in Windows version of Virtualbox, because they kind of have virtual box that work for both 32 and 64 bit,
but for those of you using other operating systems, especially Linux you will need to download the 64bit version
of the Virtualbox before it could run 64bit OS virtually, so click to download the x64bit as indicated in the picture below
[ HYPER V ] VIRTUALIZATION SOFTWARE IS ON
● Click on start menu
● type: "program and features" to search
● click to open "program and features"
● on the left side of the windows look for "Turn Windows features on or off"
● click on it
● uncheck "Hyper-V if " if checked.
well this problem is mainly because of these three factors
● The Virtualization Technology is off from you BIOS
● The Virtualization software (Virtual Machine or Virtual Box) version is 32bit only.
● The Microsoft Virtualization software (Hyper V) is enabled
Virtualization Technology (VT), also known as Vanderpool, this technology enables a CPU to behave as if you have several independent computers, in order to allow many OS (operating systems) to run at the same time on same computer.
x86 = 32bit = i386
x64 = 64bit
What causes you to see 32bit list of operating system without the 64bit, while you have 64bit OS running.
let's take these problems one after the other
VIRTUALIZATION TECHNOLOGY OFF
(How to turn on Virtualization Technology)
○ Turn off your computer completely
○ power it on
○ look for the appropriate button to press for BIOS menu, as show in most boot screen "X" = boot menu
○ "X" represent the key indicate in your own boot screen, like in mine is F2
○ After getting to boot menu check under security or Advance settings or any other tab there for "Virtualization Technology" if using intel also for "Intel Virtualization Technology"
○ use the appropriate button of enabling and enable it
○ press F10 to save changes and Exit
VIRTUALIZATION SOFTWARE IS 32bit
(How to get 64bit VM)
This problem is not common in Windows version of Virtualbox, because they kind of have virtual box that work for both 32 and 64 bit,
but for those of you using other operating systems, especially Linux you will need to download the 64bit version
of the Virtualbox before it could run 64bit OS virtually, so click to download the x64bit as indicated in the picture below
[ HYPER V ] VIRTUALIZATION SOFTWARE IS ON
( How to turn off Hyper V )
● Click on start menu
● type: "program and features" to search
● click to open "program and features"
● on the left side of the windows look for "Turn Windows features on or off"
● click on it
● uncheck "Hyper-V if " if checked.
Saturday, November 19, 2016
USING THE ATTRIB COMMAND TO HIDE AND UN-HIDE FILES/FOLDERS
_______________________________________________________________________
ATTRIB
===============================================================
After studying this command you come to understand the operation of common viruses
hides you files and folders in your removable media (Flash disk, Hard Disk and so on).
And also learn how to unhide the hidden files manually using the attrib command.
Displays or changes file attributes, that also include making file/folders visible or hidden
ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H]
Command Pattern [drive:][path][filename] [/S [/D] [/L]]
Example
c:/tutorial/test.txt
c: represents drive:
/tutorial/ represents path
filename represents filename
+ Sets an attribute.
- Clears an attribute.
R Read-only file attribute.
A Archive file attribute.
S System file attribute.
H Hidden file attribute.
Specifies a file or files for attrib to process.
/S Processes matching files in the current folder
and all sub-folders.
/D Processes folders as well.
USAGE EXAMPLE
attrib +h *
attrib - is the command for the attribution of files or folders
+ - indicates the action should be postive, that is make active
h - means to hide
* - star or wildcard it a character that indicates that, the action should include everything
within that folder.
HIDING FILES USING THE ATTRIB COMMAND
UN-HIDING FILES USING THE USING THE ATTRIB COMMAND
Command
attrib +h *
attrib - is the command for the attribution of files or folders
- - indicates the action should be Negative, that is make deactivate "h"
h - means to hide
* - star or wildcard it a character that indicates that, the action should include everything
within that folder.
Note: you can only hide and unhide folders by using the ( /s /d ) switches.
USEFUL ATTRIB COMMAND
attrib -s -h -r /s /d *.*
This command will show all the hidden files hid by virus in your removable media.
But before running this command you will need to change the command execution
folder to the removable media path. If your removable media is F: for example, you will need to
use the command F:
cd means change working directory/folder and F: is the device drive letter, that is the path or location
After doing this the command prompt will change its location to my removable media "F"
Print PDF
Thursday, November 10, 2016
INTRODUCTION TO MICROSOFT WINDOWS COMMAND PROMPT
A command prompt is an entry point for typing computer commands in the Command Prompt window. By typing commands at the command prompt, you can perform tasks on your computer without using the Windows graphical interface.
The command line interpreter application Command Prompt is officially called Windows Command Processor but is also sometimes called the command shell or by its filename cmd.exe.
HOW TO LOCATE AND OPEN COMMAND PROMPT
- Click on start icon
- Type “command prompt” or “cmd” without quotes
- Click on Command Prompt from the search result
- To run Command Prompt as Administrator you need to
- Right click on the application
- And click run as administrator, to
- As shown in the figure below
REFERENCE
https://windows.microsoft.com/en-ie/windows-vista/open-a-command-prompt-window
https://en.wikipedia.org/wiki/Cmd.exe
Sunday, May 22, 2016
ComputerSecurityStudent (CSS)
ComputerSecurityStudent(CSS)
Computer
Security Student, LLC is pleased to offer a unique training
certification in "Hac-King-Do (HKD)", which is a "Cyber
Security Martial Arts Framework."
Hac-King-Do bridges the gap between theory and actual hands-on experience. Computer Security Student, LLC offers hundreds of technical labs in the following subjects:
1) Building, Installing and/or Securing Operating Systems: Fedora, Ubuntu, CentOS, BackTrack 5R1, Kali, Windows XP, Windows 7, Windows 2K8, and more.
2) Installing and Securing Applications: SSH, Apache, Samba, NFS, Mail, DNS and more.
3) Performing Penetration Testing against both Operating Systems and Applications.
4) Performing Vulnerability Assessment against both Operating Systems and Applications.
5) Illustrating the following exploitation techniques: Password attacks, Trojan Horse Creation, Social Engineering, Buffer Overflows, Backdoors, Rootkits, Zero-Day Vulnerabilities, Web Injections, Man-in-the-Middle Attacks, and much more.
6) Performing Web injection techniques against the following capture the flag web applications: DVWA, Mutillidae, and bWAPP.
7) Performing Forensic Analysis and Assessments against the above Operating Systems and Applications.
Computer Security Student, LLC provides assistance and help through a unique ticket system that allows the student to show the administrator exactly where the issue is taking place. Please go to the following link to see the curriculum in its entirety.
# Hac-King-Do Curriculum
http://www.computersecuritystudent.com/START/HOWTO/lesson9/index.html
Hac-King-Do bridges the gap between theory and actual hands-on experience. Computer Security Student, LLC offers hundreds of technical labs in the following subjects:
1) Building, Installing and/or Securing Operating Systems: Fedora, Ubuntu, CentOS, BackTrack 5R1, Kali, Windows XP, Windows 7, Windows 2K8, and more.
2) Installing and Securing Applications: SSH, Apache, Samba, NFS, Mail, DNS and more.
3) Performing Penetration Testing against both Operating Systems and Applications.
4) Performing Vulnerability Assessment against both Operating Systems and Applications.
5) Illustrating the following exploitation techniques: Password attacks, Trojan Horse Creation, Social Engineering, Buffer Overflows, Backdoors, Rootkits, Zero-Day Vulnerabilities, Web Injections, Man-in-the-Middle Attacks, and much more.
6) Performing Web injection techniques against the following capture the flag web applications: DVWA, Mutillidae, and bWAPP.
7) Performing Forensic Analysis and Assessments against the above Operating Systems and Applications.
Computer Security Student, LLC provides assistance and help through a unique ticket system that allows the student to show the administrator exactly where the issue is taking place. Please go to the following link to see the curriculum in its entirety.
# Hac-King-Do Curriculum
http://www.computersecuritystudent.com/START/HOWTO/lesson9/index.html
-
Mission
To
provide Students and Cyber Security Professions with hands-on
training, that is equivalent to the popular industry
certificates, for a very affordable price.
Why spend $3000 for just one week, when you can spend $10 a month for 3 times as much content?
Why spend $3000 for just one week, when you can spend $10 a month for 3 times as much content?
-
Price Range$10
-
ProductsComputer Security Hands-on Lessons, Step by Step Directions, and unlimited assistance.
-
Emailcomputersecuritystudent@gmail.com
-
Websitehttp://www.computersecuritystudent.com
1.
LinkedIn (https://www.linkedin.com/pub/);
2. Twitter (https://twitter.com/HKD_); and on
3. Facebook (https://www.facebook.com/).
2. Twitter (https://twitter.com/HKD_); and on
3. Facebook (https://www.facebook.com/).
Subscribe to:
Posts (Atom)