Saturday, 23 September 2017

Linux Instructions

Download the architecture-appropriate file above, save it somewhere, then run one of the following two commands to extract the package archive:
tar -xvJf tor-browser-linux32-7.0.5_LANG.tar.xz
or (for the 64-bit version):
tar -xvJf tor-browser-linux64-7.0.5_LANG.tar.xz
(where LANG is the language listed in the filename).
Once that's done, switch to the Tor browser directory by running:
cd tor-browser_LANG
(where LANG is the language listed in the filename).

To run Tor Browser, click either on the Tor Browser or the Tor Browser Setup icon or execute the start-tor-browser.desktop file in a terminal:
./start-tor-browser.desktop
This will launch Tor Launcher and once that connects to Tor, it will launch Firefox. Do not unpack or run TBB as root.

Deep Web Sites 2017 | Dark Web | Deep Web Links | Hidden Wiki

Before stepping into the concept of the Deep web? You might have come across these terms Deep Web Links 2017, Dark Web, The Hidden Wiki, Invisible Web, Darknet, Deep Web Video Sites, Deep Web Pages, Deep Web Sites, Deep Web Sites, Tor Deep Web Links, Links Deep web websites, Uncensored Hidden Wiki, Links Da Deep Web 2017, Tor Hidden Wiki Links, Tor Directory, Darknet Marketplace 2017 and so on.
Everything should have a starting point, and it all began with “Deep Web” and “Dark Web”. This website is mainly dedicated to the one and only sole reason to know about how and what deep web is all about. We a young team of Researchers started working for bringing everyone this undiscovered and mysterious world of the dark web into light. Any user can wander into deep web but the correct tactics and methods are essential to make yourself anonymous(For Protection) and from time to time users have been facing some difficulties to access deep web so here is a solution in the tutorials below.
Deep Web is something big that you can’t imagine, which is hidden in the dark side of the internet whose contents are not indexed by any standard search engines like Google or Yahoo or Bing.
According to the reports, only a 4% of the web is visible to the public and the rest of the 96% the web are hidden under the darkness. It is like the iceberg where you can see only a few portion of it and the rest are hidden underneath. The visible web is called “The surface web” and the hidden web is called as “The Deep Web”. But the deep web is more dangerous to handle, see why?
The deep web sites
This also includes “The Dark Web” which is a subset of the deep web. The dark web is only a part of the deep web and it is not crawled by any search engine spiders.
You cannot simply access this deep/dark web from a normal web browser but it is possible by using a deep web browser (anonymity tool) like Tor, I2P or Freenet.
The Dark Web is much smaller than the Deep Web and is made up of all different kinds of websites that sell drugs, weapons and even hire assassins. These are hidden networks avoiding their presence on the Surface Web, and its URLs are tailed up with .onion. These .onion domains are not indexed by regular search engines, so you can only access Dark Web with special software called ‘The Onion Browser,’ referred to as TOR.
Related: Why you need Tor? What are its benefits?
Among these anonymity tools, Tor is one of the best browsers that you can pick to access the dark deep web Links. People use this hidden web sites for buying drugs and other illegal items from seemingly untraceable. It is also used by “people who need to remain anonymous on the web”. If you are using the deep web for illegal content, then you may get busted only in the case of lacking security.

How do I access the Deep Web?

It is not as tough as you think. But, you can’t just access the deep/dark web like a normal web using a normal browser despite your need to use an anonymity software like Tor, which only accesses .onion links. Using Tor browser, you can browse the deep web anonymously. But, that doesn’t enough, you need an extra protection to secure your identity on the invisible web. Because it contains dangerous links which may breach the security.
Step to access the deep web:
Step 1: To access the deep web, you need to have a Tor browser on your system.
Step 2: First, Download Tor.
Step 3: After downloading the Tor bundle, you need to install them on your system.
Step 4: Click to open the downloaded file to start the installation process.
Step 5: Follow the installation guidance to complete the process.
Step 6: Once you have installed Tor, open it.
Step 7: Now, you can access the deep web using Tor browser.
Step 8: This isn’t enough, your privacy is not completely secured. To double your security, you must have an advanced VPN service on the system that you access the deep/dark web.
For more detailed description, please visit this page.
Anonymity Tips:
  • Don’t trust anyone out there in the deep web.
  • Cover your webcam.
  • If you try to visit the deep web links, then you must be protected by a VPN + Tor.
  • Before visiting the deep web, ensure that an extension in tor browser called “NoScript” is turned on and enable this option “Forbid Scripts Globally
  • If you want some extra protection (or maybe), type “about config” in the address bar, scroll down to “javascript_enabled” and change the value from “true” to “false”.
  • It is possible to track your IP address if you try to access the Deep/Dark web sites without using our recommended VPN. Don’t land in trouble by using a free VPN too. Be safe and Be Anonymity online. Get the best VPN service now.
  • Last but not the least, after opening hidden wiki, it is strongly recommended that you read an article named “How to exit the matrix”.
To protect yourself from tracking your IP address, I recommend you to run a Powerful VPN on your system before you access the deep web. If you access the site without any premium VPN, then you may land in trouble. Some may track your IP address location from which you access and catch you for accessing illegal content on the web against the Law. By using Tor + VPN, you can protect your identity and communication from state and private surveillance like whistleblowers and journalists.
When someone starts to speak about “Deep Web,” you might have come across some words like silk road, dark markets, Tor browser, bitcoin, illegal drugs, etc.,
Take a tour of the deep web and the dark web search engines here:
Deep Web Search Engines 2017
Dark Web Search Engines 2017
Use these search engine to access .onion links via Tor. You know what? the deep web is otherwise called as “The Invisible Web” or “The Hidden Web”. The underworld darkness is here. Get to know more about it.

Why is the Deep Web not indexable?

There are several methods that prevent web pages from being indexed by traditional search engines. I have categorized them for your reference below.
  • Contextual Web: Pages with content varying for different access contexts.
  • Dynamic content: Dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements are used; such fields are hard to navigate without domain knowledge.
  • Limited access content: Sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies).
  • Non-HTML/text content: Textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines.
  • Private Web: Sites that require registration and login (password-protected resources).
  • Scripted content: Pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions.
  • Software: Certain content is intentionally hidden from the regular Internet, accessible only with special software, such as Tor, I2P, or other darknet software. For example, Tor allows users to access websites using the .onion server address anonymously, hiding their IP address.
  • Unlinked content: Pages which are not linked to by other pages, which may prevent web crawling programs from accessing the content. This content is referred to as pages without backlinks (also known as inlinks). Also, search engines do not always detect all backlinks from searched web pages.
  • Web archives: Web archival services such as the Wayback Machine enable users to see archived versions of web pages across time, including websites which have become inaccessible, and are not indexed by search engines such as Google.

What does the Deep Web Contains?

I have listed out some of the rare things found in the hidden dark world. See below.
  •  Mail Order Marijuana
  • Silk Road
  • Hitman Service
  • Buttery Bootlegging
  • The Human Experiment
  • Weapons
  • Credit Card Information
  • Betting on Fixed Sporting Events
  • The Hidden Wiki
  • Recent Developments

Why do we need to securely browse the Deep Web?

I know we are all curious in finding what is in the deep web but there have been many deep web stories noting the cautions and security problems that might arise if you use them. Have you ever heard some of the deep web facts ?. The deep web is the place where anonymity is the key factor. For one to stay anonymous he must do these following things. First, you must install the Tor Browser (Step-by-Step Instruction guidelines are given).
To prevent the theft of your personal data and avoiding data breach we strongly recommend you to Setup a VPN to hide your IP or Buy these Best VPN Directly. Hidden Wiki links are the best place to start for the newbies. Get to know how to register and purchase from various Darknet markets. In order to purchase from these markets, you need to buy bitcoins from top bitcoin vendors.
The Deep Web team strongly recommends you to buy these Top VPN to surf the deep web safely. Be Anonymous.

Table of Content

  1. Deep Web
  2. Darknet
  3. Secrets of DarkNet
  4. Tor Browser
  5. Deep Web links
  6. Bitcoin
  7. Deep Web News
  8. Deep Web Infographics
But, the First and foremost thing you should know before exploring this vast ocean of deep dark web is

Deep Web History:

The Deep WebDeepnetInvisible Web,  Hidden Web are search terms referring to the content that is not indexed by standard search engines. We all know only the things shown to us, i.e., called as “surface web” it is about 19 TB which is only a small part of the original world wide web.The greater part is hidden down with a size of about 7500 TB and guess what? It’s still expanding.

Monday, 10 July 2017

Miracle Box Eagle Eye Update Version V2.24 Latest Setup Download

Miracle Box Eagle Eye Update Version V2.24 Latest Setup Download

Its not a crack its original box software you can free download from here.

Miracle Box Eagle Eye Update Version V2.17 Latest Setup Download 01


Miracle Box Eagle Eye Update Version V2.17 Latest Setup Download 02



MIRACLE
EAGLE EYE
BOX

What New in Update: Version 2.24
★1.Samsung FRP-2 Unlock Added More Models.
★2.Samsung Improve Read PIT and Write Flash.
★3.MTK Add Meta Mode New Method (Support 6595,6732,6735,6795).
★4.MTK Improve IMEI Repair In Meta Mode.
★5.MTK Improve Network Unlock (6572).
★6.MTK EMMC Add Remove Virus (No ADB, No Root).
★7.SPD Add SP Unlock (Beta).
★8.SPD Improve EMMC Read.
★9.Android Add Virus Cleaner (Take Time So Need Wait).


Miracle Box Eagle Eye Latest Setup V2.24 Download

Miracle Box Mobile Driver Pack All in One Download

Volcano Box Merapi Tool v1.4.7 Latest Setup For Windows Download

Volcano Box Merapi Tool v1.4.7 is 2016 released recently and now it has been avail to free download. Merapi Tool box service tool full setup installer official download link is given at the end of below post. You can download Merapi Tool v1.4.7 original tool not a crack by following or clicking on the provided downloading link.
All Chinese android phones mtk, spd, Flash unlock/ pattern lock reset, adb root full support in Merapi Tool v1.4.7
VolcanoBox Team's MerapiTool is World's Best Forensic Tool, Which can Recover Deleted Data, Extract Current Data, Extract Call logs, Sms & Much More.
Volcano Box Merapi Tool Latest Setup For Windows Download
Volcano Box 1.4.7 Merapi Tool Full Installer

What's New ?


Added World's 1st Unique solution for FRP
Special Thanks to Real ASH & Hassan.
Improvements
Read Factory file
Virus Clean Tool
Some log for better understand
Modification
Some logs are changed to better understanding.
About FRP
FRP Solution is Very Unique Solution for Tons of phones. can't every count of supported numbers, but it's Support Almost all devices running with Qualcomm MSM 8909 Cpu.This method also can be useful for other Cpu as well but you have to try at your own risk as it's universal solution and Volcano Merapi Team will not Liable of any damage to your device by this, But this solution is every EXCLUSIVE & Not yet added by any team and very usefull.

GPG Dragon Box Latest Version Setup free Download

GPG Dragon Box latest updates version V3.53c is released and it has been avail to free download directly without. This is latest updated setup for Dragon flashing box. Dragon box latest updates you can completely free download from here and you can also download Dragon box latest update on its official website.

1.All SPD Nor Format Add New
*SPD 6610/20 6600L/WT6226 6530 6531 6500 & More
2. Free SPD IMEI Tool (separate)
3.Some Bugs Fix

GPG Dragon Box Latest version V3.53c Download

GPGDragon V3.53c Last Update Free Download Here
DOWNLOAD LINK: Click Here

GPG Dragon box allow you to flash your dead Chinese mobiles easily. You can flash all type of Chinese easing by using Dragon flashing box. Before flashing your cell phone don't forgot to get backup of your important data, Because after flashing your all important data will deleted, and you can,t get it again.
Use working flash files your selected cell phone. We do not guarantee the compatibility or accuracy of any of the files. So use them at your own risk.

Advance Turbo Flasher (ATF Box) Latest Version Setup Free Download

Atf flasher new setup installer update version v12.60 download. Atf flashing box new setup installer new update you can free download from here. New and updated download link for atf flasher setup installer is given at the end of this post. You can download full setup installer for atf flashing software by following the provided download link. atf box flash windows phone
Advance Turbo flasher ATF V12.34 Full Installer Setup Download






ATF 12.67 AutoUpdate

Release Date: February 26, 2016

** YOU CAN ONLY DOWNLOAD THIS VIA THE AUTO-UPDATE SERVER **


This update addresses ATF Nitro/Lightning New Box Activation Problems due to bad DNS in certain countries.

Nothing else was changed.

Download this update if you have Activation Problems ONLY.


B.R.
X-Shadow



ATF 12.66 AutoUpdate

Release Date: February 15, 2016

** YOU CAN ONLY DOWNLOAD THIS VIA THE AUTO-UPDATE SERVER **




eMMC Tool 5.00 (PRO)
--> Added Support for eMMC Flashing (Direct Write) for Samsung Exynos 7 Octa 7580 Based Phones
Check Tutorial Here for SM-J700:
Samsung SM-J700F/H/K/M/P/8 BOOT Repair via eMMC Flashing

Samsung SM-J7008
Samsung SM-J700F
Samsung SM-J700H
Samsung SM-J700K
Samsung SM-J700M
Samsung SM-J700P
8/F/H/K/M/P
Samsung SM-A310F
Samsung SM-A310M
Samsung SM-A310N0
Samsung SM-A310Y
Samsung SM-A5108
Samsung SM-A510F
Samsung SM-A510K
Samsung SM-A510L
Samsung SM-A510M
Samsung SM-A510S
Samsung SM-A510Y
Samsung SM-A710F
Samsung SM-A710K
Samsung SM-A710L
Samsung SM-A710M
Samsung SM-A7100
Samsung SM-A710S
Samsung SM-A710Y
Samsung SM-G903F
Samsung SM-G903FD
Samsung SM-G903M
Samsung SM-G903W
Samsung SM-T670
Samsung SM-T677A
Samsung SM-T677K
Samsung SM-T677L
Samsung SM-T677V

--> Now you can Repair DEAD BOOT Repair these phones via eMMC Connection.
--> Just Download the NEWEST Firmware from www.s-a-m-m-o-b-i-le.com and WRITE it
--> to your phone via eMMC Connection. This will repair both BOOT1 and BOOT2
--> Partitions.


Image Tool - Samsung Unbrick Image Creator 3.0
--> Added Support for 4 More Exynos CPUS:

Samsung Exynos 7 Octa 7580
Samsung Exynos 5 Hexa 5260
Samsung Exynos 4 Quad 4415
Samsung Exynos 3 Quad 3475

--> Now you can Create SD Card Unbrick files for phones Based on these CPUs.



================================================

Release Date: February 5, 2016

Firmware Version Required : 11.0.10 or 11.0.12
ATF Box USB Driver Required: 2.12.06 - Windows 10 (32-bit and 64-bit) - Available in Windows Driver Update Server
ATF Box USB Driver Required: 2.12.06 - Windows 8.1 (32-bit and 64-bit) - Available in Windows Driver Update Server
ATF Box USB Driver Required: 2.12.06 - Windows 8 (32-bit and 64-bit) - Available in Windows Driver Update Server
ATF Box USB Driver Required: 2.12.06 - Windows 7 (32-bit and 64-bit) - Available in Windows Driver Update Server
ATF Box USB Driver Required: 2.8.30.0 - Windows XP (32-bit and 64-bit)



Introducing the EASIEST Method to DOWNLOAD the NEWEST Lumia Firmware Files... NaviSearch!

Lumia Firmware Search and Download

* Very Simple Interface, select via Variant List or Product Code List
* Complete Variant Packs (Product Codes) of all Lumia phones including Lumia 950 XL, 950 and 550.
* Download via ATF Built-in Downloader or Export Download List to your favorite Download Managers
* Download STOP and RESUME Function
* Automatically verifies Downloaded File Checksum
* File Download is done in the background... You can flash phones etc while downloading files.

*** FOR NOW, NaviSearch is only Enabled for LUMIA PHONES. It will Enabled in the future for older BB5 Phones ***



New Phones Supported for Dead Boot Repair via USB Cable Only
(Most of these Models are First in the World)

Lumia 950 XL (RM-1085)
Lumia 950 XL DS (RM-1116)
Lumia 950 (RM-1104)
Lumia 950 (RM-1105)
Lumia 950 (RM-1118)

Lumia 550 (RM-1128)
Lumia 550 (RM-1127)

Lumia 640 LTE DS (RM-1113)
Lumia 640 DS DTV (RM-1109)
Lumia 640 DS (RM-1077)
Lumia 640 LTE DS (RM-1075)
Lumia 640 (RM-1073)
Lumia 640 LTE (RM-1072)
Lumia 640 XL DS (RM-1067)
Lumia 640 XL (RM-1066)
Lumia 640 XL LTE (RM-1062)

Lumia 1030 (RM-1052)
Lumia 1030 (RM-1051)
Lumia 1030 (RM-1050)


Lumia 820 (RM-826)
Lumia 625 (RM-943)

If you are downloading atf software old setup on you pc then you atf flashing software is require to an update. You can update or download atf flashing box full installer by the given downloading link. Follow the below official download link to download or update ATF flasher software now.

IDM Crack And Fake Serial Number

Before getting in to the post we suggest you to turn off the internet connection and try these keys.

Turn Off Your Internet Connection and Apply Any one these Keys to Work Properly

629U7-XLT5H-6SCGJ-2CENZ
L67GT-CE6TR-DFT1D-XWVCM
XONF7-PMUOL-HU7P4-D1QQX
F9TZ9-P6IGF-SME74-2WP21
CJA0S-K6CO4-R4NPJ-EKNRK
N0Z90-KJTTW-7TZO4-I27A1



Ok Now Let us Provide You Some Working IDM 6.23, IDM 6.25, IDM 6.27, IDM 6.26 IDM 7.1 Serial Keys and 2 Methods to Solve Fake Serial Number Fix :)



Note: First name, Last name and email may be anything.



Methods to Solve Fake Serial Number Fix:

Method 1: Fake Serial Number Fix 1 (Works for me perfectly)




Method 2: Fake Serial Number Fix 2

Follow This Link: http://internetdownloadmanagerserialkeys.blogspot.com/2014/10/idm-fake-serial-number-problem-new.html




Purchase Structured Settlements, Mesothelioma Lawyers San Diego, Secured Loan Calculator, Structured Settlement Investments.
Like This Post? Please share!
Subscribe through email and get Free updates

Wednesday, 1 March 2017

how to facebook recover without gmail and mobile number

Steps of Penetration Testing

l Right all right. now we all know “what is Penetration Testing?”, “Why it is needed?”. Now its time for ‘How it is done?’   

There are four basic steps of Penetration Testing…….Well the fifth one is filing the report but you don’t need to know THAt!! SO, 5 steps of awesomeness. These steps area  as follows:
  1. Information Gathering  : The more you know about the target, the more easily its going to be for you to influence him. The easier to influence will in turn make you avail to more information, and more influence and more information and on and on and on until you know everything about that target……..OH LOOK!! YOU HAVE A LIFE PARTNER NOW!!Gathering Information

  2. Scanning                              :  Information is gathered at  first, now you gotta find out the information available for that moment. That is accomplished by scanning. it is used to know whether the host is up, which port is open and then finding vulnerability a structural weakness if you will. No system is invincible, there is a kryptonite for every superman. THAT’s what the purpose of scanning is, finding the superman system’s kruptonite.  Vulnerability_Scanner

  3. Sniffing                                  :  Its more like a blood hound activity, finding the weakness and sniff out whatever you can from the cracks or in the system’s case passwords, usernames, secrets normally anything not everyone would want you to see. in kali sniffing techniques include wireshark, ettercap etc. Then the companies will ask you to fix this, and yo ass get paid.Sniffing

  4. Exploitation                        :    Now the stage is a set, you know the info, the weaknesses, the passwords. Its now time to whoop them up for action. Expliotation deals with exploiting whatever the attacker has gathered in the last 3 steps and then explioting the system, or the organization. Its the final test that a Pen-Tester use to look down on companies and say”YOU ARE WEAK!!” and then the companies ask them for tips on how to fix it.  hacker
Nothing in the world is impenetrable, Invincibility is an illusion used on the people so they can look the other way and get their ass handed to them”

whois command for dns lookup in Kali Linux

What is Whois command?

A whois command is a utility as a part of the information gathering used in all of the Linux-based operating systems. this tool is part of information security assessment, and one of  information gathering techniques.  there are a lot of  information gathering strategies. It is used to identify domain information and more.
  • Unknown and distant hosts
  • Networks
  • Even Netadmins if you use the command the right way and you are lucky enough
IN TECHNICAL TERMS:
“WHOIS is a database managed by local internet registrar, availing to us the personal information about the owner for example`: his contact details, his organization, and his IP as well as his geographical location ” we can use whois command to retrieve that information. 

The usage of whois command

The usage of the ‘whois’ varies widely from system to system, but nevertheless, a common ground is established where you have yo give the IP address after the command. The usage of the command in Kali Linux systems is as follows:
whois <ip address/name of the website you want to access the information to>
for example   
whois 74.125.68.106
whois ip address
or
whois www.google.com
whois site name
In the above pictorials, you note one thing==> whois command is behaving differently for IP address and site name
  • For the IP addresses, the information is much more substantial. Here you got addresses, phone numbers, organization handles and everything
  • For the site name, you got the server name registrar and the referral URL which is of course for the whois command. as you can notice that the information is certainly less substantial but fun and relevant if you are just starting.
Typing   whois –help will grant you further information on the command on the Linux itself.
whois help

The modern versions of whois try to guess the specific object. If no conclusive result is found the query goes straight to whois.arin.net for ipv4 addresses(like we can do anything with ipv6 just yet!! huh SARCASM) or whois.networksolutions.com for NIC handles. Basically, NIC is network interface controller used to connect the computer  to the computer network. Further information is available on the WIKI(The blue link I gave).


“If you are in love with someone, that someone is not obliged to love you in return. that person could be a bitch, male or female really doesn’t make a difference.”

How to use dig command in Kali Linux

What is dig command?

The ‘dig command‘ is used in network administration that check and lookup domain name server (DNS) It is dnssec and the part of information gathering.
Well further can’t be discussed much until I give you the definition of name servers….until then everything I say will be moot.

What is domain name server?

A name servers is a software and hardware server that provides provides a network service present at the application layer of the OSI model response  the queries against a directory service. The server component of the domain name system is the perfect example of that. Its job is to translate the ip address from the domain names provided.
So, bottom line dig is the shorthand of domain information groper (dig command), it uses DNS (Domain servers) lookups and gropes the information from the name servers.Why didn’t they use grabber is beyond me!!
So now the usage of this command in

Usage of the dig command.

First on the terminal use the command
dig -h
This command would show all the options used in dig
dig 1

In the similar way many of the given commands can be used. For eg, lets use authority now.
dig authority www.google.com
dig 2

in the above command, the result indicates that the authoritative search went from ns2->ns1->ns4->ns3, that means name server 2 have more authority over the search according to the context of the domain name over name server 1.
Now lets fool around with some other commands
dig nssearch www.facebook.com  **searches for name servers**dig 3

dig additional www.facebook.com **controls all additional queries **dig 4
dig nsid www.facebook.com ** searches for the name servers ID**
dig 5
Similarly , there are other options that can be used for several other purposes. Here we go folks yet another command prominent in information gathering.

Why in the DNS enumeration we need dnsenum?

Just like previous tools this is also used for the purpose of gathering information. This is used if we require to access whatever scraps and metal information of the domain sites that we can. What it basically does is enumerates the  DNS enumeration (Information)  about domains. Its a neat way to say that , it provides more organized shit we want to know about the domain. So neat+enumeration+info= YO ASS NEEDS dnsenum. Now, before I carry on let me tell you a little about information……WHAT IS ENUMERATION?? I have no intention of insulting you, I didn’t even catch the meaning of ‘ DNS enumeration’ the first time it fell on my ears.
Enumeration means uniquely identifying a sub-data within a larger Data.
usage:-
dnsenum [options] [domain name]kali linux
Further down
,kali linux 2
Now , let walk you through all the stuff that is happening above,
  • First, the query is going through all the google addresses , in a specific order. Now depending upon the availability of the addresses the order in which the query traverses is different.
  • Second is the wildcard detection. Now wildcards are basically a symbol that are used to represent multiple characters. the registry of the wildcard is stored in the somttneiwwyh. Its like throwing a drop of acid in water , It looks the same , it feels different now the look is the wild card here that can define both the acid and the water as a single substance , but seeking the registry it can detect the difference.Depending upon the number of subdomains the Wildcard registry is different.
  • The third query is the name-servers , what NS are present in google. depending upon how well google is secured, we may find nothing at all. Now, number of name serversnis equal to the number of subdomains.
THAT IS ALL ABOUT DNSENUM FOLKS!! FOR MORE INFO. GIVE THE OPTION IN THE SYNTAX AS -h TO FIND THE APPROPRIATE HELP THAT YOU NEED.

Life and lies go hand in hand, one cannnot live without another, I mean come on, telling truth ain’t fun at all’

Update and Upgrade Kali Linux

Hey, first check Kali Linux version and then update and upgrade Kali Linux. As we know Offensive security always released a newer version of Kali Linux.  The newer version fixes bugs and the latest kernel, latest tools, and sometimes adds new tools.  There are two terms update and upgrade. In update, advanced package tool (APT)  fetched headers data of available tools on the repository and saved into a local drive.

How to check Kali Linux version

#lsb_release -a
check Kali Linux version
Update Kali Linux can be performed by the following command
# apt-get update
or
$ sudo apt-get update 
In Upgrade, apt install a newer version of tools and removed the older version. It upgrades only tools.
# apt-get upgrade
$ sudo apt-get upgrade
Upgrade Kali Linux
To upgrade newer version of Operating System use the following command
# apt-get dist-upgrade
# sudo apt-get dist-upgrade 

Upgrade kali linux Operating System

Do you like this post? please comment below. if you have any question, let me know in the comment box.
Cheers!

Create a Kali Linux bootable USB for live use

Kali Linux bootable USB drive is very used fully for Penetration testing of an organization by Pen tester. With the help of this drive, you can boot the computer from Kali Linux without installing it. Do you think it’s amazing? May be but true. Here one more important thing you can make your ownyes you can! I am going to describe complete process step by step.
USB memory devices, frequently alluded to as thumb drives and numerous other names, are simply a USB drive that is joined by a USB interface to the computer. For the creating kali Linux bootable USB Drive needs at least 8gb of space, ideally a great deal more. New computer can boot to USB Drive. In the event that this option is chosen make sure that the computer being utilized can help booting from a USB device.win 32 disk imager Kali Linux bootable pen drive
Concerning thumb drives being utilized as bootable gadgets, there are two key terms that are extremely vital: industriousness and nonpersistence. Ingenuity alludes to the capability of your gadget to hold any composed or changed records after the machine is controlled off. 
Nonpersistence alludes to the drive losing all setting, customizations, and records if the machine reboots or is shut down”.
The thumb drive of Kali Linux from a Windows Platform will be non persistent, and the establishment from a Linux stage will be persistent.

Windows (Nonpersistent)

Requirement for thumb drive installation of Kali Linux

1: Win32 Disk Imager download from here http://sourceforge.net/projects/win32diskimager/
2: Required space of Pen Drive is at least 8 GB.
3: Download  latest Kali Linux ISO file.
Put a thumb drive in the figure and permit it to consequently be discovered by Windows, observing the drive letter assigned.
Follow the given instructions:
Step 1: Install Win32 Disk Imager.
Step 2: Open Win32 Disk Imager.
Step 3: Click on the folder symbol and find the location for Linux DVD ISO image.
Step 4: Choose the appropriate letter of Pen Drive, Click on the write way
Install Kali Linux on Flash Drive by win 32 disk imager
After some time iso written into Disk is completesuccessfile
the right drive letter from the gadget drop-down menu. At long last click the
“Compose” catch.
At the point when Win32 Disk Imager has finished smoldering the ISO, reboot the machine furthermore select the thumb drive from the BIOS POST menu. Generally producers have diverse strategies for booting to USB gadgets; make sure to check the workstation producer’s documentation.

Easy Steps to change Kali Linux IP address

When it comes to windows everything just comes too easy. I mean you gotta work for that too but the sense of accomplishment just ain’t there. When it comes too linux, everything feels like an accomplishment. So now today folks I am gonna teach you how to change Kali Linux IP address. Who knows when it is useful? I don’t even touch it much, coz I am lazy like that so here is how to change the IP configuration.
  • Step 1 : Boot you linux system and on the desktop, right-click on the network icon==> Those 2 computer thingies on the top right==>Then click on edit connectionIpconfig_1S






Step 2 : You will see this Dialogue box. Click on the Add button.
  • Ipconfig_2











 Step 3 : The following dialogue box will appear that have already specified the connection name. Or you can rename it anything you like, name it Soul Sucking Pony if you like.
Ipconfig_3

  • Step 4   Click on Ipv4. Because Ipv6 is not used in common practice.
Ipconfig_4
  • Step 5 : Select the method as manual, because we hardworking, not lazy at all folks are making manual changes.Ipconfig_5
Step 6 :  Put the address , gateway and network, domain and so on
Ipconfig_7

  • A new Ip configuration will be formed.
    If you like this post dont forget to share on facebook and tweet on tweeter! why are you going to forget linkdin.

How to Add Kali Linux repository

At the time of updates and upgrades, by default Kali Linux checks only the application stored on its own data repository. This is good for the Kali users. Some updates an upgrades could make Kali Linux nonfunctional by this reason, all software are tested by the Kali developers before add Kali Linux repository. There are some third party application are not available on the Kali repository, in this case additional repositories may be needed to be add.
Step 1: Use leafpad or other text editor to open and edit /etc/apt/sources.list.
#leafpad /etc/apt/sources.list
Step 2: Add the following code into file and save the file
deb http://http.kali.org/kali kali-rolling main contrib non-free

Updating Kali Linux

Like other operating systems, Kali has the implicit capability to update both the operating systems and the software , or packages, installed. As upgrades to package get accessible, they will be presented on the Kali store. This store can then be checked to guarantee theoperating systems and provisions are up to date. Upgrades are typically more diminutive fixes that address software bugs, or errors, or are utilized to include new fittings competencies.Use the following commands to update system :
#apt-get update
Adding Repository in Kali Linux image 01

Upgrading Kali Linux

Like updating, upgrading Kali can likewise be carried out at the command line with the pt-get utility. Upgrades are regularly significant updates to requisitions or the working framework itself. Updates offer new usefulness and are much bigger that upgrades ordinarily obliging more of a chance and space on the System drive.
Syntax is here
#apt-get upgrade
Adding Repository in Kali Linux image 02
This entry was posted in Basics, Penetration Testing and tagged . Bookmark

Kali Linux Requirements to install on System

Before to know how to install Kali Linux operating System, You should know about Kali Linux requirements for installtion. At the point when introducing Kali Linux, as with other unix operating systems, arranging before establishment is essential. The following is a short arrangement of things to consider when introducing Kali Linux computer system. It is on of free operating systems.

Installation Prerequisites

  • A minimum of 20 GB disk space for the Kali Linux install.
  • RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
  • CD-DVD Drive / USB boot support
-Will the working framework be running on a desktop computer or laptop?
– What size hard drive is required?
– Does the accessible hard drive have sufficient space?
– what partitions of hard drive are required?
– Is log administration a worry?
– Is security a worry?Kali Linux System-Requirements

Selecting a Hardware Platform for Installation

Generally, Kali Linux, a free operating system for pc  is installed on the machine’s hard drive,
notwithstanding, with operating system, for example, Kali Linux, there is a capability to install the Kali Linux to thumb drives (flash drives) and SD cards. Don’t worry it can be installed on laptop, so it a laptop operating systems. Linux for laptop, seems good.
On the off chance that certain fittings, for example, high-powered graphic cards, will be utilized for finding passwords, it is suggested that the installation of Kali Linux be installed on a desktop computer. In the event that there is a need to convey the working framework from client site to client site, or there is a craving to test remote gadgets, a laptop is suggested. The isntallation of the Kali Linux is the same for laptop and desktop machines.

Hard Drive Selection

My proposal is drive with a least of 120gb of space; notwithstanding, even this can get full exceptionally rapidly, particularly on account of password finding and forensics or pentesting ventures that oblige a great deal of control over, proof, logs and report generation then again gathering.Hard-Drive selection for Kali Linux

Partitioning the Hard Drive

The Operating System is, at the fundamental level, officially broken into two separate partitions. The principal allotment is the swap region, which is utilized for memory paging and storage. A second parcel is assigned for everything else and is formatted with a document structure, for example, the extended file system 3 (ext3) or extended file system 4 (ext4).
For customized installations or workstations that will have a
more persevering operating system, there is a need to at any rate separate out the temporary (tmp) records.
Progressed apportioning of the hard drive and double booting a workstation are development, we will later about this topic.

Security During Installation

Kali Linux is an effective operating system with a plenty of preinstalled tools that can destroy computer, system foundation, and if utilized
disgracefully or unethically , can prompt movements that will be seen as criminal alternately law breaking. Consequently passwords are fundamental. While passwords are the most essential security rehearse, numerous directors and security experts frequently overlook or disregard the utilization of passwords. Essential security polishes for example, legitimate utilization of passwords are fundamental to guarantee that your establishmentsecurity for kali linux
System Information 11of Kali Linux is not utilized by other people who may incidentally or vindictively reason damage to an individual, computer, or system

2 commands only to install libreoffice in Kali Linux

LibreOffice is a software office for Linux distros similar as Microsoft Office in window Operating System. It is always free and available for all Linux flavor. To install LibreOffice in Kali Linux execute following commands in terminal
apt-get update
apt-get install libreoffice
or
$ sudo apt-get install libreoffice
Video Demonstration:

10 Steps ot install Kali Linux 2.0 Graphical on Hard Drive

Install Kali Linux 2.0 Graphical on Hard Drive

To accurately install Kali Linux on hard drive, or indeed boot to the live disk, it is basic that the Basic Input Output System (BIOS) be set to boot from optical disk. To start the installation, put the DVD in the computer’s DVD tray and boot the machine by Kali Linux DVD.

STEP 1# FIRST TIME SYSTEM BOOTING WITH KALI LINUX:

A computer booted to the Kali Linux DVD effectively will show a screen that seems to be like the figure. Kali Linux is distributed as a “Live CD” (otherwise known as Live ISO), which implies that the operating system could be run straight from the disk notwithstanding being installed to a hard drive. Running Kali from the live disk permits the system to boot and the majority of the instruments will execute; notwithstanding, the working system exhibited is nonpersistent. Nonpersistent implies that once the system is shut down, any memory, spared settings, reports, and potentially extremely imperative work or examination may be lost. Running Kali in a nonpersistent state takes extraordinary forethought, propelled taking care of, and not too bad understanding of the Linux orders furthermore working system.Hard Drive Installation of Kali Linux image1

STEP 2: INSTALL KALI LINUX – Setting the Defaults

The following few screens will permit the determination of the systems a default language, location, and keyboard language. Select the fitting settings and click on keep on advance the installer.

STEP 3: INSTALL KALI LINUX – Initial Network Setup

Figure subtle elements the introductory setup and essential arrangement of the essential system interface card. Pick a hostname by writing in the box and clicking on proceed. In the wake of selecting a hostname and clicking on the Continue catch, the following screen will request the computers’s completely qualified domain name, FQDN. For this guide, the FQDN was left purposefully clear and can be continue by selecting the Continue catch. Hard Drive Installation of Kali Linux image2

STEP 4: SETTING UP STRONG PASSWORD

The default password is: toor; however, it is suggested that another password is chosen that holds no less than one each of the accompanying: uppercase, lowercase, number, furthermore symbol. The password ought to have no traceability to the client and not be effortlessly guessed.

Hard Drive Installation of Kali Linux image3
Some case of solid password:

St0n(3)b@tt73 _ “Stone Battle”
_ P@p3r0kcur5# _ “Paper, Rock, Curse”
_ m!gh7yp@jjjama% h _ “Compelling Pajamas”

STEP 5: CONFIGURING THE SYSTEM CLOCK

The figure indicates the brief for selecting a time zone. Click on the suitable time zone and the click on the Continue button to advance on in the installation.

STEP 6: PARTITIONING DISK

There are such a large number of approaches to configure partitions for setting up a Linux working Systemthis aide will concentrate on the most essential establishment, Guided Partitioning. “Guided—client whole circle,” should be chosen. Click on the Continue catch to development through the establishment process. install kali 06install kali 07
An essential segment holding the majority of the system, client, furthermore scripting records will be made as one segment. A second parcel is made for swap partition. The swap range is virtual system memory that pages records back furthermore hence between the computer’s Central Processing unit (CPU) and rendom access memory (RAM). All Linux systems are recommened to have a swap area also the general practice is to situated the swap territory equivalent to or one and a half times the measure of physical RAM introduced on the machine.

STEP 7: CONFIGURE THE PACKAGE MANAGER

The package manager refers to the update repository where Kali Linux will force redesigns also security patches. It is proposed to utilize the system reflect that comes with the Kali Linux ISO as this will the most forward hotspots for bundle administration. Figure shows that “YES” will be chosen of course. Click on the Continue catch to development through the installation process.

STEP 9: INSTALLING THE GRUB LOADER

The Grand Unified Bootloader (GRUB) is the main screen that will be showed each time the computer is started. This allows the confirmation of specific settings at boot, roll out on the fly improvements, and make setting alterations before the working system loads. While GRUB is not essential for some developed clients, it is exceptionally prescribed for generally installation process.
Finishing the Installation install kali 08
Remove disk and reboot the system, click on the continue button to finish the installation. In the wake of rebooting, the welcome screen will be displayed. Log in as the root user with the predefined password set prior in the installation process.

STEP 10: Welcome to Kali Linux !!

How to install kali linux on virtualbox – Full guide step by step

Hello and Welcome on my blog,
I am happy to see you on my blog, after reading this full blog you will be able to learn “How to install kali linux on virtualbox” but one important thing is left do you know how create vritual machine for Kali Linux. if not go further information at  Virtual Machine for Kali Linux

Download Kali Linux OS (Operating System)

Kali Linux 32 and 64 bit ISO image file is available for download on Official website of Kali Linux. You can download by torrent,  so it is good news. Go HERE > https://www.kali.org/downloads/ .

How to install kali Linux on VirtualBox


Kali Linux Virtual Machine Requirements:

1. Installed Virtual box  on your system.
2. Kali Linux 2 Virtual Machine
3. Kali Linux ISO image File
Before starting to install you need to a little bit setting in you virtual machine first.
Step 1 Insert Virtual Installation CD/DVD of  kali Linux:
1. Go in settings of Kali Linux Virtual Machine.
2. Go in Storage > Controller: IDE > Select Empty
3. Click on CD icon in right side of CD/DVD drive: >choose a Virtual CD/DVD disk file >Click on it then new window will be popup.
4. Give the path of Kali Linux DVD image After adding virtual DVD in your Virtual Machine, It will ready to boot with Kali Linux live DVD.
How to install Kali Linux on virtual Box_image1
Step 2: Start your Virtual Machine and boot with DVD by clicking on start option available in top menu of Virtual box. After it you will be on the first screen of virtual machine boot with DVD.
Step 3: Now here you have many choice for selection so select install or Graphical install (both are some only difference of graphic interface) my recommendation is select Graphical install. After pressing Enter installation will be start.
How to install Kali Linux on virtual Box_image2
Step4: Select you Language and Click Continue.
Step5: Select your Country And click Continue.
Step6: Select Keyboard type by default it will remain American English and click on Continue after it will take little bit time to installing component in you system.
Step7: This screen ask you provide host name (which will show in network means your computer name . you can put any name whatever you want either set Kali.
How to install Kali Linux on virtual Box_image3
Step8: Here provide any domain name whatever you want like neosec.in
How to install Kali Linux on virtual Box_image4
Step9: Setup Root Password Any whatever you want or set toor which by default. Click Continue.
How to install Kali Linux on virtual Box_image5
Step 10: Setup your time Zone (which time zone belongs to you)
Step 11: Most important part of installation to setup partition if you are new user and going to install Kali Linux in Virtual machine so Select first option Guided : Use entire disk:
How to install Kali Linux on virtual Box_image6
Note: if you are going to make you system system duel boot don’t select entire disk option by this your complete hard disk will be used by the kali linux system & you will lose your all data so be careful.
Step 12: your hard disk will show here select and Click on Contiue.
Step 13:: Select all files in one partition & Continue because this tutorial for new user and you are.
Step 14: Select Finish partition and write changes to disk & Continue.
How to install Kali Linux on virtual Box_image7
Step 15: Select Yes and Continue. Your installation will be start and it will take a little bit time wait
How to install Kali Linux on virtual Box_image8
Step 16: setting up network mirror Select No we will configure network mirror later.
Step 17: Select yes and Continue.
Step 18: Finish installation and Continue.
Video Tutorial: How to install kali linux on virtualbox