Showing posts from 2017

My dnf.conf File

root@homi:~$ cat /etc/dnf/dnf.conf
exclude=libreoffice* firefox* google-chrome* opera* #kernel*

Check Your Anti-Virus ...


Fedora 25 & GNS3 1.5.2

You Need This :
python3 -m pip install --upgrade pip pip3 install aiohttp==0.22.5

WiFi Hacking For Beginners (Kali Linux)

There are two step to catch handshake.
1.Start airodump-ng on the target AP (Access Point):
The syntax is something like this:
>airodump-ng --channel [channel] –bssid [bssid] –write [file-name][interface]
Ex: >airodump-ng –channel 6 –bssid 11:22:33:44:55:66 --write out wlan0mon 2.Wait for a client to connect to the access point, or deauthenticate a
connected client (if any) so that their system will connect back automatically.
The syntax is something like this:
>aireplay-ng --deauth [number of deauth packets] –a [AP] –c [target]
Ex: >aireplay-ng –deauth 1000 –a 11:22:33:44:55:66 –c
00:AA:11:22:33 mon0 If the handshake catched, kali will inform you by top right corner of
airodump-ng will say “WPA handshake”.
Follow these steps and when you will catch handshake your screen
should like this:

Now you have handshake and you need to download largest wordlist
in the world to have change to hack password. You can download this
wordlist from the following website:

Kaspersky Free


Hidden Ways To Get More From Your Gmail Address

I recently discovered some little-known ways to use your Gmail address that can give you greater control over your inbox and save you some time and headache. When you choose a Gmail address, you actually get more than just "" Here are two different ways you can modify your Gmail address and still get your mail:
Append a plus ("+") sign and any combination of words or numbers after your email address. For example, if your name was, you could send mail to or one or several dots (".") anywhere in your email address. Gmail doesn't recognize periods as characters in addresses -- we just ignore them. For example, you could tell people your address was, or (We understand that there has been some confusion about this in the past, but to settle it once and for all, you can indeed receive …

Best Free Linux Firewalls of 2017

ClearOS ClearOS is by far the sleekest looking firewall distro in this roundup. It's obvious that a lot of time and care has gone into developing the interface. IPCop This distro, while entirely separate from IPFire, also uses helpful colour-coding to represent different connections. Green is for LAN, red for the internet, orange for DMZ, and blue for wireless clients. OPNsense OPNsense is an easy-to-use open source firewall based on FreeBSD 10.1 to ensure long-term support. Obviously enough, the project’s name is derived from the words 'open' and 'sense', standing for: ‘Open source makes sense.’ IPFire IPFire is a Linux firewall distro focusing on user-friendliness and easy setup without compromising your security, supporting some useful features such as intrusion detection. IPFire takes a serious approach to security by using an SPI (Stateful Packet Inspection) Firewall built on top of netfilter.  pfSense Like OPNsense, pfSense is based on FreeBSD and designed s…

Linux Networking Commands

Every computer is connected to some other computer through a network whether internally or externally to exchange some information. This network can be small as some computers connected in your home or office, or can be large or complicated as in large University or the entire Internet. Maintaining a system's network is a task of System/Network administrator. Their task includes network configuration and troubleshooting. Here is a list of Networking and Troubleshooting commands: ifconfigDisplay and manipulate route and network interfaces.ipIt is a replacement of ifconfig command.tracerouteNetwork troubleshooting utility.tracepathSimilar to traceroute but doesn't require root privileges.pingTo check connectivity between two nodes.netstatDisplay connection information.ssIt is a replacement of netstat.digQuery DNS related information.nslookupFind DNS related query.routeShows and manipulate IP routing table.hostPerforms DNS lookups.arpView or add contents of the kernel's ARP t…

Other useful UNIX commands " history "

history Command The C shell keeps an ordered list of all the commands that you have entered. Each command is given a number according to the order it was entered. % history (show command history list) If you are using the C shell, you can use the exclamation character (!) to recall commands easily. % !! (recall last command) % !-3 (recall third most recent command) % !5 (recall 5th command in list) % !grep (recall last command starting with grep) You can increase the size of the history buffer by typing % set history=100

Change the current directory [cd Command]


[SecuSend] File Encryption [Windows]

SecuSend is a free file encryption application that allows files encryption for multiple recipients. - You can protect files and store them on any media or share them securely with others. - You can encrypt files for specified set of recipients, so only this set of recipients can decrypt files on theirs PC's. - With SecuSend you can quickly and easily encrypt and send any file - without the need for a password. Just add recipients to the recipients list and click "Encrypt".
With SecuSend it's just being Secure in an Insecure World.

[Caesium] Image Compressor [Windows]

Caesiumis a multiple award winning software developed for simplicity and effectiveness.


To customise your Bash command line prompt, you need to modify the .bashrc fi le in your home (~) directory. Chances are that file
already exists (and perhaps there are even prompt-related lines in there already), but any changes you add on the end of the file using a text editor will take precedence, so that’s fine.

We’re going to start by defi ning some colours in the fi le so you can use them in your prompt.

Bash colour codes are as follows:

Black - 0;30
Blue - 0;34
Green - 0;32
Cyan - 0;36
Red - 0;31
Dark Gray - 1;30
Light Blue - 1;34
Light Green - 1;32
Light Cyan - 1;36
Light Red - 1;31
Purple - 0;35
Light Purple - 1;35
Brown - 0;33
Yellow - 1;33
Light Gray - 0;37
White - 1;37
They can be added to the .bashrc file with lines in the following format, in a function:

Next, after defi ning the colours you wish to use, you need to defi ne the prompt itself with a line such as:

export PS1=”${R…


rsync , which stands for ‘remote sync’, is a remote and local file synchronisation tool.
What makes rsync unique is that when it transfers files, it minimises the amount of data copied by only transferring the portions of files that have changed.
While rsync can be used to sync directories on the same system, where it becomes particularly powerful is when it’s used between machines over a network or even the internet.
Extremely straightforward to configure provided you have SSH access to the remote machine, the command to push a directory to a remote machine is simply:
rsync -a username@remote_host:/home/username/remotedir localdir the command to push a file to a remote machine is simply:
rsync filename root@ Additional options for rsync enable features such as compression,
mirroring (be careful of those deletes!) and resume support.
So, if you ever need to transfer multiple files between machines,
there’s likely no better tool than rsync to do it …

How to Use Virtual Desktops in Windows 10

The virtual desktops feature in Windows 10 is called “Task View” and is located on the Taskbar.

Clicking the “Task View” button brings up the Task View interface, where you can see your open windows on virtual desktops you’ve added. When you open the Task View interface for the first time, or you only have one desktop, the “Add a desktop” button is available. Click it to add another virtual desktop.

Now, when you click the “Task View” button, all your desktops display on the Task View interface.


Picture the scene. You’re SSHed into a remote server, doing something really important. You’re just in the middle of running a command on the database whenyour Wi-Fi drops.

You connect back to the server immediately, but you start a new
session and you have no idea if the previous operation completed.

Nightmare! A great solution to this is the ‘screen’ tool.
This is a full-screen window manager that multiplexes a physical terminal between several processes, typically interactive shells. 
Each virtual terminal has a separate scrollback history buffer and a copy-and-paste mechanism that allows the user to move text regions between windows. When screen is first opened, it creates a single window with a shell in it (or the specified command) and then gets out of your way so that you can use the program as you normally would. 
Then, at any time, you can create new (full-screen) windows with other programs in them (including more shells), kill the current window, view a list of the active…

The Hack font in Fedora 26/25/24

Reading the always awesome Fedora Magazine, I discovered the Hack Font, just take a look:
$ sudo dnf copr enable heliocastro/hack-fonts $ sudo dnf install hack-fonts

How to hack a WordPress website with WPScan

⧫ WPScan update
Start with the following command to update the WPScan vulnerabilities database:
wpscan –update
⧫ Scanning WordPress vulnerabilities
Then use the following command to scan the target website for possible vulnerabilities:
wpscan –url [wordpress url]
⧫ How to enumerate WordPress users
The WordPress user enumeration tool is used the retrieve a list of registered WordPress users for the target host. User enumeration is the first step when an attacker wants to gain access to a specific target by brute forcing. The enumeration tool scans the target on posts, pages and custom types for authors and usernames. Use the following command to enumerate the WordPress users:
wpscan –url [wordpress url]–enumerate u
⧫ How to brute force the root password

Use the following command to brute force the password for user root:

wpscan –url [wordpress url]–wordlist [path to wordlist]–username [username to brute force]–threads [number of threads to use]

Best Online Cross Browser Testing Tools (Free and Paid)

1. BrowserStack
BrowserStack is a paid tool, but it does provide a free trial. You will receive 30 minutes of live testing, 100 minutes of automated testing, and 100 screenshots for free. Paid users can test their locally hosted websites too.
2. Browsershots
Browsershots is an absolutely free tool for testing a website for cross-browser compatibility. Unlike other tools, it doesn’t have any live testing feature, only you can request screenshots of your website design. You can submit your website or webpage URL from the home page by selecting different operating systems and browsers (as seen below).
CrossBrowserTesting is an another best web-based tool for testing a website across 1500+ real desktop and mobile browsers. You can test with various methods such as live testing, automated testing, and local testing. The tool can automatically generate screenshots of a website across various browsers, and you can compare them side-by-side. CrossBrowserTesting is a p…

pfSense: Your FreeBSD Router

To be continue .. n0where


I'm Using Fedora 64bit 3GB of RAM ... #include <stdio.h>
#include <stdlib.h>
#define MEGABYTE 1024*1024

int main(int argc, char *argv[]) {
  void *myblock = NULL;
int count = 0;

while (1){
    myblock = (void *) malloc(MEGABYTE);
if (!myblock) break;
    printf("Currently allocating %d MB\n", ++count);

Symantec ThreatCon Rating

The ThreatCon is currently at Level 2: Elevated.
On April 11, Microsoft released its scheduled patch update for July 2017. This month's update covers vulnerabilities in Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office and Microsoft Office Services and Web Apps.Visual Studio for Mac, .NET Framework, Silverlight,Adobe Flash Player.

Customers are advised to apply all patches as soon as possible

Microsoft Security Bulletin Summary for April 2017: Symantec ThreatCon Rating The Symantec ThreatCon rating is a measurement of the global threat exposure, delivered as part of Symantec DeepSight Threat Management System. ThreatCon Level 2
Medium : Increased alertness
This condition applies when knowledge or the expectation of attack activity is present, without specific events occurring or when malicious code reaches a moderate risk rating. Under this condition, a ca…

Honda Just Invented a Self-Balancing Motorcycle

Honda Just Invented a Self-Balancing Motorcycle That Never Falls Over .... :)

How to Hide Text in a .Text File Windows

This Is a Picture Will Enplane Everything :

C Programming / Linux – Color Text Output (printf)

I'm Using GNOME Terminal 3.20.3 and Fedora 24.
#include <stdio.h>
char fail_color[] = "\033[31;1m";
char pass_color[] = "\033[32;1m";
char color_end[] = "\033[0m";
char Yellow[] = "\033[33;1m";
char Blue[] = "\033[34;1m";
char Purple[] = "\033[35;1m";
char White[] = "\033[37;1m";
char DarkGray[] = "\033[30;1m";
char Y_highligth[] = "\033[33;7m";
int main(int argc, char const *argv[]) {
  printf("%sPass\n%sFail\n%sNormal\n",pass_color, fail_color, color_end);
  printf("%sYellow\n", Yellow);
  printf("%sBlue\n", Blue);
  printf("%sPurple\n", Purple);
  printf("%sWhite\n", White);
  printf("%sDarkGray\n", DarkGray);
  printf("%sYellow highligth\n", Y_highligth);
  return 0;
OutPut :

My DNF "yum" Configuration

cat /etc/dnf/DNF.conf
exclude=libreoffice* opera*

Serving Web Pages `NetCat`

You can even use netcat to act as a web server: while true; do nc -l -p 8080 < index.html ; donewould serve the page index.html until you close the terminal window.

Booting an ISO image using QEMU

You have an iso image and you want to boot from it without restarting the system, simply use qemu virtual machine as below (-m 512 says qemu will be use 512 Mb of RAM from system):
qemu-system-x86_64 -boot d -cdrom linux.iso -m 512 It is also possible to use your regular cdrom device too. If the device is /dev/cdrom you can boot a cd in the device like that:
qemu-system-x86_64 -boot d -cdrom /dev/cdrom -m 512 Above examples not use any harddisk, so it is suitable for live cd image case. If you want to install a distribution to a harddisk image file, you need to create harddisk image file first: qemu-img create hdd.img 10G In this example we're created an image of 10 GB. Now we can use this file as harddisk in our qemu boot: qemu-system-x86_64 -boot d -cdrom linux.iso -m 512 -hda hdd.img

Enable Super Hidden Administrator Account on Windows 7 & 10

Search for CMD in the start menu and right-click on Command Prompt and select Run as Administrator.
In the Elevated Command Prompt, type and execute the following command.
net user administrator /active:yes

Google Chrome Manual Password Generation


"Fedora" Checking Internet Connection


"Microsoft" Checking Internet Connection

This is The IP :

How to install Web Server on Fedora

Installing Apache
su -c 'dnf group install "Web Server"' This command installs the entire Web Server package group. The group includes other commonly used tools such as:
*PHP and Perl support
*The squid caching proxy
*Documentation Traffic analysis tools If for some reason you don’t want these helpful packages,
you can install the web server by itself.  Use this command:
su -c 'dnf install httpd' Configuring the Firewall  su -c 'firewall-cmd --add-service=http --add-service=https --permanent' su -c 'firewall-cmd --reload'OR
su -c 'firewall-cmd --add-service=http --add-service=https'

Coding Faster with Emmet

Emmet is a plugin for many popular text editors which
greatly improves HTML & CSS workflow:

Connect GNS3 to the Internet "No ROOT"

The Idea Here is by making "TUN/TAP device { tap0 }" for your normal user.
root@temp:~# ip tuntap add dev tap0 mode tap user {user} group {user}Then add it to one of our existing bridges:
root@temp:~# brctl addif virbr0 tap0Last step make the state to up:
root@temp:~# ip link set tap0 upAnd start GNS3 as Normal user Add Cloud to the Map , go to the tab "NIO TAP" and add our previously created.
Thanks To Source

Note : You Should Have " virbr0 " Bridge

Using Fonts in XTerm

It's Simple :
xterm -fa 'Monospace' -fs 14

Sending raw Ethernet packets from a specific interface in C on Linux

Lately austinmarton’ve been writing some code to send packets to a specific MAC address from a specific interface. He is sure this will come in handy again so here is how it goes:

Continue Reading ..

Source :

/* * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version.*/#include<arpa/inet.h>#include<linux/if_packet.h>