CakePHP app walkthrough

 

Download now

Enjoy! Follow us for more...

Yii advanced concepts and next steps

 

Download now


Enjoy! Follow us for more.... 

Intro to Laravel

 

Download now


Enjoy! Follow us for more... 

CodeIgniter advanced concepts and next steps

 

Download now

Enjoy! Follow us for more... 

Symfony advanced concepts and next steps

 

Download now

Enjoy! Follow us for more... 

CodeIgniter concepts and features

 

Download now


Enjoy! Follow us for more... 

CodeIgniter app walkthrough

 

Download now

Enjoy! Follow us for more... 

CodeIgniter setup

 

Download now


Enjoy! Follow us for more

Intro to CodeIgniter 2.x

 

Download now

Enjoy! Follow us for more... 

What's a LAMP, and why does it matter

 

Download Now


Enjoy! Follow us for more...

Installing Eclipse for C_C++ development

 

Download Now


Enjoy! Follow us for more....

What is GIS ?

 

Download Now


Enjoy! Follow us for more...

Understanding Windows Azure

 

Download Now


Enjoy! Follow us for more....

Virtual servers (EC2) and Elastic IP

 

Download Now


Enjoy! Follow us for more...

Installing the DebugKit plugin for development

 

Download Now


Enjoy! Follow us for more...

Setting up the Visual Studio and Azure Mobile Services SDK development tools

 

Download now

Enjoy! Follow us for more...


Installing Git on Windows

 


Download Now

Enjoy! Follow us for more

What is Google App Engine.

 

Download Now

Enjoy! Follow us for more...



Developing UI for Apple Watch

 


Download Now

Enjoy! Follow us for more...

Top Five Ways to Reduce Your Digital Footprint


💚1 - Delete or Deactivate Old Shopping & Social Network Accounts. .


💚2 - Use Stealth or Incognito Mode – or Even Tor. ..


💚3 - Don't Click on Daft surveys


💚4 - Check Your Privacy Settings. ...


💚5 - Add Extensions or Plug-Ins.


Enjoy! Follow us for more...

Get Any Person Details In Usa


This Tutorial Will Guide U To Get Info About The People Living In City..😍


Steps:--

Step 1 - Go To Below Site..

https://www.truepeoplesearch.com/

Step 2 - Then Enter The Name Of Person U Want Info.. Full Name..

Step 3 - Enter The City In Which He/She Lives..

Step 4 - Click On Enter And Complete The Human Captcha..

Step 5 - Site Will Show Many Results Just Choose Whom Details U Want..

Step 6 - After Choosing U Get There Phn Number, Email, Address And Any Other Details..


Enjoy! Follow us for more...

WORLDREMIT carding tutorial

Hello everyone, drove another CC cashout method method from our regular customer. IMPORTANT! The information which is written in this article does not give a 100% guarantee of the result, but is only of an introductory nature.

So, you will need:

1. REMOTE DESKTOP CONNECTION (RDP)

2. CREDIT CARD(СС)

3.RIGHT PHONE NUMBER

Cashout Method (First Method)

First you need to buy an old World Remit account 


1. You need to buy a MOP with Info (Must be a phone number)

2. You will need the correct phone number, as in info CC.

3. Create a Yahoo or Gmail email address named CC

4. Go to WORLDREMIT.COM

5. Sign in to the old account you bought

6. After logging in, go to Options -> Send Money -> Select the state to which you want to send money

7. Choose one of the options.

8. Mobile money option / airtime option / money withdrawal.

9. Choose any and place an order as you fill in the order for the store ..

10.They will request a phone number, after which you will enter a valid number. 11.After you fill in the recipient data with your own data, you click the Submit button. This is often shortened to bill-ship.

Second Method

1. Or get Vpn on your phone

2. Download the WorldRemit app

3. Not VBV card, preferably 414720

4. Create an account

5. After creating an account, go to

6. Options -> Send Money -> Select the state to which you want to send money

7. Select one of the options.


8. Mobile money option / airtime option / cash out.

9. Select any and place an order as if you are filling out an order for a store.

10. They will ask for a phone number, after which you will enter a valid number.

11. After you fill in the recipient's data with your own data, you click the Submit button.


Enjoy! Follow us for more...

BUG BOUNTY TIPS


 *Tip #1* 


Use GIT as a recon tool. Find the target's GIT repositories, clone them, and then check the logs for information on the team not necessarily in the source code. Say the target is Reddit and I want to see which developers work on certain projects.


Link : https://gist.github.com/EdOverflow/a9aad69a690d97a8da20cd4194ca6596


 *Tip #2* 


Look for GitLab instances on targets or belonging to the target. When you stumble across the GitLab login panel, navigate to /explore. Misconfigured instances do not require authentication to view the internal projects. Once you get in, use the search function to find passwords, keys, etc. This is a pretty big attack vector and I am finally revealing it today, because I am sure it will help a lot of you get some critical issues.


 *Tip #3* 


Bug bounty tip: test applications of a company that costs money or requires manual setup. Chances are only few to none would have tested it leaving it vulnerable.


 *Tip #4* 


If you’ve found an IDOR where you’re able to change data of others then don’t jump out of your seat to report it > modify it to XSS payload & if inputs are not sanitized & variables are echo’d without getting escaped then IDOR>XSS>ATO.


 *Tip #5* 


Look for hackathon-related assets. What I mean by this is sometimes companies run hackathons and give attendees special access to certain API endpoints and/or temporary credentials. I have found GIT instances that were set up for Hackathons full of information that allowed me to find more issues in the target several times.


 *Tip #6* 


Keep all your directory brute force results so when a CVE like Drupalgeddon2 comes out, you can look for previously found instances (cat dirsearch/reports// | grep INSTALL.mysql.txt | grep 200 | less)/


 *Tip #7* 


When you have a form, always try to change the request method from POST to GET in order to improve the CVSS score. For example, demonstrating a CSRF can be exploited simply by using [img] tag is better than having to send a link to the victim.


Enjoy! Follow us for more...

The Filesystem Hierarchy Standard (Cheat-Sheet)

This is a snippet from the Kali Linux Revealed E-Book but good for beginners in Linux to learn the File System Hierarchy


• /bin/: basic programs

• /boot/: Linux kernel and other files required for its early boot process

• /dev/: device files

• /etc/: configuration files

• /home/: user’s personal files

• /lib/: basic libraries

• /media/: mount points for removable devices (CD/DVD-ROM, USB keys, and so on)

• /mnt/: temporary mount point

• /opt/: extra applications provided by third parties

• /root/: administrator’s (root’s) personal files

• /run/: volatile runtime data that does not persist across reboots (not yet included in the FHS)

• /sbin/: system programs

• /srv/: data used by servers hosted on this system

• /tmp/: temporary files (this directory is often emptied at boot)

• /usr/: applications (this directory is further subdivided into bin,sbin,lib according to the same logic as in the root directory) Furthermore,/usr/share/ contains architecture-independent data. The /usr/local/ directory is meant to be used by the administrator for installing applications manually without overwriting files handled by the packaging system(dpkg).

• /var/: variable data handled by services. This includes log files, queues, spools, and caches.

• /proc/ and /sys/ are specific to the Linux kernel (and not part of the FHS). They are used by the kernel for exporting data to user space.


Enjoy! Follow us for more...

How to protect website been hacked


Using Firewall : Firewall may be accustomed drop traffic from suspicious information processing address if attack may be an easy DOS


Encrypting the Cookies : Cookie or Session poisoning may be prevented by encrypting the content of the cookies, associating cookies with the consumer information processing address and temporal arrangement out the cookies once it slow


Validating and confirmative user input : This approach is prepared to stop the type tempering by confirmative and verifying the user input before processing it


Header Sanitizing and validation : This technique is beneficial against cross website scripting or XSS, this method includes verifying and sanitizing headers, parameters passed via the address, type parameters and hidden values to cut back XSS attacks.


What are the tools used for ethical hacking?🛑


There are several moral hacking tools out there within the marketing for different purposes, they are:


NMAP – NMAP stands for Network plotter. It’s associate degree open source tool that’s used wide for network discovery and security auditing.


Metasploit – Metasploit is one amongst the most powerful exploit tool to conduct basic penetration tests.


Burp Suit – Burp Suite could be a widespread platform that’s widely used for playing security testing of internet applications.


Angry IP Scanner – Angry information processing scanner could be a light-weight, cross-platform information processing address and port scanner.


Cain & Abel – Cain & Abel is a password recovery tool for Microsoft operational Systems.


Ettercap – Ettercap stands for local area network Capture. It is used for Man-in-the-Middle attack using a network security tool.



What is Burp Suite? What are the tools does it contain?🛑


Burp Suite is an integrated platform used for attacking net applications. It contains all the tools a hacker would need for attacking any application. a number of these functionalities are


Proxy


Spider


Scanner


Intruder


Repeater


Decoder


Comparer


Sequencer



Type of sql injection Error-based SQL injection🛑


Blind SQL injection


Time-based SQL injection




Enjoy! Follow us for more...

Common Types Of Trojan Malware, From A to Z


Here’s a look at some of the most common types of Trojan malware, including their names and what they do on your computer:


Backdoor Trojan

━━━━━━━━━━━━━

This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device.


Distributed Denial of Service (DDoS) attack Trojan

━━━━━━━━━━━━━

This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others.


Downloader Trojan

━━━━━━━━━━━━━

This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware.


Fake AV Trojan

━━━━━━━━━━━━━

This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they’re real or fake.


Game-thief Trojan

━━━━━━━━━━━━━

The losers here may be online gamers. This Trojan seeks to steal their account information.


Infostealer Trojan

━━━━━━━━━━━━━

As it sounds, this Trojan is after data on your infected computer.


Mailfinder Trojan

━━━━━━━━━━━━━

This Trojan seeks to steal the email addresses you’ve accumulated on your device.


Ransom Trojan

━━━━━━━━━━━━━

This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance.


Remote Access Trojan

━━━━━━━━━━━━━

This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you.


Rootkit Trojan

━━━━━━━━━━━━━

A rootkit aims to hide or obscure an object on your infected computer. The idea? To extend the time a malicious program runs on your device.


SMS Trojan

━━━━━━━━━━━━━

This type of Trojan infects your mobile device and can send and intercept text messages. Texts to premium-rate numbers can drive up your phone costs.


Trojan banker

━━━━━━━━━━━━━

This Trojan takes aim at your financial accounts. It’s designed to steal your account information for all the things you do online. That includes banking, credit card, and bill pay data.


Trojan IM

━━━━━━━━━━━━━

This Trojan targets instant messaging. It steals your logins and passwords on IM platforms.


That’s just a sample. There are a lot more.




Enjoy! Follow us for more...

HOW TO CHANGE YOUR IP IN 1 MINUTE

 🔰🔰


●1. ᴄʟɪᴄᴋ ᴏɴ "sᴛᴀʀᴛ" ɪɴ ᴛʜᴇ ʙᴏᴛᴛᴏᴍ ʟᴇғᴛ ʜᴀɴᴅ ᴄᴏʀɴᴇʀ ᴏғ sᴄʀᴇᴇɴ

●2. ᴄʟɪᴄᴋ ᴏɴ "ʀᴜɴ"

●3. ᴛʏᴘᴇ ɪɴ "ᴄᴏᴍᴍᴀɴᴅ" ᴀɴᴅ ʜɪᴛ ᴏᴋ

ʏᴏᴜ sʜᴏᴜʟᴅ ɴᴏᴡ ʙᴇ ᴀᴛ ᴀɴ ᴍsᴅᴏs ᴘʀᴏᴍᴘᴛ sᴄʀᴇᴇɴ.

●4. ᴛʏᴘᴇ "ɪᴘᴄᴏɴғɪɢ /ʀᴇʟᴇᴀsᴇ" ᴊᴜsᴛ ʟɪᴋᴇ ᴛʜᴀᴛ, ᴀɴᴅ ʜɪᴛ "ᴇɴᴛᴇʀ"

●5. ᴛʏᴘᴇ "ᴇxɪᴛ" ᴀɴᴅ ʟᴇᴀᴠᴇ ᴛʜᴇ ᴘʀᴏᴍᴘᴛ

●6. ʀɪɢʜᴛ-ᴄʟɪᴄᴋ ᴏɴ "ɴᴇᴛᴡᴏʀᴋ ᴘʟᴀᴄᴇs" ᴏʀ "ᴍʏ ɴᴇᴛᴡᴏʀᴋ ᴘʟᴀᴄᴇs" ᴏɴ ʏᴏᴜʀ ᴅᴇsᴋᴛᴏᴘ.

●7. ᴄʟɪᴄᴋ ᴏɴ "ᴘʀᴏᴘᴇʀᴛɪᴇs"

ʏᴏᴜ sʜᴏᴜʟᴅ ɴᴏᴡ ʙᴇ ᴏɴ ᴀ sᴄʀᴇᴇɴ ᴡɪᴛʜ sᴏᴍᴇᴛʜɪɴɢ ᴛɪᴛʟᴇᴅ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ", ᴏʀ sᴏᴍᴇᴛʜɪɴɢ ᴄʟᴏsᴇ ᴛᴏ ᴛʜᴀᴛ, ᴀɴᴅ,

ɪғ ʏᴏᴜ ʜᴀᴠᴇ ᴀ ɴᴇᴛᴡᴏʀᴋ ʜᴏᴏᴋᴇᴅ ᴜᴘ, ᴀʟʟ ᴏғ ʏᴏᴜʀ ᴏᴛʜᴇʀ ɴᴇᴛᴡᴏʀᴋs.

●8. ʀɪɢʜᴛ ᴄʟɪᴄᴋ ᴏɴ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ" ᴀɴᴅ ᴄʟɪᴄᴋ "ᴘʀᴏᴘᴇʀᴛɪᴇs"

●9. ᴅᴏᴜʙʟᴇ-ᴄʟɪᴄᴋ ᴏɴ ᴛʜᴇ "ɪɴᴛᴇʀɴᴇᴛ ᴘʀᴏᴛᴏᴄᴏʟ (ᴛᴄᴘ/ɪᴘ)" ғʀᴏᴍ ᴛʜᴇ ʟɪsᴛ ᴜɴᴅᴇʀ ᴛʜᴇ "ɢᴇɴᴇʀᴀʟ" ᴛᴀʙ

●10. ᴄʟɪᴄᴋ ᴏɴ "ᴜsᴇ ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ɪᴘ ᴀᴅᴅʀᴇss" ᴜɴᴅᴇʀ ᴛʜᴇ "ɢᴇɴᴇʀᴀʟ" ᴛᴀʙ

●11. ᴄʀᴇᴀᴛᴇ ᴀɴ ɪᴘ ᴀᴅᴅʀᴇss (ɪᴛ ᴅᴏᴇsɴ'ᴛ ᴍᴀᴛᴛᴇʀ ᴡʜᴀᴛ ɪᴛ ɪs. ɪ ᴊᴜsᴛ ᴛʏᴘᴇ 1 ᴀɴᴅ 2 ᴜɴᴛɪʟ ɪ ғɪʟʟ ᴛʜᴇ ᴀʀᴇᴀ ᴜᴘ).

●12. ᴘʀᴇss "ᴛᴀʙ" ᴀɴᴅ ɪᴛ sʜᴏᴜʟᴅ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ ғɪʟʟ ɪɴ ᴛʜᴇ "sᴜʙɴᴇᴛ ᴍᴀsᴋ" sᴇᴄᴛɪᴏɴ ᴡɪᴛʜ ᴅᴇғᴀᴜʟᴛ ɴᴜᴍʙᴇʀs.

●13. ʜɪᴛ ᴛʜᴇ "ᴏᴋ" ʙᴜᴛᴛᴏɴ ʜᴇʀᴇ

●14. ʜɪᴛ ᴛʜᴇ "ᴏᴋ" ʙᴜᴛᴛᴏɴ ᴀɢᴀɪɴ

ʏᴏᴜ sʜᴏᴜʟᴅ ɴᴏᴡ ʙᴇ ʙᴀᴄᴋ ᴛᴏ ᴛʜᴇ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ" sᴄʀᴇᴇɴ.

●15. ʀɪɢʜᴛ-ᴄʟɪᴄᴋ ʙᴀᴄᴋ ᴏɴ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ" ᴀɴᴅ ɢᴏ ᴛᴏ ᴘʀᴏᴘᴇʀᴛɪᴇs ᴀɢᴀɪɴ.

●16. ɢᴏ ʙᴀᴄᴋ ᴛᴏ ᴛʜᴇ "ᴛᴄᴘ/ɪᴘ" sᴇᴛᴛɪɴɢs

●17. ᴛʜɪs ᴛɪᴍᴇ, sᴇʟᴇᴄᴛ "ᴏʙᴛᴀɪɴ ᴀɴ ɪᴘ ᴀᴅᴅʀᴇss ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ"

ᴛᴏɴɢᴜᴇ.ɢɪғ 18. ʜɪᴛ "ᴏᴋ"

●19. ʜɪᴛ "ᴏᴋ" ᴀɢᴀɪɴ

●20. ʏᴏᴜ ɴᴏᴡ ʜᴀᴠᴇ ᴀ ɴᴇᴡ ɪᴘ ᴀᴅᴅʀᴇss



Enjoy! Follow us for more...

How to connect to an FTP server from Linux?

To connect to an FTP server from a Linux system, you can use either a command-line FTP client or a graphical one. Here’s how to do it usin...