Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, January 28, 2026

Debug tools

 

Translate tokens (decode)

[1] https://www.jwt.io/

Sunday, January 25, 2026

Find free cameras

 

 

https://github.com/2l7b/public-camera-indexing-insights

Friday, March 12, 2021

Ubuntu users tools

 

To hidden (no initial list at login)

sudo vi /var/lib/AccountsService/users/cloud

SystemAccount=true #change this from false to true

References:

[1] add user https://linoxide.com/usr-mgmt/give-normal-user-root-privileges/

[2] hidden user https://swatij.me/hacks/ubuntu/hide-user-from-login-screen-in-ubuntu-14-04.html

Friday, March 01, 2019

Linux Discover Teamviewer id



$sudo grep -n id /home/user/.local/share/teamviewer14/logfiles/TeamViewer14_Logfile.log

$whereis teamviewer
$/usr/bin/teamviewer help
$/usr/bin/teamviewer info #for get id too

$/usr/bin/teamviewer daemon stop
$/usr/bin/teamviewer setup
$/usr/bin/teamviewer daemon status
$/usr/bin/teamviewer daemon start

References:
[1] http://www.tonisoto.com/2013/07/launching-teamviewer-remotely-throught-ssh/

Wednesday, April 04, 2018

Call using Internet (Brasil - Perú)


https://www.poptox.com/Peru
https://www.spytox.com/whose-number-is-calling-me

Thursday, January 21, 2016

Wireless Security

Codes:

[1] Code for single Evil Twin/Python https://github.com/s0lst1c3/evil_twin 

[2] Scrip based https://github.com/M1z23R/FluxPi 

References:

1. airbase-ng http://lifehacker.com/how-to-hack-your-own-network-and-beef-up-its-security-w-1649785071

Tuesday, June 23, 2015

Running Wireshark over Ubuntu 14.04


After  installation, execute next steps:

1) sudo dpkg-reconfigure wireshark-common
2) sudo chmod +x /usr/bin/dumpcap
3) sudo setcap CAP_NET_RAW,CAP_NET_ADMIN,CAP_DAC_OVERRIDE+eip /usr/bin/dumpcap


Reference:
[1] https://ask.wireshark.org/questions/16343/install-wireshark-on-ubuntu
[2] http://askubuntu.com/questions/348712/there-are-no-interfaces-on-which-a-capture-can-be-done

Monday, May 25, 2015

SSH Tunneling

$ssh -D 127.0.0.1:8080 -l <user> <Server> -p <22|2222>

$ssh -[N]D 5555 -l <user> <Server> -p <22|2222> 

N Doesn't work in some servers, then remove it.


Firefox Setting

1. Open firefox settings, search for "SOCKS" and open the Network Proxy settings

2. Select "Manual proxy configuration"

3. Enter localhost for the SOCKS host, 9999 for the port, and SOCKS v5 selected. Click "OK" to save it.


use http://www.whatismyip.org/ for verify new ip

References:

[1] https://gist.github.com/brentjanderson/6ed800376e53746d2d28ba7b6bdcdc12 (rev 2024)
[2] http://www.planetb.ca/2010/08/how-to-create-an-ssh-tunnel-with-putty-and-stay-anonymous-on-a-network/

 

 

 

 

 

 

 

 

 

 

Wednesday, February 18, 2015

When you don't access to Windows (Reset Password)

Option 1:

copy c:/windows/system32/sethc.exe to c:/ (backup)
copy c:/windows/system32/cmd.exe c:/windows/system32/sethc.exe
--when you restart, push shift key for 5 second, and put.

c:>net user

Option 2:
#mount /dev/sdax  /mnt/windowsc    (mount windows partition using linux)
#cd /mnt/windowsc/Windows/System32/config
#chntpw -l SAM  (for list users)
#chntpw -u SAM (for options)





References:

[1] https://4sysops.com/archives/forgot-the-administrator-password-the-sticky-keys-trick/

[2] http://www.howtogeek.com/howto/windows-vista/change-your-forgotten-windows-password-with-the-linux-system-rescue-cd/


Tuesday, June 17, 2014

How to remove Bill Gates botnet (Fedora)



1) identify and kill process running
 #top
 #killall cupsdd
 . . .

2) verify crontab

#ss -t (show current socket connections)
#crontab -l (list entries)
#crontab -e (edit current)
#crontab -r (remove all entries)

3) remove calls from start scripts
#vi /etc/rc.local   (here anotate entries )
#vi /etc/init.d
#rm /etc/*.lock  (bill.lock and gates.lock)
4) remove physical files
  atddd, cupsdd, cupsddh,ksapdd, kysadd,sksapdd, skysapdd

References

[1] http://lpages.info/billgates-linux-botnet/
[2] https://isc.sans.edu/forums/diary//17282
[3] crontab https://help.1and1.com/hosting-c37630/scripts-and-programming-languages-c85099/cron-jobs-c37727/delete-a-cron-job-a757264.html

Monday, October 14, 2013

Transport Layer Protection - ASP.NET




Tools:
[1] asafaweb.com

References:
[1] OWASP Top 10 for .NET developers part 9: Insufficient Transport Layer Protection 
      http://www.troyhunt.com/2011/11/owasp-top-10-for-net-developers-part-9.html
[2] ASP.NET session hijacking with Google and ELMAH
      http://www.troyhunt.com/2012/01/aspnet-session-hijacking-with-google.html
[3] Ramping up ASP.NET session security
      http://www.dotnetnoob.com/2013/07/ramping-up-aspnet-session-security.html


Friday, September 27, 2013

Asp.Net Insecure Session Cookie Handling Vulnerability

Add next code in c:\inetpub\wwwroot\web.config


    <system.web>
      <httpCookies
             httpOnlyCookies="true"
             requireSSL="true" />
    </system.web>


References:
[1] http://www.codeproject.com/Articles/291562/Asp-net-web-application-Security-Review-Dos-Dont
[2] http://forums.asp.net/t/1756774.aspx
[3] http://www.enterprisenetworkingplanet.com/netsecur/ten-tips-to-make-your-ssl-secure.html
[4] https://www.owasp.org/index.php/HttpOnly
[5] http://xss.cx/examples/dork/programming/ssl-cookie-without-secure-flag-set-example.html#1.7


Chrome disable keyring prompt

  Add --password-store=basic to the end of the command line.  google-chrome-stable --password-store=basic .