Monday, March 6, 2017

how to install beef on debian 8 or ubuntu 16


BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.

Installation

sudo apt-get update
sudo apt-get install curl git
curl -sSL https://raw.githubusercontent.com/wayneeseguin/rvm/master/binscripts/rvm-installer | bash -s stable
source ~/.rvm/scripts/rvm
rvm install 2.1.5
rvm use 2.1.5 -- default
gem install bundler

Download BeEF

cd
git clone git://github.com/beefproject/beef.git

Install gems and launch

cd beef
bundle install
ruby beef

Update/Upgrade

cd beef
git pull origin master
bundle install
./update-beef

Monday, February 27, 2017

vBulletin 5.2.1 Nulled






hiiii guys ....~!


many people ask me how can i get vbulletin 5.2.1 for free to create his forum
i told them i'm gonna give  you but i need you for encouraging me by comment or share

passwd: anyosbox.blogspot.com

Saturday, February 25, 2017

How to Boot From a USB Drive in VirtualBox


hii guys ....~!

today i'm will show you how to make vmdk (Virtual Machine Disk)
this file can give the ability to boot from usb on an other disk on virtualmachin
to make this file we gonna use VBoxManage you can find it at virtual box folder on programe file

1/ fist one we gonna open the cmd with admin user
2/ open Diskpart shell and type list disk then this you gonna find the usb disk id
2/ go to virtual box folder
3/ and run this command

# = usb disk id number

VBoxManage internalcommands createrawvmdk -filename C:\usb.vmdk -rawdisk \\.\PhysicalDrive#

4/ now go to virtual disk and choose the vmdk file you gonna find it at c:\
6/ then boot from usb

you can see all  steps on video below


Friday, February 24, 2017

how to install pixiewps on linux


hii guys.....~!
today i'm gonne show you how to install pixiewps on linux

Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some Access Points, the so-called "pixie dust attack" discovered by Dominique Bongard in summer 2014. It is meant for educational purposes only.

to install pixiewps you gonna need some Requirements

you gonne need to install reaver from here
and this package

apt-get -y install build-essential

now Download pixiewps from github
 git clone https://github.com/wiire/pixiewps
or
wget https://github.com/wiire/pixiewps/archive/master.zip && unzip master.zip

then lit's Build it

cd pixiewps*/
cd src/
make

now install it with root user

sudo make install

for Usage

Usage: pixiewps <arguments>

Required Arguments:

  -e, --pke         : Enrollee public key
  -r, --pkr         : Registrar public key
  -s, --e-hash1     : Enrollee hash 1
  -z, --e-hash2     : Enrollee hash 2
  -a, --authkey     : Authentication session key
  -n, --e-nonce     : Enrollee nonce

Optional Arguments:

  -m, --r-nonce     : Registrar nonce
  -b, --e-bssid     : Enrollee BSSID
  -S, --dh-small    : Small Diffie-Hellman keys (PKr not needed)  [No]
  -v, --verbosity   : Verbosity level 1-3, 1 is quietest           [3]

  -h                : Display this usage screen
  --help            : Verbose help and more usage examples
  -V, --version     : Display version

  --mode N[,... N]  : Mode selection, comma separated           [Auto]
  --start [mm/]yyyy : Starting date (only mode 3)       [Current time]
  --end   [mm/]yyyy : Ending date   (only mode 3)            [-3 days]

Friday, February 17, 2017

how to install bully wps on debian


hiii...~! guys to today i'm gonna show you how to install bully wps on debian or ubuntu

Bully is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that it exploits the (now well known) design flaw in the WPS specification. It has several advantages over the original reaver code. These include fewer dependencies, improved memory and cpu performance, correct handling of endianness, and a more robust set of options. It runs on Linux, and was specifically developed to run on embedded Linux systems (OpenWrt, etc) regardless of architecture.

to install this tool you will need some Requirements to install this Requirements run this command

apt-get -y install build-essential libpcap-dev libssl-dev aircrack-ng pixiewps

then download tool from github with this command

git clone https://github.com/aanarchyy/bully
or
wget https://github.com/aanarchyy/bully/archive/master.zip && unzip master.zip

now let's build it with make command

cd bully*/
cd src/
make

then install it with root user by sudo as this

sudo make install

for usage this is the otions in this tool

  usage: bully <options> interface

  Required arguments:


      interface      : Wireless interface in monitor mode (root required)


      -b, --bssid macaddr    : MAC address of the target access point

   Or
      -e, --essid string     : Extended SSID for the access point

  Optional arguments:


      -c, --channel N[,N...] : Channel number of AP, or list to hop [b/g]

      -i, --index N          : Starting pin index (7 or 8 digits)  [Auto]
      -l, --lockwait N       : Seconds to wait if the AP locks WPS   [43]
      -o, --outfile file     : Output file for messages          [stdout]
      -p, --pin N            : Starting pin number (7 or 8 digits) [Auto]
      -s, --source macaddr   : Source (hardware) MAC address      [Probe]
      -v, --verbosity N      : Verbosity level 1-4, 1 is quietest     [3]
      -w, --workdir path     : Location of pin/session files  [~/.bully/]
      -5, --5ghz             : Hop on 5GHz a/n default channel list  [No]
      -B, --bruteforce       : Bruteforce the WPS pin checksum digit [No]
      -F, --force            : Force continue in spite of warnings   [No]
      -S, --sequential       : Sequential pins (do not randomize)    [No]
      -T, --test             : Test mode (do not inject any packets) [No]

  Advanced arguments:


      -d, --pixiewps         : Attempt to use pixiewps               [No]

      -a, --acktime N        : Deprecated/ignored                  [Auto]
      -r, --retries N        : Resend packets N times when not acked  [2]
      -m, --m13time N        : Deprecated/ignored                  [Auto]
      -t, --timeout N        : Deprecated/ignored                  [Auto]
      -1, --pin1delay M,N    : Delay M seconds every Nth nack at M5 [0,1]
      -2, --pin2delay M,N    : Delay M seconds every Nth nack at M7 [5,1]
      -A, --noacks           : Disable ACK check for sent packets    [No]
      -C, --nocheck          : Skip CRC/FCS validation (performance) [No]
      -D, --detectlock       : Detect WPS lockouts unreported by AP  [No]
      -E, --eapfail          : EAP Failure terminate every exchange  [No]
      -L, --lockignore       : Ignore WPS locks reported by the AP   [No]
      -M, --m57nack          : M5/M7 timeouts treated as WSC_NACK's  [No]
      -N, --nofcs            : Packets don't contain the FCS field [Auto]
      -P, --probe            : Use probe request for nonbeaconing AP [No]
      -R, --radiotap         : Assume radiotap headers are present [Auto]
      -W, --windows7         : Masquerade as a Windows 7 registrar   [No]
      -Z, --suppress         : Suppress packet throttling algorithm  [No]
      -V, --version          : Print version info and exit
      -h, --help             : Display this help information

Monday, January 16, 2017

How To Install netcat In Ubuntu or debian


hi guys to day i'm gonna show you how to install netcat


Netcat is a simple Unix utility which reads and writes data
across network connections, using TCP or UDP protocol.
It is designed to be a reliable "back-end" tool that can
be used directly or easily driven by other programs and
scripts

you can download netcat from this source ,this is a final netcat

$ wget https://sourceforge.net/projects/netcat/files/netcat/0.7.1/netcat-0.7.1.tar.bz2/download

now untar this file

$ tar xvjf netcat-0.7.1.tar.bz2

open netcat folder

$ cd netcat-0.7.1/

now let's install it

# ./configure
$ make
# make install

first run

$ nc -h

Wednesday, January 11, 2017

how to install reaver wps on debian or ubuntu

update your system

$ apt-get update


nstall all dependencies, Here the list

sudo apt-get -y install build-essential libpcap-dev sqlite3 libsqlite3-dev


Setup

Download

wget https://github.com/t6x/reaver-wps-fork-t6x/archive/master.zip && unzip master.zip


Build

cd reaver-wps-fork-t6x*/
cd src/
./configure
make

Install

sudo make install

how to install aircrack from Source on debian or ubuntu


update your system

$ apt-get update

nstall all dependencies, Here the list

$ sudo apt-get install build-essential libssl-dev subversion checkinstall libnl-3-dev libnl-genl-3-dev


when this install is done you can start the aircrack install, like this

$ sudo -s
# wget http://download.aircrack-ng.org/aircrack-ng-1.2-rc4.tar.gz
# tar -zxvf aircrack-ng-1.2-rc4.tar.gz
# cd aircrack-ng-1.2-rc4
# make
# make install



First Run
$ aircrack-ng --help

Thursday, January 5, 2017

Installing armitage on debian or ubuntu

What is Armitage?

Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.

Installing armitage
$ curl -# -o /tmp/armitage.tgz http://www.fastandeasyhacking.com/download/armitage150813.tgz
$ sudo tar -xvzf /tmp/armitage.tgz -C /opt
$ sudo ln -s /opt/armitage/armitage /usr/local/bin/armitage
$ sudo ln -s /opt/armitage/teamserver /usr/local/bin/teamserver
$ sudo sh -c "echo java -jar /opt/armitage/armitage.jar \$\* > /opt/armitage/armitage"
$ sudo perl -pi -e 's/armitage.jar/\/opt\/armitage\/armitage.jar/g' /opt/armitage/teamserver



First Run

$ armitage

Wednesday, January 4, 2017

linux Compilation and Installation of nmap 7.4 from Source Code "final"



First install some needed packages:

$ cd
$ sudo apt-get install build-essential libssl-dev libpathfinder-openssl-1 liblinear-dev libpcap0.8-dev libpcre3-dev




$ wget http://nmap.org/dist/nmap-7.40.tar.bz2
$ tar xvf nmap-7.40.tar.bz2
$ cd nmap-7.40/
$ ./configure
$ make
$ sudo make install
$ make clean

now you can run it

$ nmap -h

installing metasploit framework on debian 8 or ubuntu 14+


installing the metasploit on debian isn't Difficult

this guide is very simple

first setup you need to update your system with apt-get:

$ sudo apt-get update
$ sudo apt-get upgrade


now you should install the dependent packages for matasploit

$ sudo apt-get install build-essential libreadline-dev libssl-dev libpq5 libpq-dev libreadline5 libsqlite3-dev libpcap-dev git-core autoconf postgresql pgadmin3 curl zlib1g-dev libxml2-dev libxslt1-dev vncviewer libyaml-dev curl zlib1g-dev


now you gonna Installing Ruby using RVM

RVM stands for Ruby Version Manager. Which provides efficient way to install and manage ruby version independently. Install latest stable version of RVM on your system using following command. This command will automatically download all required files and install on your system.

$ cd
$ gpg --keyserver hkp://keys.gnupg.net --recv-keys 409B6B1796C275462A1703113804BB82D39DC0E3
$ curl -L https://get.rvm.io | bash -s stable
$ source ~/.rvm/scripts/rvm
$ echo "source ~/.rvm/scripts/rvm" >> ~/.bashrc
$ source ~/.bashrc
$ RUBYVERSION=$(wget https://raw.githubusercontent.com/rapid7/metasploit-framework/master/.ruby-version -q -O - )
$ rvm install $RUBYVERSION
$ rvm use $RUBYVERSION --default
$ ruby -v
$ gem install rails
$ rails -v



install nmap


you should have nmap for scanning network to install it go here

Configuring Postgres SQL Server

We start by switching to the postgres user so we can create the user and database that we will use for Metasploit

$ sudo -s
# su postgres



Now we create the user and Database, do record the database that you gave to the user since it will be used in the database.yml file that Metasploit and Armitage use to connect to the database

# createuser msf -P -S -R -D
# createdb -O msf msf
# exit
# exit



Installing Metasploit Framework

$ cd /opt $ sudo git clone https://github.com/rapid7/metasploit-framework.git
$ sudo chown -R `whoami` /opt/metasploit-framework
$ cd



Install using bundler the required gems and versions:

$ cd metasploit-framework
$ rvm --default use ruby-${RUByVERSION}@metasploit-framework
$ gem install bundler
$ bundle install



Lets create the links to the commands so we can use them under any user and not being under the framework folder:

$ cd metasploit-framework
$ sudo bash -c 'for MSF in $(ls msf*); do ln -s /opt/metasploit-framework/$MSF /usr/local/bin/$MSF;done'



Lets create the database.yml file that will contain the configuration parameters that will be use by framework:

$ sudo nano /opt/metasploit-framework/config/database.yml


Copy the YAML entries and make sure you provide the password you entered in the user creating step in the password field for the database

production:
adapter: postgresql
database: msf
username: msf
password: yourmsfpassword
host: 127.0.0.1
port: 5432
pool: 75
timeout: 5



Create and environment variable so it is loaded by Armitage and by msfconsole when running and load the variable in to your current shell:


$ sudo sh -c "echo export MSF_DATABASE_CONFIG=/opt/metasploit-framework/config/database.yml >> /etc/profile"

$ source /etc/profile



First Run

$ msfconsole