Monday, February 27, 2017

vBulletin 5.2.1 Nulled






hiiii guys ....~!


many people ask me how can i get vbulletin 5.2.1 for free to create his forum
i told them i'm gonna give  you but i need you for encouraging me by comment or share

passwd: anyosbox.blogspot.com

Saturday, February 25, 2017

How to Boot From a USB Drive in VirtualBox


hii guys ....~!

today i'm will show you how to make vmdk (Virtual Machine Disk)
this file can give the ability to boot from usb on an other disk on virtualmachin
to make this file we gonna use VBoxManage you can find it at virtual box folder on programe file

1/ fist one we gonna open the cmd with admin user
2/ open Diskpart shell and type list disk then this you gonna find the usb disk id
2/ go to virtual box folder
3/ and run this command

# = usb disk id number

VBoxManage internalcommands createrawvmdk -filename C:\usb.vmdk -rawdisk \\.\PhysicalDrive#

4/ now go to virtual disk and choose the vmdk file you gonna find it at c:\
6/ then boot from usb

you can see all  steps on video below


Friday, February 24, 2017

how to install pixiewps on linux


hii guys.....~!
today i'm gonne show you how to install pixiewps on linux

Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some Access Points, the so-called "pixie dust attack" discovered by Dominique Bongard in summer 2014. It is meant for educational purposes only.

to install pixiewps you gonna need some Requirements

you gonne need to install reaver from here
and this package

apt-get -y install build-essential

now Download pixiewps from github
 git clone https://github.com/wiire/pixiewps
or
wget https://github.com/wiire/pixiewps/archive/master.zip && unzip master.zip

then lit's Build it

cd pixiewps*/
cd src/
make

now install it with root user

sudo make install

for Usage

Usage: pixiewps <arguments>

Required Arguments:

  -e, --pke         : Enrollee public key
  -r, --pkr         : Registrar public key
  -s, --e-hash1     : Enrollee hash 1
  -z, --e-hash2     : Enrollee hash 2
  -a, --authkey     : Authentication session key
  -n, --e-nonce     : Enrollee nonce

Optional Arguments:

  -m, --r-nonce     : Registrar nonce
  -b, --e-bssid     : Enrollee BSSID
  -S, --dh-small    : Small Diffie-Hellman keys (PKr not needed)  [No]
  -v, --verbosity   : Verbosity level 1-3, 1 is quietest           [3]

  -h                : Display this usage screen
  --help            : Verbose help and more usage examples
  -V, --version     : Display version

  --mode N[,... N]  : Mode selection, comma separated           [Auto]
  --start [mm/]yyyy : Starting date (only mode 3)       [Current time]
  --end   [mm/]yyyy : Ending date   (only mode 3)            [-3 days]

Friday, February 17, 2017

how to install bully wps on debian


hiii...~! guys to today i'm gonna show you how to install bully wps on debian or ubuntu

Bully is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that it exploits the (now well known) design flaw in the WPS specification. It has several advantages over the original reaver code. These include fewer dependencies, improved memory and cpu performance, correct handling of endianness, and a more robust set of options. It runs on Linux, and was specifically developed to run on embedded Linux systems (OpenWrt, etc) regardless of architecture.

to install this tool you will need some Requirements to install this Requirements run this command

apt-get -y install build-essential libpcap-dev libssl-dev aircrack-ng pixiewps

then download tool from github with this command

git clone https://github.com/aanarchyy/bully
or
wget https://github.com/aanarchyy/bully/archive/master.zip && unzip master.zip

now let's build it with make command

cd bully*/
cd src/
make

then install it with root user by sudo as this

sudo make install

for usage this is the otions in this tool

  usage: bully <options> interface

  Required arguments:


      interface      : Wireless interface in monitor mode (root required)


      -b, --bssid macaddr    : MAC address of the target access point

   Or
      -e, --essid string     : Extended SSID for the access point

  Optional arguments:


      -c, --channel N[,N...] : Channel number of AP, or list to hop [b/g]

      -i, --index N          : Starting pin index (7 or 8 digits)  [Auto]
      -l, --lockwait N       : Seconds to wait if the AP locks WPS   [43]
      -o, --outfile file     : Output file for messages          [stdout]
      -p, --pin N            : Starting pin number (7 or 8 digits) [Auto]
      -s, --source macaddr   : Source (hardware) MAC address      [Probe]
      -v, --verbosity N      : Verbosity level 1-4, 1 is quietest     [3]
      -w, --workdir path     : Location of pin/session files  [~/.bully/]
      -5, --5ghz             : Hop on 5GHz a/n default channel list  [No]
      -B, --bruteforce       : Bruteforce the WPS pin checksum digit [No]
      -F, --force            : Force continue in spite of warnings   [No]
      -S, --sequential       : Sequential pins (do not randomize)    [No]
      -T, --test             : Test mode (do not inject any packets) [No]

  Advanced arguments:


      -d, --pixiewps         : Attempt to use pixiewps               [No]

      -a, --acktime N        : Deprecated/ignored                  [Auto]
      -r, --retries N        : Resend packets N times when not acked  [2]
      -m, --m13time N        : Deprecated/ignored                  [Auto]
      -t, --timeout N        : Deprecated/ignored                  [Auto]
      -1, --pin1delay M,N    : Delay M seconds every Nth nack at M5 [0,1]
      -2, --pin2delay M,N    : Delay M seconds every Nth nack at M7 [5,1]
      -A, --noacks           : Disable ACK check for sent packets    [No]
      -C, --nocheck          : Skip CRC/FCS validation (performance) [No]
      -D, --detectlock       : Detect WPS lockouts unreported by AP  [No]
      -E, --eapfail          : EAP Failure terminate every exchange  [No]
      -L, --lockignore       : Ignore WPS locks reported by the AP   [No]
      -M, --m57nack          : M5/M7 timeouts treated as WSC_NACK's  [No]
      -N, --nofcs            : Packets don't contain the FCS field [Auto]
      -P, --probe            : Use probe request for nonbeaconing AP [No]
      -R, --radiotap         : Assume radiotap headers are present [Auto]
      -W, --windows7         : Masquerade as a Windows 7 registrar   [No]
      -Z, --suppress         : Suppress packet throttling algorithm  [No]
      -V, --version          : Print version info and exit
      -h, --help             : Display this help information