Search:

Type: Posts; User: Hackuin

Page 1 of 5 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    88,575

    why not just check the connected devices to the...

    why not just check the connected devices to the router and have a Mac-lookup which may give you hints of the devices. As mac vendors have a excellent API, a simple script may do it:
    Just copy the...
  2. Replies
    3
    Views
    28,619

    Quick python script :]

    import re
    import os
    from sys import argv

    try:
    my_script, folder, my_sting = argv
    except ValueError:
    print ("Usage(): python path_0f_folder your_string")
    exit()
  3. Replies
    0
    Views
    21,091

    Free VPN Auto Connect :]

    ####
    #
    #!/usr/bin/env bash
    #: Script for Free VPN.
    #: From: http://freevpn.me/accounts
    #: Author: hackuin
    #: Email: hackuin@ymail.com
    #
    ####
  4. Replies
    5
    Views
    8,398

    Oho, welcome buddy :] Good to see you over here!!

    Oho, welcome buddy :] Good to see you over here!!
  5. Sticky: Good one. Reverse Engineering is a very good...

    Good one.
    Reverse Engineering is a very good concept, hope to join you :]
  6. Replies
    11
    Views
    53,673

    ss Much faster then usual "netstat" And all...

    ss

    Much faster then usual "netstat"

    And all "ip" commands


    ip addr
    ip link
    ip route
  7. Replies
    2
    Views
    60,121

    Un usual ways of Linux

    Hello People.

    I guess, people might have read this article of mine, this for those who aren't on my list and who havn't read.

    -Hackuin
  8. Thread: Hacker Wanted

    by Hackuin
    Replies
    2
    Views
    18,264

    You mean, you ultra secret video of child sex you...

    You mean, you ultra secret video of child sex you had?
  9. Replies
    6
    Views
    11,785

    Ironically, to become a part of internal Network,...

    Ironically, to become a part of internal Network, 99% you need to go through great fire-china-wall.
  10. Replies
    5
    Views
    21,884

    Actually, Linux vs Windows, topics have done...

    Actually, Linux vs Windows, topics have done zillion time over various internel forums.
    I am not going to start it all over it again.
    What I would tell you is, it is personal conception, it depends...
  11. Replies
    5
    Views
    21,884

    Due to my sheer hatefulness towards win* OS. I...

    Due to my sheer hatefulness towards win* OS. I don't usually miss an opportunity to advice you to shift to Linux from windows.
  12. Replies
    5
    Views
    21,884

    Proxy is nothing but, like hiding your Identity....

    Proxy is nothing but, like hiding your Identity. When you connect to internet, you obviously use one of the IP address assigned to you by your ISP (Internet Service Provider). When you connect to any...
  13. Replies
    3
    Views
    11,223

    Well, I guess, as you do have decent deal of...

    Well, I guess, as you do have decent deal of experience with *nix OS, why not start with, OS/Network/firewall security. Programing languages especially, Python/Ruby/C/Assembly is very usefull. Pick...
  14. Thread: remote root

    by Hackuin
    Replies
    27
    Views
    85,261

    This remind me, the ironic situations. 568

    This remind me, the ironic situations.
    568
  15. Replies
    31
    Views
    137,970

    Sticky: If you are connected to wifi, it doesn't mean,...

    If you are connected to wifi, it doesn't mean, you can access internet. You need to understand that, if the network you are connected is not able to access internet, even if you connected to their...
  16. Replies
    8
    Views
    20,086

    @sonsofanarki: Foremostly you need to...

    @sonsofanarki:

    Foremostly you need to understand the reason why you are opted for reverse_tcp?
    The reason is simply for issue's involved with filtering devices at targeted host. As most of the...
  17. Replies
    2
    Views
    23,437

    Nmap is your friend. And, BTW, IP's don't...

    Nmap is your friend.

    And, BTW, IP's don't block ping, filtering devices/softwares does. :b
  18. I said, somewhat for the variables. Did you...

    I said, somewhat for the variables. Did you tested it?
    remove the last '/' from the DIR variable, or else the your DIR variable contains, "/usr/include/c++/4.6.3//.
  19. RahulB, good one, few notes: 1. However,...

    RahulB, good one, few notes:



    1. However, for this script it suffecient, for test command used, but remember if you are opting only one argument with the script, force/limit the user to use...
  20. Replies
    3
    Views
    5,526

    @OP: Can't you read the report? Its clearly...

    @OP:
    Can't you read the report?
    Its clearly tells you "EXPLOITABLE WITH -- CANVAS(true) and METASPLOIT(true)".
    Here is a link which might help you. HP data Protector.

    -Hackuin
  21. Replies
    1
    Views
    6,034

    Dear aixeiger, With half specification, we...

    Dear aixeiger,
    With half specification, we cannot help you out.

    What OS?
    What Firewall you are using?
  22. Replies
    28
    Views
    37,764

    No, videos will make you expert, until and unless...

    No, videos will make you expert, until and unless you start digging them.
    If you take CBT. or any other videos, they all try to make you understand stuff, they won't make you expert. Its your job to...
  23. Replies
    2
    Views
    5,540

    1. No one here will tell you how to break into...

    1. No one here will tell you how to break into his computer, so that you could retrive/delete your soo called stuff.
    2. Even if someone does or even if you really try hard you obviously going in...
  24. Replies
    20
    Views
    27,476

    @neo: Obviously, robot.txt is a security...

    @neo:

    Obviously, robot.txt is a security through obscurity.
    Here we are talking about the script/code kiddies, who downloads_installs_fires on a domain. If I remember correctly, there were plenty...
  25. Replies
    20
    Views
    27,476

    Simple method to do exactly is to create a...

    Simple method to do exactly is to create a robot.txt
Results 1 to 25 of 103
Page 1 of 5 1 2 3 4