Search:

Type: Posts; User: Hackuin

Page 1 of 5 1 2 3 4

Search: Search took 0.15 seconds.

  1. Replies
    5
    Views
    47,086

    why not just check the connected devices to the...

    why not just check the connected devices to the router and have a Mac-lookup which may give you hints of the devices. As mac vendors have a excellent API, a simple script may do it:
    Just copy the...
  2. Replies
    3
    Views
    5,301

    Quick python script :]

    import re
    import os
    from sys import argv

    try:
    my_script, folder, my_sting = argv
    except ValueError:
    print ("Usage(): python path_0f_folder your_string")
    exit()
  3. Replies
    0
    Views
    4,824

    Free VPN Auto Connect :]

    ####
    #
    #!/usr/bin/env bash
    #: Script for Free VPN.
    #: From: http://freevpn.me/accounts
    #: Author: hackuin
    #: Email: hackuin@ymail.com
    #
    ####
  4. Replies
    5
    Views
    3,693

    Oho, welcome buddy :] Good to see you over here!!

    Oho, welcome buddy :] Good to see you over here!!
  5. Sticky: Good one. Reverse Engineering is a very good...

    Good one.
    Reverse Engineering is a very good concept, hope to join you :]
  6. Replies
    11
    Views
    21,687

    ss Much faster then usual "netstat" And all...

    ss

    Much faster then usual "netstat"

    And all "ip" commands


    ip addr
    ip link
    ip route
  7. Replies
    2
    Views
    28,552

    Un usual ways of Linux

    Hello People.

    I guess, people might have read this article of mine, this for those who aren't on my list and who havn't read.

    -Hackuin
  8. Thread: Hacker Wanted

    by Hackuin
    Replies
    2
    Views
    5,180

    You mean, you ultra secret video of child sex you...

    You mean, you ultra secret video of child sex you had?
  9. Replies
    6
    Views
    6,350

    Ironically, to become a part of internal Network,...

    Ironically, to become a part of internal Network, 99% you need to go through great fire-china-wall.
  10. Replies
    5
    Views
    5,341

    Actually, Linux vs Windows, topics have done...

    Actually, Linux vs Windows, topics have done zillion time over various internel forums.
    I am not going to start it all over it again.
    What I would tell you is, it is personal conception, it depends...
  11. Replies
    5
    Views
    5,341

    Due to my sheer hatefulness towards win* OS. I...

    Due to my sheer hatefulness towards win* OS. I don't usually miss an opportunity to advice you to shift to Linux from windows.
  12. Replies
    5
    Views
    5,341

    Proxy is nothing but, like hiding your Identity....

    Proxy is nothing but, like hiding your Identity. When you connect to internet, you obviously use one of the IP address assigned to you by your ISP (Internet Service Provider). When you connect to any...
  13. Replies
    3
    Views
    3,745

    Well, I guess, as you do have decent deal of...

    Well, I guess, as you do have decent deal of experience with *nix OS, why not start with, OS/Network/firewall security. Programing languages especially, Python/Ruby/C/Assembly is very usefull. Pick...
  14. Thread: remote root

    by Hackuin
    Replies
    27
    Views
    49,158

    This remind me, the ironic situations. 568

    This remind me, the ironic situations.
    568
  15. Replies
    31
    Views
    64,618

    Sticky: If you are connected to wifi, it doesn't mean,...

    If you are connected to wifi, it doesn't mean, you can access internet. You need to understand that, if the network you are connected is not able to access internet, even if you connected to their...
  16. Replies
    8
    Views
    9,239

    @sonsofanarki: Foremostly you need to...

    @sonsofanarki:

    Foremostly you need to understand the reason why you are opted for reverse_tcp?
    The reason is simply for issue's involved with filtering devices at targeted host. As most of the...
  17. Replies
    2
    Views
    4,778

    Nmap is your friend. And, BTW, IP's don't...

    Nmap is your friend.

    And, BTW, IP's don't block ping, filtering devices/softwares does. :b
  18. I said, somewhat for the variables. Did you...

    I said, somewhat for the variables. Did you tested it?
    remove the last '/' from the DIR variable, or else the your DIR variable contains, "/usr/include/c++/4.6.3//.
  19. RahulB, good one, few notes: 1. However,...

    RahulB, good one, few notes:



    1. However, for this script it suffecient, for test command used, but remember if you are opting only one argument with the script, force/limit the user to use...
  20. Replies
    3
    Views
    3,095

    @OP: Can't you read the report? Its clearly...

    @OP:
    Can't you read the report?
    Its clearly tells you "EXPLOITABLE WITH -- CANVAS(true) and METASPLOIT(true)".
    Here is a link which might help you. HP data Protector.

    -Hackuin
  21. Replies
    1
    Views
    3,467

    Dear aixeiger, With half specification, we...

    Dear aixeiger,
    With half specification, we cannot help you out.

    What OS?
    What Firewall you are using?
  22. Replies
    28
    Views
    13,950

    No, videos will make you expert, until and unless...

    No, videos will make you expert, until and unless you start digging them.
    If you take CBT. or any other videos, they all try to make you understand stuff, they won't make you expert. Its your job to...
  23. Replies
    2
    Views
    2,715

    1. No one here will tell you how to break into...

    1. No one here will tell you how to break into his computer, so that you could retrive/delete your soo called stuff.
    2. Even if someone does or even if you really try hard you obviously going in...
  24. Replies
    20
    Views
    12,154

    @neo: Obviously, robot.txt is a security...

    @neo:

    Obviously, robot.txt is a security through obscurity.
    Here we are talking about the script/code kiddies, who downloads_installs_fires on a domain. If I remember correctly, there were plenty...
  25. Replies
    20
    Views
    12,154

    Simple method to do exactly is to create a...

    Simple method to do exactly is to create a robot.txt
Results 1 to 25 of 103
Page 1 of 5 1 2 3 4