Posts

HOW TO PERFORM DOS ATTACK IN WINDOWS USING SINGLE LINE COMMAND

Image
  HOW TO PERFORM DOS ATTACK IN WINDOWS USING SINGLE LINE COMMAND This kind of attack is know as ping of death.to initiates the attack one sends the malicious data packet to the target. When the data are received by the target system ,the system encounters an error that causes it to crash Step 1: The syntax for the command is ping <ip address> -l 65500 -w 1 -n 1 -l 65500 : This parameter sets the size of the ICMP echo request packet in bytes. In this case, it sets the packet size to 65500 bytes. The maximum size of an ICMP packet varies depending on the operating system and network configuration. However, setting it to such a large value is not typical and may not be supported by all systems. -w 1 : This parameter sets the timeout in seconds for each ping attempt. In this case, it sets the timeout to 1 second. If the target host does not respond within this time frame, the ping attempt is considered unsuccessful. -n 1 : This parameter specifies the number of ping att...
Image
  HOW TO USE JOHN THE RIPPER PASSWORD CRACKING TOOL Step 1: Initially we need to create a text file as shown below, YIKES never mind content I've written  Step 2: we can see that we can able to see the file using ls command Step 3: let us zip the text file and we add password for it and save it as zip file Step 4: we can able to notice the the zip file here Step 5: When we tried to unzip the file it asks password right, assume that we don't have a password. Step 6: initially we need to change the zip file to hash file for that follow the below syntax. Step 7: we can able to see the hash file Step 8: tadow!!!! we can able to see the password in the below screenshot

Things should do after sublister(sublist3r)

Image
Things should do after sublister(sublist3r)  Sublist3r is tool which is used by pentester  which shows unique subdomains as I showed below  you won't get https:// in the begging of these url ,here I have a solution for it i.e ive developed a one line script for this Step 1: copy all the subdomains, After that use the command nano and store all the links and name it You see,there no https:// infront of the subdomains Step 2: USE THE BELOW COMMAND  sudo python -c "with open('input.txt', 'r') as infile, open('output.txt', 'w') as outfile: outfile.write('\n'.join(['https://' + line.strip() for line in infile]))" boom!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Create a linux instances inAWS EC2 VIA Putty

Image
  Launch an EC2 Machine in a Public Subnet   Create a linux instances inAWS EC2 VIA Putty Hey guys, its been a while am writing a blog coz, My blog mail id was hacked and I struggled to get this id once more. Lets spin up to content , well actually am with different content i.e Cloud computing in aws  Here i gonna elaborate the steps briefly to create linux instance in aws ec2 Launch an EC2 Machine in a Public Subnet Step 1: Navigate to the instances(running) option Step 2: Click the launch instances button which is in top corner   Step 3: After launching the instances name the instances as Cogniv(its our wish to keep the name for the instances),Here I have named it as a Cogniv Step 4: After that choose the operating System ,its depends on your usage and wish.Here I have choosed the ubuntu as my primary os for this instances     Step 5: Here the Instances type we use is t2.micro(free tire) Step 6: After choosin...

AUTOMATED SCRIPT FOR FINDING XSS

Image
 AUTOMATED SCRIPT FOR FINDING XSS               An example of a web security vulnerability is cross-site scripting (XSS), which enables attackers to insert malicious executable scripts into the code of a website or application that is trusted. An XSS attack is frequently started by an attacker tempting a user to click on a malicious link that they deliver to them. Through cross-site scripting (XSS) assaults, attackers can get around access restrictions like the same-origin policy, which separates websites from one another.Zero When the victim accesses the website or application that runs the malicious code, the attack really takes place.1. Malicious scripts are injected into websites that are otherwise trustworthy and benign in an exploit known as cross-site scripting (XSS). HERE IS THE SCRIPT THAT AUTOMATES XSS DETECTION  cat urls.txt| egrep -iv ".(jpg|jpeg|js|cs|gif|tiff|png|woff|woff2|ico|pdf|svg|txt)" |qsreplace ' "><()'|tee c...

Terms and Conditions

Terms and Conditions Welcome to read it gain it ! These terms and conditions outline the rules and regulations for the use of securityblog's Website, located at https://readitgainit.blogspot.com/. By accessing this website we assume you accept these terms and conditions. Do not continue to use read it gain it if you do not agree to take all of the terms and conditions stated on this page. The following terminology applies to these Terms and Conditions, Privacy Statement and Disclaimer Notice and all Agreements: "Client", "You" and "Your" refers to you, the person log on this website and compliant to the Company's terms and conditions. "The Company", "Ourselves", "We", "Our" and "Us", refers to our Company. "Party", "Parties", or "Us", refers to both the Client and ourselves. All terms refer to the offer, acceptance and consideration of payment necess...

Disclaimer

Disclaimer for securityblog If you require any more information or have any questions about our site's disclaimer, please feel free to contact us by email at canonminibeast@gmail.com. Our Disclaimer was generated with the help of the Free Disclaimer Generator. Disclaimers for read it gain it All the information on this website - https://readitgainit.blogspot.com/ - is published in good faith and for general information purpose only. read it gain it does not make any warranties about the completeness, reliability and accuracy of this information. Any action you take upon the information you find on this website (read it gain it ), is strictly at your own risk. read it gain it will not be liable for any losses and/or damages in connection with the use of our website. From our website, you can visit other websites by following hyperlinks to such external sites. While we strive to provide only quality links to useful and ethical websites, we have no control over the conte...