Samiux's Blog

Open Source is a great idea and it has changed the world! Open Source forever ....

While you do not know attack, how can you know about defense? (未知攻,焉知防?)

Do BAD things .... for the RIGHT reasons -- OWASP ZAP

It is easier to port a shell than a shell script. -- Larry Wall

Most of you are familiar with the virtues of a programmer. There are three, of course: laziness, impatience, and hubris. -- Larry Wall

为天地立心, 为生民立命, 为往圣继绝学, 为万世开太平。 -- 王炜

Tuesday, October 28, 2014

Do Not Trust Your Download Even It Is From The Trusted Source

›
Joshua Pitts developed a tool suite for injecting backdoor to executable files of Windows, Linux and Mac OSX as well as FreeBSD. The proces...
Thursday, October 16, 2014

VULNERABLE : Poodle SSLv3 Vulnerability

›
What is Poodle Vulnerability? Google researchers have discovered a security vulnerability in SSL 3.0 that allows attackers to decrypt encr...
Thursday, October 02, 2014

HOWTO : CUDA with Kali Linux 1.0.9

›
The guide has been updated on FEB 4, 2015 as Kali Linux 1.0.9a includes the nVidia driver 340.x and CUDA 5.5.x. Hardware CPU : Intel i7-...
Wednesday, October 01, 2014

HOWTO : Uninstall a specific software/package in Kali Linux 1.0.9

›
Since I need to run Ollydbg for a while, I then installed Wine in Kali Linux. When I no longer require Ollydbg, I would like to uninstall W...
Tuesday, September 30, 2014

Black Hat USA 2014 - Network: Evasion of High End IPS Devices in the Age of IPv6

›
That's all! See you.
Sunday, September 28, 2014

Kali Linux Nexus NetHunter

›
The official site is here . The setup guide is here . Kali Linux NetHunter HID Attack from Offensive Security on Vimeo . A quick dem...
Friday, September 26, 2014

Exploit : Shellshock proof of concept – Reverse shell

›
The official site is here . Online Web Server Testing Tool That's all! See you.
Friday, September 05, 2014

TED : Keren Elazari - Hackers: the Internet's immune system

›
Official page is here . That's all! See you.
Thursday, September 04, 2014

REVIEW : ZOTAC ZBOX C1320 Nano Plus

›
I am going to test ZOTAC ZBOX C1320 Nano Plus with Kali Linux 1.0.9 64bit. CPU : Intel Celeron N2930 (Quad-core, 1.83GHz, up to 2.16GHz) ...
Tuesday, August 19, 2014

HOWTO : SQLMap for Cloudflare protected sites

›
When you suspect your target site is vulnerable to SQLi and you find out that it is protected by Cloudflare, you can still to launch SQLMap ...
Friday, July 18, 2014

Defense your Network and Servers

›
Intruders will conduct reconnaissance on your network and servers before performing the attack. After that, intruders will perform the atta...
Tuesday, July 15, 2014

ALGORITHM - the_hacker_movie

›
The official site is at here . That's all! See you.
Thursday, July 03, 2014

HOWTO : ECS LIVA Mini PC Kit on Ubuntu 14.04 LTS

›
ECS Liva Mini PC kit is the smallest x86 PC in the world so far. The BIOS is UEFI, so that only Ubuntu besides Windows 8.1 can be installe...
Wednesday, July 02, 2014

Tsunami - DNS Amplification Attack Tool

›
Tsunami is a DNS Amplification Attack Tool which is collected from the internet and modified by Samiux. It is designed for testing your ser...
Sunday, June 29, 2014

HOWTO : Shellter on PE files

›
Shellter is a dynamic shellcode injection tool, and probably the first dynamic PE infector ever created. It can be used in order to injec...
Saturday, June 28, 2014

HOWTO : The Mole on Kali Linux 1.0.7

›
The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect t...
Saturday, June 14, 2014

HOWTO : Fix the half installed package in Kali Linux/Debian

›
I forgot to delete the Iceweasel on my Kali Linux before installing Firefox. The firefox installation is failed as expected. I removed the...
Wednesday, June 11, 2014

sysdig and Attackers

›
When a system is compromised, attackers usually erase the syslog and other related log files in order to hide his/her intrusion activities. ...
Sunday, June 01, 2014

Facebook Vulnerability - Name by Phone Number

›
ubugnu discovered a vulnerability in Facebook that you can search the users in the Facebook by random generated telephone numbers. He also...
Monday, May 19, 2014

Croissants - Intrusion Detection and Prevention System

›
INTRODUCTION In 2013, I joined the SmoothSec project and modified it to adopt to Intrusion Detection and Prevention System by using Suric...
‹
›
Home
View web version

About Me

My photo
Samiux
Somewhere in the Hell
View my complete profile
Powered by Blogger.