Monday, 8 October 2018

Google dorks (Specific File(s))

Depends entirely on what you are looking for, here are some:


"favorite links" Keyword(s)


"favorite links"


"favorite sites" Keyword(s)


"favorite sites"


"Keyword(s) sites"


"Keyword(s) website"


"Keyword(s)"


"list * Keyword(s) * sites"


"list * Keyword(s)"


"list of Keyword(s) sites"


"list of Keyword(s)"


"recommended links" Keyword(s)


"recommended links"


"recommended sites" Keyword(s)


"recommended sites"


directory * Keyword(s)


intitle:directory "Keyword(s)"


inurl:directory "Keyword(s)"


Keyword(s)


Keyword(s) * directory


Keyword(s) catalog


Keyword(s) directory


Keyword(s) sites


Keyword(s) websites |Keyword(s)


Keyword(s) websites

Share:

Full-stack Web Developer (Complete Guide)

Summary: a full-stack web developer is someone who has honed skills in both front-end web design/development and back-end/server coding. You can count on a full-stack web developer to design, code, implement and maintain a fully functional modern interactive website on his/her own (not just a static website with a few pages).

Full-stack Web Developer


With the ever evolvement of the almighty World Wide Web, new job functions are created virtually every day. Just a few years ago, you only needed a web designer to create the visual design in Photoshop and/or Dreamweaver and a web developer to code the front-end/back-end scripts and the website was ready to go. At that time, websites were charged based on the number of “pages” (a concept borrowed from print design).

Fast forward to the present, we now have (not a exhaustive list) :

  • visual designer

  • web designer

  • UI designer

  • UX designer

  • interaction designer

  • art director

  • front-end developer

  • back-end developer

  • web developer

  • mobile developer

  • database developer

  • database administrator

  • web master

  • web server administrator

  • SEO specialist

  • web analyst

  • web security professional

  • quality assurance tester

  • project manager

  • growth hacker



Several roles may be taken up by the same individual depending on the size of the company and the resources. Very large and profitable companies may gather experts from each field in their teams with a view to create the best-ever-possible web products of the world.

But normally, in the down-to-earth company, the web designer/developer distinction still applies. The web designer will be responsible for the visual/web/UI/UX/interaction design while the web developer will do the front-end coding/back-end coding/database administration/server setup/debugging/etc. However, problems always occur in areas when the two have to work together yet only either one takes responsible. Factors like miscommunications/false assumptions of job role and scope/misunderstanding of the technology/etc. will render the end product a subpar one.

This is where a full-stack web developer can fill the gap. A full-stack web developer masters the best of both worlds (or to a minimum understands both worlds). (S)He will be able to steer the web projects in the right direction utilizing the best practices and latest advancements in the technology. (S)He will design and code the whole web project themselves or supervise others to perform the tasks by overlooking the whole process from scratch to finish.

When websites and web applications become more and more interactive and sophisticated, understanding the technical capabilities of the systems and having an eye for artistic/usability judgement are critical to the success. So it is natural for web professionals to evolve to full-stack web developers in due course.
Designers will become more like programmers as programming becomes more like design.

However, designing and coding are two distinct skills that require different regions of the brain to master . The right brain is for visual and creativity and the left brain is for structure and organization. Designers are predominately right-brainers while coder left-brainers. So there is still only a handful of full-stack web developer on the market .

Benefits of Being a Full-Stack Web Developer



  1. You can build a professional website from scratches for your employer.

  2. You can be a competent member in cross-functional Agile teamswhere you can perform both front-end and back-end development. As Agile project management is fast becoming the norm for web application development and UI/UX is gaining in importance for the success or failure of any web application, you will be seen as a valuable team member contributing to the success of projects.

  3. You can start your own website design and development business.

  4. You can build your own websites and monetize them through Adsense, affiliate marketing, selling your own products and more. The best of this is the flexibility of earning extra money alongside your regular job. There are many great examples of web developers turning this business into a career and quitting their regular jobs.

    • as an example, you can utilize your knowledge in web development to help others to select the most suitable website hosting plan with an earning of US$85 per referral.

      • Click here to join the A2 Hosting affiliate program for freeFor a limited time, you will get US$10 upon signing up (there is a earning threshold of US$100 (i.e. 2 referrals) before they will send you the money). You will need to have a website to be eligible for the program.

      • Don’t worry if you don’t have a website, you can get unlimited hosting for a monthly fee as low as US$3.89 (with use of coupon code: WHTPRIME, please activate the discount here and click “Web Hosting” on the menu bar).





Share:

URL Rewriting (Complete Guide)

Original URL:
Eg:http://example.com/followers.php?id=techyganga

Rewriting URL
Eg:http://example.com/9lessons/followers



.htaccess Code
RewriteEngine On

RewriteRule ^([a-zA-Z0-9_-]+)/\followers$ followers.php?id=$1

RewriteRule ^([a-zA-Z0-9_-]+)/\following$ following.php?id=$1
Share:

SigPloit Framework (What You Need To Know)WYNTK

SigPloit Framework – Telecom Vulnerability Testing for SS7, GTP (3G), Diameter(4G), and SIP Made Easy


 

SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being in use.

What is SigPloit


As described on GitHub, SigPloit is a framework intended for telecom security specialists. Researchers can use SigPloit for penetration testing of telecom networks in order to find known vulnerabilities in signaling protocols.

The stated purpose of the framework is security testing of all existing protocols that are used in telecom operators’ infrastructure, including SS7, GTP (3G), Diameter (4G), and even SIP for IMS and VoLTE, which is used at the access level and for encapsulating SS7 messages in SIP-T. According to the documentation, SigPloit uses testing results to provide network-specific recommendations on how to improve security.

SiGploit is developed on several versions


Note: In order to test SS7 attacks, you need to have an SS7 access or you can test in the virtual lab with the provided server sides of the attacks, the used values are provided.

Version 1: SS7


SiGploit will initially start with SS7 vulnerabilities providing the messages used to test the below attacking scenarios A- Location Tracking B- Call and SMS Interception C- Fraud

Version 2: GTP


This Version will focus on the data roaming attacks that occur on the IPX/GRX interconnects.

Version 3: Diameter


This Version will focus on the attacks occurring on the LTE roaming interconnects using Diameter as the signaling protocol.

Version 4: SIP


This is Version will be concerned with SIP as the signaling protocol used in the access layer for voice over LTE(VoLTE) and IMS infrastructure. Also, SIP will be used to encapsulate SS7 messages (ISUP) to be relayed over VoIP providers to SS7 networks taking advantage of SIP-T protocol, a protocol extension for SIP to provide intercompatability between VoIP and SS7 networks

Version 5: Reporting


This last Version will introduce the reporting feature. A comprehensive report with the tests done along with the recommendations provided for each vulnerability that has been exploited.
BETA Version of SiGploit will have the Location Tracking attacks of the SS7 phase 1

Installation and requirements


The requirements for this project are:
1) Python 2.7
2) Java version 1.7 +

To run use
python bin/SiGploit.py

Download Sigploit
Share:

Computer Strain (Save you eyes and Future)

No more watery eyes, when you wake up from sleep in the middle of the night to work on your bright computer screen. Your eye savior, f.lux is here. First things first, what is f.lux and why do you need it?


 


Why do you need f.lux ?


Decreasing the brightness is not that attractive an option, because the blue light emissions from your screen is still significant enough to well up your eyes with water and completely ruin your sleepy state. It is proven that exposure to blue light significantly aids in keeping you awake for a longer time in the night.

To get to the science behind it, here’s why. Most of us don’t know this, but there is another kind of receptor cells beside rods and cones in our retina. It’s called Melanopsin. The discovery was made about 15 years ago. Melanopsin is sensitive to narrow band of blue light in 460-480 nm range. Melanopsis works different functions for different creatures, but that’s another story.

There are two things I’d like to recommend to your reading list to get more information about melanopsin and effect of blue light on sleep:

1) Internal Time by Til Roennberg

2) Research Papers and articles – link

What is f.lux what does it do?


f.lux is a desktop applet for Windows, Linux, Mac, iPhone, iPad and iPod touch which limits the glow of your screen. Instead, it replaces that with a warm tone. There is no problem for your eyes not to feel comfortable on the screen in the morning. The daylight is sufficient and doesn’t let your eyes feel the glow that the screen throws. But say at 11 PM while you are, say trying to work late after sneaking on your father or wife, you power up your computer and you get instantly taken back by the brightness!

You can reduce the brightness and contrast to a certain extent, but there is a limit to which you can go without compromising your experience. f.lux comes to rescue here. It automatically switches to a warm tone at night and goes back to a brighter shade in the morning.

Don’t worry as it uses only 3.86MB of RAM approximately, is completely free, has no CPU load and works like a charm without any user interference. The working is also fairly simple. You can also customize the way it works, especially how warm you want your screen to be at night.

How to use f.lux to save your eyes?


It does the work by calculating your present location (through google maps)and works according to the sunrise/sunset cycle. The f.lux indicator applet automatically manages the color temperature of your screen based on your latitude and longitude, or if you are in the US, your zip code.



 

In the preferences panel, you can set your preferred night-time color temperature and see a preview, as well as seeing the current color temperature.

 





You can even pause the applet if you want to:



You can download f.lux for windows here and for Mac here.
For iPhone, iPad and iPod Touch you need to jailbreak your device in order to install it. You can follow the instructions here.

To install f.lux on Linux (Ubuntu) open up the terminal and copy paste the following commands one by one.



If you are having an error in adding the ppa (the first command), follow this link to troubleshoot it.

The Linux GUI of the f.lux applet doesn’t provide as much customizing options as that of the other platforms, so if you are interested in adding features to it, you could do it on its open source code on GitHub.

If you have any other query regarding f.lux, comment your queries below. Do share your experiences.
Share:

How to Change your Site from HTTP to HTTPS Complete guide

HTTP to HTTPS


Scenario :


You want to force people coming to your site to use HTTPS. Either for the entire site or a small sub-section of it.


Note


Using mod_rewrite to do this isn't the recommended behavior. 



Fix :



RewriteEngine On
# This will enable the Rewrite capabilities

RewriteCond %{HTTPS} !=on
# This checks to make sure the connection is not already HTTPS

RewriteRule ^/?(.*) https://%{SERVER_NAME}/$1 [R,L]
# This rule will redirect users from their original location, to the same location but using HTTPS.
# i.e. http://www.example.com/foo/ to https://www.example.com/foo/
# The leading slash is made optional so that this will work either in httpd.conf
# or .htaccess context


Entire site (.htaccess) :


Note: While the rules you need are the same as above (because the rule above doesn't depend on any of the quirks of rewrite in .htaccess), you will need to ensure that you place this in a .htaccess file in the root of the site you want to apply it against, and to make sure you have the appropriate AllowOverride configuration in your httpd.conf


Specific Directory


Either put the above solution in a .htaccess file in the directory to be affected, or put the URI prefix in the regex itself.




RewriteEngine On
# This will enable the Rewrite capabilities

RewriteCond %{HTTPS} !=on
# This checks to make sure the connection is not already HTTPS

RewriteRule ^/?secure/(.*) https://%{SERVER_NAME}/secure/$1 [R,L]
# This rule will redirect all users who are using any part of /secure/ to the same location but using HTTPS.
# i.e. http://www.example.com/secure/ to https://www.example.com/secure/
# This means if you dont want to force HTTPS for all directories you can force it for a specific sub-section of the site.

 
Share:

Complete A-Z Kali Linux Commands

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.

Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer’s hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.

Here below we are listing A-Z Kali Linux commands which will help you to ease of flow in work.

 























































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































Kali Linux commandsFunction
A
 apropos Search Help manual pages (man -k)
 apt-get Search for and install software packages (Debian)
 aptitude Search for and install software packages (Debian)
 aspell Spell Checker
 awk Find and Replace text, database sort/validate/index
B
 basename Strip directory and suffix from filenames
 bash GNU Bourne-Again Shell
 bc Arbitrary precision calculator language
 bg Send to background
 break Exit from a loop
 builtin Run a shell builtin
 bzip2 Compress or decompress named files
C
 cal Display a calendar
 case Conditionally perform a command
 cat Concatenate and print (display) the content of files
 cd Change Directory
 cfdisk Partition table manipulator for Linux
 chgrp Change group ownership
 chmod Change access permissions
 chown Change file owner and group
 chroot Run a command with a different root directory
 chkconfig System services (runlevel)
 cksum Print CRC checksum and byte counts
 clear Clear terminal screen
 cmp Compare two files
 comm Compare two sorted files line by line
 command Run a command – ignoring shell functions
 continue Resume the next iteration of a loop
 cp Copy one or more files to another location
 cron Daemon to execute scheduled commands
 crontab Schedule a command to run at a later time
 csplit Split a file into context-determined pieces
 cut Divide a file into several parts
D
 date Display or change the date and time
 dc Desk Calculator
 dd Convert and copy a file, write disk headers, boot records
 ddrescue Data recovery tool
 declare Declare variables and give them attributes
 df Display free disk space
 diff Display the differences between two files
 diff3 Show differences among three files
 dig DNS lookup
 dir Briefly list directory contents
 dircolors Colour setup for `ls’
 dirname Convert a full pathname to just a path
 dirs Display list of remembered directories
 dmesg Print kernel & driver messages
 du Estimate file space usage
E
 echo Display message on screen
 egrep Search files for lines that match an extended expression
 eject Eject removable media
 enable Enable and disable builtin shell commands
 env Environment variables
 ethtool Ethernet card settings
 eval Evaluate several commands/arguments
 exec Execute a command
 exit Exit the shell
 expect Automate arbitrary applications accessed over a terminal
 expand Convert tabs to spaces
 export Set an environment variable
 expr Evaluate expressions
F
 false Do nothing, unsuccessfully
 fdformat Low-level format a floppy disk
 fdisk Partition table manipulator for Linux
 fg Send job to foreground
 fgrep Search files for lines that match a fixed string
 file Determine file type
 find Search for files that meet a desired criteria
 fmt Reformat paragraph text
 fold Wrap text to fit a specified width
 for Expand words, and execute commands
 format Format disks or tapes
 free Display memory usage
 fsck File system consistency check and repair
 ftp File Transfer Protocol
 function Define Function Macros
 fuser Identify/kill the process that is accessing a file
G
 gawk Find and Replace text within files
 getopts Parse positional parameters
 grep Search files for lines that match a given pattern
 groupadd Add a user security group
 groupdel Delete a group
 groupmod Modify a group
 groups Print group names a user is in
 gzip Compress or decompress named files
H
 hash Remember the full pathname of a name argument
 head Output the first part of files
 help Display help for a built-in command
 history Command History
 hostname Print or set system name
I
 iconv Convert the character set of a file
 id Print user and group id’s
 if Conditionally perform a command
 ifconfig Configure a network interface
 ifdown Stop a network interface
 ifup Start a network interface up
 import Capture an X server screen and save the image to file
 install Copy files and set attributes
J
 jobs List active jobs
 join Join lines on a common field
K
 kill Stop a process from running
 killall Kill processes by name
L
 less Display output one screen at a time
 let Perform arithmetic on shell variables
 ln Create a symbolic link to a file
 local Create variables
locate Find files
 logname Print current login name
 logout Exit a login shell
 look Display lines beginning with a given string
 lpc Line printer control program
 lpr Off line print
 lprint Print a file
 lprintd Abort a print job
 lprintq List the print queue
 lprm Remove jobs from the print queue
 ls List information about files
 lsof List open files
M
 make Recompile a group of programs
 man Help manual
 mkdir Create new folders
 mkfifo Make FIFOs (named pipes)
 mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem
 mknod Make block or character special files
 more Display output one screen at a time
 mount Mount a file system
 mtools Manipulate MS-DOS files
 mtr Network diagnostics (traceroute/ping)
 mv Move or rename files or directories
 mmv Mass Move and rename files
N
 netstat Networking information
 nice Set the priority of a command or job
 nl Number lines and write files
 nohup Run a command immune to hangups
 notify-send Send desktop notifications
 nslookup Query Internet name servers interactively
O
 open Open a file in its default application
 op Operator access
P
 passwd Modify a user password
 paste Merge lines of files
 pathchk Check file name portability
 ping Test a network connection
 pkill Stop processes from running
 popd Restore the previous value of the current directory
 pr Prepare files for printing
 printcap Printer capability database
 printenv Print environment variables
 printf Format and print data
 ps Process status
 pushd Save and then change the current directory
 pwd Print Working Directory
Q
 quota Display disk usage and limits
 quotacheck Scan a file system for disk usage
 quotactl Set disk quotas
R
 ram ram disk device
 rcp Copy files between two machines
 read Read a line from standard input
 readarray Read from stdin into an array variable
 readonly Mark variables/functions as readonly
 reboot Reboot the system
 rename Rename files
 renice Alter priority of running processes
 remsync Synchronize remote files via email
 return Exit a shell function
 rev Reverse lines of a file
 rm Remove files
 rmdir Remove folders
 rsync Remote file copy (Synchronize file trees)
S
 screen Multiplex terminal, run remote shells via ssh
 scp Secure copy (remote file copy)
 sdiff Merge two files interactively
 sed Stream Editor
 select Accept keyboard input
 seq Print numeric sequences
 set Manipulate shell variables and functions
 sftp Secure File Transfer Program
 shift Shift positional parameters
 shopt Shell Options
 shutdown Shutdown or restart linux
 sleep Delay for a specified time
 slocate Find files
 sort Sort text files
 source Run commands from a file
 split Split a file into fixed-size pieces
 ssh Secure Shell client (remote login program)
 strace Trace system calls and signals
 su Substitute user identity
 sudo Execute a command as another user
 sum Print a checksum for a file
 suspend Suspend execution of this shell
 symlink Make a new name for a file
 sync Synchronize data on disk with memory
T
 tail Output the last part of file
 tar Tape Archiver
 tee Redirect output to multiple files
 test Evaluate a conditional expression
 time Measure Program running time
 times User and system times
 touch Change file timestamps
 top List processes running on the system
 traceroute Trace Route to Host
 trap Run a command when a signal is set(bourne)
 tr Translate, squeeze, and/or delete characters
 true Do nothing, successfully
 tsort Topological sort
 tty Print filename of terminal on stdin
 type Describe a command
U
 ulimit Limit user resources
 umask Users file creation mask
 umount Unmount a device
 unalias Remove an alias
 uname Print system information
 unexpand Convert spaces to tabs
 uniq Uniquify files
 units Convert units from one scale to another
 unset Remove variable or function names
 unshar Unpack shell archive scripts
 until Execute commands (until error)
 uptime Show uptime
 useradd Create new user account
 usermod Modify user account
 users List users currently logged in
 uuencode Encode a binary file
 uudecode Decode a file created by uuencode
V
 v Verbosely list directory contents (`ls -l -b’)
 vdir Verbosely list directory contents (`ls -l -b’)
 vi Text Editor
 vmstat Report virtual memory statistics
W
 wait Wait for a process to complete
 watch Execute/display a program periodically
 wc Print byte, word, and line counts
 whereis Search the user’s $path, man pages and source files for a program
 which Search the user’s $path for a program file
 while Execute commands
 who Print all usernames currently logged in
 whoami Print the current user id and name (`id -un’)
 wget Retrieve web pages or files via HTTP, HTTPS or FTP
 write Send a message to another user
X
 xargs Execute utility, passing constructed argument lists
 xdg-open Open a file or URL in the user’s preferred application
Y
 yes  Print a string until interrupted


 

 
Share:

Sample Text

Copyright © Promoting Unique Content | Powered by Blogger Design by ronangelo | Blogger Theme by NewBloggerThemes.com