Theef
Theef is a backdoor Trojan. External references
Theef is a backdoor Trojan. External references
Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21” HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST” Contains cookies http.cookie Example: http.cookie External references…
Some laptop users prefer to use US international keyboards on their computer, despite their first language is not American English or they do not live in the USA. The reasons may vary: some are developers that find that characters frequently…
Parameters -f switch sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows fragmentation. In the ping command, the –l option means to send the buffer size in bytes. It is followed by the…
Examples nc -l -p 2222 | nc 10.1.0.43 1234 Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234
This post sums up the scattered information I have found regarding Certified Ethical Hacker (CEH) Practical Exam and my conclusions about how to prepare it. My intention is not to include real questions from the exam, but give advice to…
List of virus maker tools: DELmE’s Batch Virus Generator JPS Virus Maker Tool List of virus maker tools DELmE’s Batch Virus Generator DELmE’s Batch Virus Generator is a virus creation program with lots of options to infect the victim’s…
In the context of cybersecurity, footprinting is the technique used for gathering information about computer systems and the entities they belong to. This post may mix footprinting and reconnaissance tools. This post lists some footprinting tools. List of footprinting tools…
Web Server Penetration Testing: CORE Impact Immunity CANVAS Arachni WebSurgery List of Web Server Penetration Testing Tools CORE Impact Immunity CANVAS Arachni Home WebSurgery
List of web server attack tools Among the most popular, there is metasploit and Wfetch. List of web server attack tools metasploit Wfetch THC Hydra THC Hydra is a tool for brute-force password attack. It is FOSS under an AGPL-3.0…