Saturday, 17 January 2015

Fixing Kali linux errors. (startx not found, "oh no! something has gone wrong" etc)

After your fresh install of kali, you might run into some problems.One of them consists of the login screen missing and returning:







"Oh no! Something has gone wrong.
A problem has occured and the system can't recover. Please contact a system administrator"

To fix this issue (a temporary fix), press CTRL+ALT+F1, it will take you to the terminal. From there, check if you can use the command "startx"

If you get the following error:

root@kali:~#startx
-bash: startx: command not found
The problem would be that you don't have the x window system functioning yet, install it by using the command:
  apt-get install x-window-system
Let it install and from there, you should be able to access your graphical user interface using "startx"


# apt-get update 
# apt-get install xorg 
# startx

Note: The steps above need internet connection, so you need to connect your pc to wifi or LAN. Here i am use wifi connection. or you can simply connect to your LAN wire to access the internet
To connect wifi, follow below instructions :

# ifconfig wlan0 does not turn on your wireless card. It gives you information about your wlan0. To turn on your wireless card, you would enter 
#ifconfig wlan0 up. Although, it's not always wlan0. To find out the name of your wireless card, type iwconfig, and look at the row that has some information in it, not 'no wireless extensions'.
To be able to run the commands ifconfig wlan0 up, 
# iwconfig wlan0 'essid name' 'key password' and dhclient wlan0, you need to be root. So, you have to put the word sudo before those commands (unless you're already logged in as root).
The password in the command iwconfig wlan0 essid name key password should be in hexadecimal. If you want to type the ASCII password, you would use iwconfig wlan0 essid name key s:password.
The command iwconfig wlan0 essid name key password only works with access points that use WEP as encryption. If the access point uses WPA/WPA2, you'll have to use another method to connect, found here: How do I connect to a WPA wifi network using the command line?

After you follows step by step above intructions, i am pretty sure that you has login linux in GUI. The last one is you open terminal and type this command 
# apt-get install gnome-core kali-defaults kali-root-login desktop-base
# reboot

Now your linux boot normally and the problem fixed.

Sunday, 11 January 2015

The Best Alternative File Managers for Windows, Mac, and Linux



    Most people use their operating system’s included file manager, but many geeks prefer third-party file managers. After all, Windows Explorer does not offer tabs, a dual-pane interface, batch file-renaming tools, and more advanced features.
    If you’re happy with your default file manager, that’s fine. These alternatives are really only useful if you’re craving a particular feature not found in your current file manager.
    _____________________________________________________________________________
    Windows
    For as long as Windows Explorer has existed, Windows geeks have yearned for more features.There are many, many Windows Explorer alternatives out there.
    FreeCommander is a good option if you’re looking for tabs, a dual-pane interface, and all the other powerful features a Windows Explorer replacement can offer. Unlike many of the other available applications, it’s available entirely for free — although it isn’t open-source. You’re free to use it all you like, even for commercial purposes. No features are restricted to some sort of professional edition you have to pay for. Multi Commander is similar and also free.

    Explorer++ is free and open-source, so it also won’t try to nag you for money or install junk onto your system. It includes tabs, a customize able user interface, file-filtering features, and can even run as a portable app without any installation. It offers a cleaner interview than Free Commander, but without the dual-pane view and some other powerful features. If all you want is a tabbed interface and a few other things, this is a great option
    Other file manager replacements include Xplorer2XYplorerDirectory Opus, and Total Commander. All of these programs offer paid editions they want you to purchase. There are free versions available for most of them — Xplorer2 LiteXYplorer Free, and Directory Opus Light.They often lack many of the more powerful features found in the paid versions, but they’ll provide you with many of the features found in the paid versions.
   
  Mac OS X
    The Finder app included with Mac OS X does the basics, but it can certainly leave you wanting. As usual on Mac OS X, many of the alternative file-manager options available to you are generally paid software. You’ll have to shell out a few bucks to use them. On the bright side, this means that they see more development than many alternative Windows file managers, and their business model is selling software instead of trying to load your computer with crapware in their installers.
Cocoatech’s Path Finder is probably the most popular Finder replacement for Mac OS X, and we covered it as one of the best options if you want to merge folders on your Mac. It also includes a dual-pane interface and other powerful features. Developers in particular can get a lot of use out of its intergrated Git and Subeersion support, as well as easy access to a terminal.
Path Finder costs $40, but you can use the free 30-day trial to determine if you actually need all those fancy features.
  If you want some of these advanced features — like a dual-pane interface — but don’t want to spend money on this type of program, try XtraFinder. It’a free application that adds features to the Finder, including a dual-pane interface, a copy queue, global hotkeys, and many new menu options. It doesn’t include nearly as many advanced features as Path Finder does, but most people don’t need all those bonus features. This could hit a good sweet spot for many people.

   Linux


    It’s hard to talk about alternative file managers for Linux, as every desktop environment tends to include its own unique file manager. These file managers also tend to see more development and often include advanced features you’d only find in alternative file managers on other operating systems. But, thanks to the modularity of the Linux desktop, you could actually run a different desktop environment’s file manager on your current desktop.
For example, GNOME and Ubuntu’s Unity desktop include the Nautilus file manager. KDE includes the Dolphin file manager, Xfce includes the Thunar file manager, and LXDE includes PCManFM. Each file manager has its own unique features — for example, Xfce’s Thunar file manager includes an integrated Bulk Rename tool for quickly batch-renaming files.

Every file manager tends to match its desktop environment in philosophy. For example, GNOME’s Nautilus file manager is shedding features with every release, chasing GNOME’s goal of simplicity and minimalism. Dolphin is more feature-heavy and uses the Qt toolkit instead of GNOME and Xfce’s GTK toolkit. Thunar, like Xfce itself, is a more minimal, barebones file manager that still has everything you need and gets the job done. Like LXDE itself, the PCManFM file manager offers a fairly minimal, lightweight interface.
Perform a search for “file manager” or something similar in your Linux distribution’s package management interface and you’ll find a lot of options.
So, do we think everyone needs to hunt down an alternative file manager? Not at all. We’ve usually been happy with the integrated file managers, which are there and get the job done if you don’t need anything special.
But lots of geeks do love their alternative file managers, and for good reason. They offer powerful features that can save you a lot of time if you need them.

Monday, 24 November 2014

Run Programs Without Installing in Windows



Do you know how to run programs without installing in windows pc? No, then I will tell you how to do that. Most of people uses various software, and to save disk space you would like to uninstall some of them. While installing and then uninstalling programs is a tiresome process, it also junks the system registry which causes a slow performance of your system. In this article, I am going to introduce a new software installation system that works in a totally different way. You won’t need to install any program to run it i.e you can run programs without installing.

Zero Install, a dedicated platform independent software installation system does the work for you. It does nor install any software/application in your system. It runs them directly from its own interface. The publishers can publish the software at their own server which means the users can enjoy the latest version of the application without taking part into any update process.



Configuration of Zero Install
The Zero Install comes in two terms. You can either install Zero Install by downloading the appropriate version for your OS or run the portable version directly. Once you run the software, you will be given by a list of application that you can run without installing them. You can also add your own software at the list by complying with the Zero install XML Metadata format guidelines.






Zero Install is fully customizable according to your need. You can configure it from the “Option” button. The drop-down arrow of the “Option” button lets you to configure the advanced options. This is for the advanced user only as any misconfiguration can prevent Zero Install from working properly.





Clicking on the button instead of the arrow takes you into the standard Options window.





Here, you can choose the update options from the “Updates” tab. The Full mode option always checks for available updates and downloads it when you want to run any program. The Minimal mode downloads updates when it is necessary. The Offline mode downloads nothing. You can also allow Zero Install to serve the available beta versions of any software by selecting (Alt +U) “Use beta versions of applications when available”.
Head to the “Storage” tab to set the storage location of the implementation files and the temporary files/folders.
The “Catalog” tab lets you to add new source link of software. By default, only 0install.de is set as the software source.
The “Trust” tab contains the list of trusted keys which are used to keep a link between the catalog server and your computer. You can delete them to reset the keys.


How to Run programs without installing

Once you configured Zero Install properly, back to the “Catalog” tab of the main window of Zero Install. You will be given by the list of  available applications. Press the “Refresh” button ( Alt + R) to view the latest catalog. Here, you can see three buttons with each
item in the list. Clicking the “Run” button directly will start downloading the item from the application server. You can also use the drop-down arrow of the “Run” button  to modify the command argument. It also lets you to select the version you want to run as Zero Install allows running different versions at the same time.





The second button is to integrate the Setup with your Desktop and/or Start menu. This button remains inactive unless you run the application for first time. The third one is to add the item to your favorite app list.

How does Zero Install work:
Pressing the “Run” button for first time will download the necessary files to run the program. But keep in your note that Zero Install never installs that application at your computer locally. The applications are run directly from the Zero install platform. So if you clear the cache, the applications will be lost and you will need to download them again.

As Zero install is a cross-platform system, you won’t need to search for platform specific packages of your favorite applications. This software also has a portable version. So, you can easily keep it at your USB drive. Doing so, you can install the applications at the USB drive and run them in any computer from the USB drive.

Download Link:- Click Here




Tuesday, 1 April 2014

Data Base & My Sql Injection ?

What is Database and MY SQL Injections
_______________________________________________________

In this we'll give you intro to the SQL Injections. In next post we'll give you detailed information about the SQL injections.

What is the Database?

_________________________________________________________________________________
Database is an application that stores a collection of data.Database offers various APIs for creating, accessing and managing the data it holds. And database(DB) servers can be integrated with our web development so that we can pick up the things we want from the database without much difficulties.

Database is a place that stores username,passwords and more details. Database should be secured. But providing high level security is not possible for all sites(much costlier or poor programming ). So Database of many websites is insecure or vulnerable(easily hackable).

Some List of Database are:

_________________________________________________________________________________
DB servers,
MySQL(Open source),
MSSQL,
MS-ACCESS,
Oracle,
Postgre SQL(open source),
SQLite,

What is SQL injection?
_________________________________________________________________________________
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?
_________________________________________________________________________________
ByPassing Logins
Accessing secret data
Modifying contents of website
Shutting down the My SQL server

Monday, 31 March 2014

What is Port Scanning ?

What is Port Scanner? what is the use?
_________________________________________________________________________________



What is port Scanning?
_____________________________________________________________________________________________
You should understand what is port scanning . Port scanning is the process of checking which port is opened and which ports are locked. Just like a thief who searching for a gate opened house.

What is the Use?
_____________________________________________________________________________________________
By finding which port is opened ,you can try to communicate with victim system remotely and access their

Port Scanning:
_____________________________________________________________________________________________
Port scanning is the process of searching for active or opened ports in victim system. Just like a thief searching for gate opened house. Consider this scanning

Starting Scan.

Target Host: www.yourcompany.com or IP Address

TCP Port :7 (echo)
TCP Port :9 (discard)
TCP Port :13 (daytime)
TCP Port :19 (chargen)
TCP Port :21 (ftp)
TCP Port :23 (telnet)
TCP Port :25 (smtp)
TCP Port :37 (time)
TCP Port :53 (domain)
TCP Port :79 (finger)
TCP Port :80 (www)
TCP Port :110 (pop)
TCP Port :111 (sunrpc)
Finished.




It shows the active ports in that domain or ip address

What is the Use?
_____________________________________________________________________________________________
what we can do with these ports? we can communicate with the victim system remotely using those active ports. So we can get their data without their knowledge.(The thing is that you can theft their data).

Scanning for open ports is done in two ways.

Scan a single IP address for open ports:
It just like a thief who searching for any opened gate in single house.
In relation to scanning, the gate is port and house is IP address.
We are searching for the active port in a single IP address
Eg:
searching for active ports only at 123.xx.xx.xx
Scan a range of IP address to find open ports:
Scanning a range of IP address is like thief who searching for any opened gate in a street. In relation to scanning, the gate is ports and street is range of ip address

Eg:
searching active ports only at
123.20.xx.xx to 123.30.xx.xx

Eg:-

* 21: FTP
* 22: SSH
* 23: Telnet
* 53: Domain Name System
* 80: World Wide Web HTTP
* 119: Network News Transfer Protocol
* 443: HTTP over Transport Layer Security/Secure Sockets Layer
* 445: microsoft-ds, Server Message Block over TCP

If these ports are not secure a hacker can communicate with these ports and cause havoc
The list given below are some of the best port scanners
You can download from the links given below:
Nmap:
This tool developed by Fyodor is one of the best unix and windows based port scanners. This
advanced port scanner has a number of useful arguments that gives user a lot of control over the
process.

From:
Insecure.org
Download:
http://nmap.org/download.html

Superscan
A Windows-only port scanner, pinger, and resolver SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

From:
http://www.foundstone.com/
Download
http://www.foundstone.com/us/resources/proddesc/superscan4.html

Angry IP Scanner:
_____________________________________________________________________________________________
A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic
host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

From:
http://www.angryziber.com/
Download:
http://www.angryziber.com/w/Download

Unicornscan:
_____________________________________________________________________________________________
Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering
and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

From
http://www.unicornscan.org/

_____________________________________________________________________________________________


Enjoy Hack :D