exploit windows PC using eternalblue smb remote windows kernel pool corruption

This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv! SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool …

Read More »

HOWTO:change root password in Persistence Kali

Well, i just trying to do something to protect my persistence login and i found the way to do it, ex: 1. make your login with root using toor pw 2. open this file with any text editor like nano “/lib/live/config/0031-root-password” , just comment this line with put # at …

Read More »

HOWTO: Repair a broken Ext4 Superblock in Ubuntu

This has happened to me a few times, and it’s not a nice problem to find yourself in. You computer won’t boot, all your filesystem checks tell you you’ve a bad superblock, but you cant seem to find how to fix it. Well, here goes 🙂 This guide is for …

Read More »

What’s New in Windows Server 2016

The content in this section describes what’s new and changed in Windows Server® 2016. The new features and changes listed here are the ones most likely to have the greatest impact as you work with this release. There are several new additions in each of these areas: Compute, Identity, Management …

Read More »

PwnPi & Kali Installation Guide

Penetration Testing Distributions for Raspberry Pi PwnPi is a penetration testing distribution for the Raspberry Pi, this guide will explain how to install it for your Raspberry Pi. The best way to describe it can be found on the PwnPi website[1]: “PwnPi is a Linux-based penetration testing dropbox distribution for …

Read More »

Quick and easy fake WiFi access point in Kali

I’m working on a project at the moment that requires me to observe traffic from an iOS/Android app or any other computer Apps to various external IPs. This is the first step of my project 😉 (something in this article is not real , like MAC addresses, project Description , …

Read More »

بهترین کتابهای Hacking سال 2016 (دانلود)

The below hacking books in pdf format which you can easily read in any PDF reader. By reading these hacking tutorial pdf  you can learn some basic and advanced tricks and hack of Wifi, pen testing, some how to hack,cracking password,WiFi hacks and website hacking etc. These books are both for beginners …

Read More »

آشنایی با شبکه Frame Relay

تکنولوژی Frame Relayیک تکنولوژی لایه 2 شبکه های WANمی باشد که فرآیند Encapsulateکردن بسته های IPو ارسال آنها در شبکه را انجام میدهد و در دسته بندی NBMAیا NoneBroadcast Multi Accessقرار می گیرد. در شبکه Frame Relayارتباط روترها به صورت DTEو DCEمی باشند و به لینک ارتباط دهنده Access Linkگفته …

Read More »

انواع LSA در OSPF

انواع بسته هایی که در OSPF ، روتر ها به سمت یکدیگر ارسال می کنند، شامل 5 نوع می باشد. این 5 نوع یا Type عبارتند از: Type 1: Hello روترهایی که روتینگ پروتکل OSPF را اجرا می کنند بر طبق زمانبندی مشخصی که معمولا هر 10 ثانیه یکبار هست …

Read More »

کشف مقایر متغیر های Plain Text از حافظه در سیستم عامل اندروید

1. Upload the file$ adb push gdbserver /sdcard  2. Enter a shell and become root $ adb shell $ su 3. Remount /system as read/write $ mount -o rw,remount /system 4. Copy file to /system/xbin (or /system/bin) $ cp /sdcard/gdbserver /system/xbin 5. Change permissions to ensure that it is executable …

Read More »