Thursday, December 20, 2018

WHY AM I MENTIONING KALI LINUX

Kali Linux

Kali Linux is a freely available security Linux distribution designed especially for penetration testing and digital forensics. Kali Linux comes preinstalled with well over 200 security tools and can be booted from a live CD, live USB drive or virtual machine. Why am I mentioning Kali Linux? Kali happens to come preinstalled with all of the computer based tools we are covering here as well as the tools mentioned in the previous chapter. Since social engineering testing is sometimes teamed together with red team testing, Kali makes a great one-stop shop Linux distro.

Kali Linux 1.0 is based on a derivative of Debian Wheezy. So, Debian fans will certainly enjoy the co-mingling of the two. I certainly do!

Screenshot of Kali Linux and the menu of preinstalled tools

Kali is the official successor of the former BackTrack security distribution. In fact, the very same group, Offensive Security, maintains it. The evolution of BackTrack, now retired, to Kali has been in the making for several years. As a security distribution overall, Kali Linux is the premiere security distribution and I recommend it for social engineering purposes. As an aside, I have been using BackTrack since its beta debut in 2006 and personally recommend its use as an all purpose Linux distribution as well.

Saturday, December 15, 2018

Three men stood with their hands up staring stupidly back at us

HES HERE SOMEWHERE

I ran to Chuck’s door, pulling off the AR glasses and holding my gun straight in front of me. Three men stood with their hands up, staring stupidly back at us. and I recognized one of them as Chuck’s attacker, the one who had been caught on video. He knew we recognized him. One by one they dropped their weapons.

Tony rushed past me, going back to check on Damon. “All clear!” he yelled moments later.

“Do you have Paul?” yelled Chuck.

“No!”

None of the men in front of us was Paul either. Did he slip past us down the stairs somehow?

“Where’s the sixth guy?” asked Damon, running up behind me. He gestured to the AR glasses in my hand.

I put them back on. Three red dots hovered in front of me as I looked at the three guys in our room, and swiveling around I could see the dot of the guy they’d captured at the other end of the hallway. Looking down to my left, I could see another dot coming up toward us, which must have been Irena and Aleksandr bringing up the one they’d captured downstairs. That’s five. Where’s the sixth?

“I only count five,” I said after double-checking.

“Goddamn it!” yelled Chuck. “Tie them up. He’s here somewhere.”

Tuesday, December 11, 2018

● DELETE LOGS FROM DIFFERENT APPLICATIONS WEB MAIL ETC

● Delete logs from different applications web mail etc

Now lets take a look at some of the ways you can cover your footprints once you have entered a system (network, server, laptop, etc.)

Delete logs from different applications (web, mail, etc.)

Delete User Logs

Delete logs from different monitoring systems

Each system has different ways to monitor it for debugging or troubleshooting in the event of a problem

To do this, it is not necessary, like a hacker, to go step by step from file to file to look for and delete the latest logs. But it can use different existing scriptures (on the Internet) of other people with whom they can clean up their traces.

Here’s an example of a Windows program (also you can use the Event Viewer from any Windows machine) that does the job for you :)

On Linux you can use the following commands:

#rm ./bash_history - to delete the commands given by the current user

#vim /var/log/messages - a place where you can delete the logs that have been generated

Or in any other file in /var/log, depends on which application was attempting to exploit. There is another way we can delete the logs using Meterpreter (an application for PenTers.

THIS ALLOWS YOU TO CHAT FACE TO FACE NO MATTER WHERE YOU ARE

this allows you to chat face to face no matter where you are

When you purchase the Kindle Fire HD, you’ll already have the Skype app in your Cloud. Go to Apps and toggle the switch to Cloud. You’ll see the Skype icon there. Tap it to download it to your computer.

If you have a Skype account, you can use that account on your Kindle Fire HD. If you do not, go through the account creation wizard to get set up.

If you have contacts on Skype, they’ll show up on your list as soon as you log in. If you don’t, you can add the by tapping Contacts and searching using the Magnifying Glass icon. You can share them in several different ways, including based on prior calls, your calendar contacts and so forth.

Calling

All of Skype’s features can be used on your Amazon Kindle Fire HD. If you purchase credits for it, you can use it as a phone to call regular landlines. When you want to place a call, you have three different options: audio, video and IM

Making a standard audio call, called a Voice Call on Skype, requires only that you tap on a contact’s entry and select the option.

When you make a video call, your camera and microphone will automatically start up as soon as the person on the other end of the line accepts the call. This allows you to chat face to face, no matter where you are.