1IT: PRIMERY IT NEWS, HOWTOS & GUIDES

Physical Hacking Attacks That Can Be Very Usefull For Hackers

Physical Hacking Attacks That Can Be Very Usefull For Hackers The battery Most of the motherbords have a battery. If you remove it 30min the settings of the BIOS will be restarted (password included). Jumper CMOS Most of the motherboards have a jumper that can restart the settings. This jumper connects a central pin with another, if you connect thoses pins the motherbord will be reseted. Live Tools If …

How To Disable USB Ports in Linux For Extra Security

How To Disable USB Ports in Linux For Extra Security To secure our infrastructure from data breaches, we have a tendency to use software package & hardware firewalls to limit unauthorized access from outside however knowledge breaches will occur from within in addition. to get rid of such a break, organizations limit & monitor access …

Increasing Wifi TX Power Signal Strength

Increasing Wifi TX Power Signal Strength in Linux TX power is a setting for the radio to set its transmitting strength. Higher values amplify the signal strength, but also increase power usage. Tx power level 1 is always the highest level of power a wireless access point. The transmit power level is assigned an integer value …

Password Cracking and Login Brute-force

Password Cracking and Login Brute-force Introduction People are frequently misguided and look at the password brute-forcing (password cracking) as on a miracle approach to gain access to something, especially people not engaged in IT industry, non-tech folks (not sure if Hollywood is to blame). In any case, numerous times we’ve received inquiries from people asking …

How To Connect To Wifi Using Terminal Ubuntu

How To Connect To Wifi Using Terminal Ubuntu There are several command-line tools for managing a wireless network interface in Linux systems. A number of these can be used to simply view the wireless network interface status (whether it is up or down, or if it is connected to any network), such as iw, iwlist, ip, ifconfig and others. And some are used …

The Better Things You Should Know About Ansible

1 – You can pass parameters to roles It’s a good practice to create roles to organize your playbooks. Let’s say we want to create a role for installing Jenkins. The folder structure for this role could look something like this: jenkins/ files/ templates/ tasks/ handlers/ defaults/ The folder defaults is used to store the …

How to make a persistent Android backdoor using Metasploit

How to make a persistent Android backdoor using Metasploit Metasploit is one of the most powerful pentesting and exploitation tools out there,  and in this tutorial,  I’ll show you how to use it to create an access backdoor on any android phone and gain control over it. DISCLAIMER: All the information in this article is …

How to Create Fork Bomb?

How to Create Fork Bomb? The fork bomb is the equivalent of a DDoS attack on your own system. It aims to deprive the system of memory (RAM), leaving nothing for other applications or the operating system’s vital operations required to keep the systems running, hence crashing it. Just 5 characters long, the fork bomb is not …

Setting up a Tor service

Setting up a Tor service Tor services use a specific URL structure. In the clear net we’re used to seeing Top-Level Domains (TLDs) such as .com, .net, and a myriad of others. A TLD that does not exist in the clear net is .onion and, conversely, it is the only TLD that exists in the …

The Quick Metasploit Guide For Beginners

The Quick Metasploit Guide For Beginners Metasploit initially created by H. D Moore in 2003, until it was acquired and developed further by Rapid7 on October 21, 2009. Metasploit-framework is completely written using Ruby, and is a standard package installed in Kali Linux system (and also almost all Penetration Testing OS, I guess). It is …