Skip to main content

Posts

Showing posts from June, 2022

BruteForce in FTP server in Linux

  BruteForce is a technique that involves a list of passwords or passphrases being submitted by an attacker in the hope of getting one of them correct. In this post you will learn how to perform a BruteForce in a FTP server using Linux. Firstly, you will have to install a package called 'hydra' sudo apt install hydra Then, to check if your package is installed, type: hydra After you have entered the upper command you will get an example of how you can perform a BruteForce attack in a FTP server Example: hydra -l user -P passlist.txt ftp://192.168.0.1 Now you will have to make somethings ready. Those are: 1. Server address of the FTP server 2. Username that can be used to access that FTP server or,     A file containing the usernames that you have prepared 3. A file containing the password that you have prepared Here there is a change that you have to make according to your need. First let's learn about the command that you need while you have the username and a passwo...

goto in Python

  Hey guys, here's the code (it's not exactly a goto statement but works same): def repeat (): a = int ( input ( ' \n Enter a number: ' )) b = int ( input ( 'Enter another number: ' )) com = [a,b] print ( f ' \n Sum: { sum (com) } ' ) ch = input ( ' \n Do you want to repeat?(y/n): ' ) ch = ch.upper() if ch == 'Y' : repeat() else : exit () repeat()

'follina' Zero-Day Vulnerability

Zero day vulnerability is a broad term that describes any recently discovered security vulnerability that hackers can use to attack system. It is called zero-day because the vulnerability is just discovered and the developers have 'zero-day' to patch it. What is follina? Follina is a recently discovered vulnerability in the Microsoft Office especially in the Microsoft Word. It allows hackers to attack your system through a '.doc' file. If you open the file the file is blank and does not contain anything. But as soon as you open the file, you can see a diagnosis window or a program compatibility troubleshooter. And while it is busy doing that, you are already hacked. (In the above picture, the picture at the left is the victim's point of view and the one at right is the hacker's point of view) While you open the '.doc' file, you might also have another application open other than the program compatibility troubleshooter. It is the application that is bein...