PENETRATION TESTING WITH METASPLOIT FRAMEWORK 4 IN KALI
I am performing it in Kali Linux, assuming that you have gone through the installation steps of Kali Linux.start the metasploit framework using following command in terminalmsfconsoleNote: It will take...
View ArticleWindows can't stop your 'Generic volume' device because a program is still...
Windows can't stop your 'Generic volume' device because a program is still using it. Close any programs that might be using the device, and then try again laterSolution:1. Right click on my computer,...
View ArticleDRUPAL INSTALLATION AND CONFIGURATION ON WAMP
DRUPAL 7.34 CONFIGURATION ON WAMPPre-requirements: Wamp must be installed with default settings1. Download drupal from following urlhttps://www.drupal.org/project/drupal2. Place the downloaded .zip...
View ArticleIBM QRADAR WINCOLLECT AGENT INSTALLATION AND CONFIGURATION
WinCollect Agent Installation, Configuration and TroubleshootingNOTE: Always install wincollect agent with Admin privilegesAlways stop service then startAlways stop service before uninstalling...
View ArticleUNHIDE THE HIDDEN FILES AND FOLDERS IN WINDOWS
How to un-hide all the files and folders in windows?How to un-hide all the files and folders in windows with hide option locked?How to un-hide all the files and folders in windows hidden and locked by...
View ArticleNMAP PORT SCANNING COMMANDS
NMAP PORT SCANNING COMMANDS1. To scan a udp port of a hostnmap -v -sU -Pn 10.10.x.xx2. To scan TCP ports ranging from 1 to 65535 of a hostnmap -v -Pn -p1-65535 10.10.x.xx
View ArticleNETWORK SCANNING TOOLS
NETWORK SCANNING/TROUBLESHOOTING TOOLSAdvanced IP Scanner: Scanning System and Network ResourcesID Serve: Banner Grabbing to Determine a Remote Target SystemAmap: Fingerprint Open Ports for Running...
View ArticleIBM QRADAR WINCOLLECT AGENT INSTALLATION AND CONFIGURATION
IBM QRADAR WINCOLLECT AGENT INSTALLATION AND CONFIGURATIONDownload wincollect agent and wincollect management console http://www-01.ibm.com/support/docview.wss?uid=swg27045054Managed Mode1. Only...
View ArticleHOW TO CREATE IBM QRADAR SIEM RULE AND RULE GROUP
How to create siem rule group1. Goto to Offenses tab --> Rules in left pane --> Groups at top in right pane2. It will open following wizard. click New Group at top3. Add group name and...
View ArticleXTREME DOWNLOAD MANAGER INSTALLATION IN UBUNTU
XTREME DOWNLOAD MANAGER INSTALLATION IN UBUNTUsudo add-apt-repository ppa:noobslab/apps sudo apt-get update sudo apt-get install xdmanHOW TO INSTALL XDM PLUGIN INTO MOZILLA FIREFOX1. Open...
View ArticleWINCOLLECT ERROR THE EVENT LOG FILE IS CORRUPTED
WINCOLLECT ERRORTHE EVENT LOG FILE IS CORRUPTED<13>May 11 13:04:29 10.10.1.13 LEEF:1.0|IBM|WinCollect|7.2|4|src=10.10.XX.XX dst=10.10.XX.XX sev=5...
View ArticleHOW TO GENERATE AND VERIFY MD5 HASH IN WINDOWS & LINUX
HOW TO CHECK THE INTEGRITY OF THE DOWNLOADED IMAGE IN WINDOWS & LINUXLINUX:GENERATE THE MD5 HASH BY USING FOLLOWING COMMANDMD5SUM FILE.ISO > HASH.MD5CHECK THE MD5 HASH WITH FOLLOWING COMMAND...
View ArticleCyber Security Management
1. Manage the IT assets· Identify the assets in an environment and its life· disable/restrict the vendor defaults· define the patch cycle for firmware· review the assets...
View ArticleXUbuntu 16.04 Screen Brightness Controls
XUbuntu 16.04 Screen Brightness Controls Not WorkingOpen the grub file using following command in terminalsudo nano /etc/default/grubaddacpi_osi=Linux at the end of the following line as...
View Article