Tuesday, August 6, 2019

File management tools include various kinds of software. All of these, like file comparison tools, de-duplication tools, file removers etc. are useful for a system admins activities almost every day. Here are the top 12!






1. TeraCopy

This is an alternative for the copy and move process that is built-in to Windows. It can copy and move files locally or over a network and allows you to pause and resume file transfers.

2. Steganos LockNote

This tool ca be used for keeping confidential information stores in a secure manner. It uses AES-256 encryption to keep your files secure.

3. Duplicate Cleaner

As the name suggests, this is a tool that cleans up duplicate copies of files in your system. It can also do the same over a network location.

4. Bulk Rename Utility

This is a powerful but lightweight software that can be used for renaming folders and files in bulk.

5. Free Opener

This software gives you access to over 80 different file types, in the sense that it allows you to open various file formats without the need to have the required applications installed.

6. FreeFileSync

This is a tool that can be used for synchronising and comparing folders.

7. PeaZip

This is a cross-platform software that allows you to manage archives. It provides support for high levels of encryption and compression, volume spanning etc.

8. WinMerge

This is a tool that allows you to compare and merge files. It displays the differences between two files side-by-side.

9. SearchMyFiles

This is an alternative for the 'Search For Files And Folders' process in Windows. IIt is more accurate and flexible.

10. AxCrypt

This encryption tool can be integrated to Windows and protects your files using the AES-256 encrypton.

11. File Splitter

This is an app that is lightweight and can be split into pieces and mered back together. It is a very lightweight app too.

12. Hash Tool

This is a tool that can be used in order to calculate the hash of multipe files. It helps in verifyin file integrity. It has support for Unicode file names and MD5, SHA-1, SHA-256, SHA-384, SHA-512, CRC32 hash types.
UNIX is a multi-tasking and multi-user computer operating system which was designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. Infact, Linux derives much of its basic design from principles established in Unix. Learning UNIX is essential, whether you are a Linux learner or a perspective hacker and we are here to make your life easy.
                          




Here's a list of free online courses on UNIX:

1. A Basic UNIX Tutorial at Idaho State University

This tutorial comprises fourteen sections, each of which addresses a fundamental aspect of UNIX computing. It concentrates on illustrating the central concepts by providing short explanations, along with examples, and exercises. Topics like directories, text editing, customising the shell, filters, processes, multitasking and accessing UNIX systems are covered effectively.

2. Practical Programming in C at the Massachusetts Institute of Technology

This course provides a thorough introduction to the C programming language, the workhorse of the UNIX operating system. Topics like syntax, grammar, programming techniques, UNIX signals, hash tables, external libraries and synchronisation are covered effectively.

3. Practical Unix at Stanford University

A practical introduction to using the Unix operating system with a focus on Linux command line skills available through video lectures. Topics like grep and regular expressions, ZSH, Vim and Emacs, basic and advanced GDB features, permissions, working with the file system, revision control, Unix utilities, environment customisation, and using Python for shell scripts are covered effectively.

4. Systems Programming and UNIX at the University of Arizona

Provides UNIX information actually taught on campus University of Arizona. Contains links to PDF lecture slides, exams and solutions and example assignments. You also get the names of the textbooks used on campus, which are optional to buy. However, won't give you any actual credit.

5. Unix—the Bare Minimum at the University of California - Davis

This PDF tutorial trains students in UNIX basics by using explanatory text with example commands. Topics like special names for some directories, creating directories, text editors, file commands, moving files to other directories, pipes and redirection are covered effectively.

6. UNIXhelp for Users at the University of Mississippi

Students are proviede with a manual index or glossary to research terms that they might find diificult to understand. Topics like looking-up commands, understanding processes, program development tools, editing text files, writing shell scripts, managing processes and file manipulation utilities are covered effectively.

7. UNIX Tutorial at the University of Utah
Students are provided with a reference manual to find specific command summaries. Topics like making and removing directories, creating short files, printing files, examining files, changing directories and imputing simple commands are covered effectively.

8. UNIX Tutorial for Beginners at the University of Utah

Provides students with eight UNIX tutorials outlining step-by-step procedures and codes. Topics like files and directories, copying files, redirection, killing a process, useful commands, source codes and variables are covered effectively.


             
An SQL injection attack is a code injection attack that is used to exploit web applications and websites. It is one of the most common methods for hackers to get into your system. Learning such attacks are important for anyone looking to perform their own exploits. Here are 10 of the most powerful tools that aid in performing SQL Injection attacks.

1. BSQL Hacker

This is a useful tool for both experts and beginners that automates SQL Injection attacks on websites.

2. The Mole

This is an SQL Injection tool that uses the union technique or the boolean query-based technique.

3. Pangolin

This is a penetration testing tool developed by NOSEC. It is aimed at detecting and exploiting SQL injection vulnerabilities on websites.

4. Sqlmap

This is an open source penetration testing tool that security professionals can use. Like the BSQL Hacker tool, this one also automates SQL Injection attacks.

5. Havij

This is an automated SQL injection tool that can be used by penetration testers in order to detect vulnerabilities in web applications and exploit them.

6. Enema SQLi

This is a dynamic penetration testing tool for professionals. It is an auto-hacking software.

7. Sqlninja

This is a tool targeted at exploiting SQL injection vulnerabilities. It uses the Microsoft SQL server as its back end.

8. sqlsus

Written using the Perl programming language, this is an open source penetration testing tool for MySQL Injection and takeover.

9. Safe3 SQL Injector

This is a powerful penetration testing tool, which automates the process of detecting and exploiting SQL Injection vulnerabilities.

10. SQL Poizon

This tool includes php , asp , rfi , lf dorks that can be used for penetration testing.

Replace word or text in a file with command line in Windows

Replace word or text in a file with command line in Windows


powershell -Command "(gc BeforeReplace.txt) -replace 'OrginalTextToBeReplaced', 'NewTextToBeReplaced' | Out-File -encoding ASCII AfterReplace.txt"

Install Telnet service in Windows using Command Line

Install Telnet service in Windows using Command Line

You can use below command as admin in your CMD


pkgmgr /iu:”TelnetClient”

Change or Create another RDP Port on Windows OS using Command Line


Change or Create another RDP Port on Windows OS using Command Line


This have two benefits:
1- It reduce the random scanning on the default port 3389 and avoiding the brute force attacks attempts.
2-Secondly you may have faced an issue in your internet home connection that the ISP is unintentionally blocking the outgoing traffic to destination port 3389, so in this scenario you could open another port on the server for RDP and you would be able to RDP to it easily.

Let us start :

1- Change the current Port:

We will change the port from 3389 to 3388 by command line:

REG ADD HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp\ /v PortNumber /t REG_DWORD /d 0xd3c‬ 


This should change it 
To verify, you can either telnet localhost 3388 or execute below query against the registry value of the PortNumber


REG QUERY "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp-3388" /v PortNumber

Now you would need to allow it in Windows firewall,
You can execute below command in your cmd

netsh advfirewall firewall add rule name="RDP UDP 3388 ports" protocol=UDP dir=in localport=3388 action=allow
netsh advfirewall firewall add rule name="RDP TCP 3388 ports" protocol=TCP dir=in localport=3388 action=allow


1- Create new Port:


We will follow few steps, below is the summary for these steps:
  a. Exporting current Port Value
  b. Change the Value Name
  c. Add the new Reg file to registry silently 
  d. Then change the port for the new Value that was created in above steps.

Below are the commands used in CMD as admin

REG EXPORT  "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" RDP-Tcp-3388.reg

powershell -Command "(gc RDP-Tcp-3388.reg) -replace 'RDP-Tcp', 'RDP-Tcp-3388' | Out-File -encoding ASCII RDP-Tcp-3388.reg"
regedit /s RDP-Tcp-3388.reg

REG ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp-3388" /v PortNumber /t REG_DWORD /d 0xd3c /f

You need also to allow the port in Windows Firewall

netsh advfirewall firewall add rule name="RDP UDP 3388 ports" protocol=UDP dir=in localport=3388 action=allow
netsh advfirewall firewall add rule name="RDP TCP 3388 ports" protocol=TCP dir=in localport=3388 action=allow


RDP CredSSP Issue: an authentication error has occurred


If you encountered this error an authentication error has occurred


You could try to execute below command as administrator:

REG  ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters\ /v AllowEncryptionOracle /t REG_DWORD /d 2


And try again,