Wednesday, May 31, 2023

OWASP Blog Moved To Website

This will be the last post from the OWASP Blogger. Moving forward all of our blog content can be found on our website under our News

More info


📄 Kappy Mahaz High shared MD Ali Ahmed's post

 
See the post that she shared.
   
 
   
 
   
   
 
   
📄 Kappy Mahaz High shared MD Ali Ahmed's post.
May 31 at 8:54 AM
 
View
 
 
   
   
Was this email:Useful | Not Useful
 
   
   
 
This message was sent to john2706.funstuff@blogger.com. If you don't want to receive these emails from Meta in the future, please unsubscribe.
Meta Platforms, Inc., Attention: Community Support, 1 Facebook Way, Menlo Park, CA 94025
   
   
To help keep your account secure, please don't forward this email. Learn more
   
 

Evil Limiter: Taking Control Of Your Network Bandwidth







Ever wanted to block someone from the network or limit their bandwidth without having the network admin privileges? Well Evil Limiter has got you covered then.


An amazing tool to help you control your network without having access to the admin panel.

Today I'm gonna show you how to use this interesting tool to take control of your network.


Requirements:

1. A PC or Laptop with Linux OS.
2. A Network Adapter.
3. Access to the Network you want to control.
4. sudo or root access on your Linux OS.

First of all we will download the tool from its github repository:

https://github.com/bitbrute/evillimiter

You can download and extract the zip file from the link above or you can clone evillimiter repository using git like this:


git clone https://github.com/bitbrute/evillimiter 


Now lets install the downloaded tool on our machine

Step 1: Move inside the downloaded github repository

cd evillimiter


Step 2: To install type


sudo python3 setup.py install


wait for the installation to finish (May take some time)


Step 3: To run type


sudo evilimiter


Voila! That's it, you got it up and running on your machine


Now how do you control your network with it, its very easy.

It should detect your network automatically but yeah you can set it up manually as well using the command line argument -i.

After you have selected the right interface to control, you need to scan your network for live hosts. To perform the scan type


scan


you can pass an optional flag to the scan command which is range which will help you to specify the range of ip addresses you want to scan like this


scan --range 192.168.1.1-192.168.1.100





The above command will scan a total of 100 hosts from 192.168.1.1 to 192.168.1.100


Now after you have scanned your network next thing is to list the hosts that have been discovered during the scan for that you type the hosts command like this


hosts





Now you know the hosts on your network and now you should know which host you wanna block or limit based on the mac address of the host. Remember the host id of the host that you want to block or limit bandwidth of and lets do the magic.

to block a host from using the internet we simply specify the block command followed by the host id of the host that we want to block like this

block 1





if instead of blocking the host we just want to limit his internet bandwidth we can do just that by using the limit command followed by the host id and then the bandwidth that we want to allocate to that particular host like this


limit 1 100kbits





Wohooo! yeah its that easy and yes you can do all this without having the network admin role.

Now if you want to show mercy on that poor guy (blocked host), you can set him free by using the free command followed by the host id like this:

free 1





Well isn't administrating your network bandwidth so easy now.

Hope you enjoyed this tutorial.:)

Related posts


USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







More information


  1. Pentest Tools Tcp Port Scanner
  2. Pentest Tools List
  3. World No 1 Hacker Software
  4. Hacking Tools Pc
  5. Pentest Tools Github
  6. Hack Tools
  7. Hacking Tools Download
  8. Tools 4 Hack
  9. Pentest Tools For Android
  10. Top Pentest Tools
  11. Hack App
  12. Pentest Tools Alternative
  13. Wifi Hacker Tools For Windows
  14. Hacker Tools
  15. Hack Tools For Ubuntu
  16. Hack Tools For Pc
  17. Tools Used For Hacking
  18. Hacker Tools Free Download
  19. New Hack Tools
  20. Hack Tools Pc
  21. Hacker Tools Online
  22. Hack App
  23. Hacks And Tools
  24. Hacker Tools 2019
  25. Pentest Tools For Android
  26. Hacker Tools
  27. Hacker Techniques Tools And Incident Handling
  28. Hacker Tools Online
  29. Pentest Tools Linux
  30. How To Make Hacking Tools
  31. Pentest Tools For Android
  32. Hack Apps
  33. Hacker Tools 2020
  34. Underground Hacker Sites
  35. Hak5 Tools
  36. Hack Tools For Games
  37. How To Make Hacking Tools
  38. Hackrf Tools
  39. Termux Hacking Tools 2019
  40. Hack Tool Apk No Root
  41. Hacks And Tools
  42. Hacking Tools For Windows 7
  43. Hacker Tools For Mac
  44. Blackhat Hacker Tools
  45. What Is Hacking Tools
  46. Pentest Tools Kali Linux
  47. Hacks And Tools
  48. Hacker Tools
  49. Blackhat Hacker Tools
  50. What Is Hacking Tools
  51. Hack Tools 2019
  52. Hacking Tools Name
  53. Physical Pentest Tools
  54. Hacking Tools For Games
  55. Pentest Tools Port Scanner
  56. Hacker Tools Apk Download
  57. Hacking Tools Download
  58. Hacker Tool Kit
  59. Hacking Apps
  60. Top Pentest Tools
  61. Hack Tools 2019
  62. Hacking Tools Pc
  63. Hack Tools For Games

Tuesday, May 30, 2023

How To Download Torrents Files Directly To Your Android Device

Download-Torrent-files-Android-Devices
uTorrent, one of the most popular BitTorrent clients, is now available for Android smartphones and tablets. Its use on mobile devices is very similar to its use in the PC. All you need is to search for torrents using the web browser on your mobile device, then uTorrent will download the files.

Procedure:

Other softwares

Read more


  1. Pentest Tools Port Scanner
  2. Underground Hacker Sites
  3. Hacking Tools Windows
  4. Pentest Tools Github
  5. Hacking Tools For Windows 7
  6. Hack Tool Apk
  7. Hack Tools Online
  8. Hacker Tools For Pc
  9. Easy Hack Tools
  10. Pentest Tools Bluekeep
  11. Hacking Tools For Kali Linux
  12. Hacking Tools For Games
  13. Hacking Tools Usb
  14. Blackhat Hacker Tools
  15. How To Hack
  16. Hacker Tools For Ios
  17. Hack Tools Online
  18. Ethical Hacker Tools
  19. Bluetooth Hacking Tools Kali
  20. Hack Website Online Tool
  21. Pentest Tools Linux
  22. Pentest Tools Alternative
  23. Hacker Tools Software
  24. Pentest Tools For Android
  25. Blackhat Hacker Tools
  26. Hacker Tools Free
  27. Hacking Tools 2019
  28. Hacking Tools 2020
  29. Pentest Tools Subdomain
  30. Hack Tool Apk
  31. Hack Tools Mac
  32. Usb Pentest Tools
  33. Blackhat Hacker Tools
  34. Hack Tools Download
  35. Hacker Search Tools
  36. Hack Rom Tools
  37. Hacker Tools Github
  38. Nsa Hacker Tools
  39. Hack Website Online Tool
  40. New Hacker Tools
  41. Hacker Tools 2019
  42. Hack Website Online Tool
  43. Pentest Tools Android
  44. Hacking Tools Software
  45. Hacker Tools 2019
  46. Hacking Tools Windows
  47. New Hack Tools
  48. Hacker Search Tools
  49. Hack Tools For Mac
  50. New Hacker Tools
  51. Beginner Hacker Tools
  52. Hack Tools Github
  53. Hackers Toolbox
  54. Hacker Tools Online
  55. Game Hacking
  56. Pentest Tools Download
  57. Hacking Tools 2019
  58. Hacker Hardware Tools
  59. Underground Hacker Sites
  60. Hack Tools For Mac
  61. Pentest Tools For Android
  62. Hacking Tools 2020
  63. Wifi Hacker Tools For Windows
  64. Hacking Tools 2020
  65. Hacking Tools Windows
  66. Hacker Tools List
  67. Hacking App
  68. Pentest Tools Framework
  69. Hack Tool Apk
  70. What Are Hacking Tools
  71. Hacking Tools 2019
  72. Pentest Tools Website Vulnerability
  73. Hack Tools Github
  74. Pentest Tools Find Subdomains
  75. Hacks And Tools
  76. Hacker Tools Online
  77. Hacking Tools 2019
  78. Hacker Tools Apk Download
  79. Pentest Tools Free
  80. Hack Tool Apk No Root
  81. Game Hacking
  82. Black Hat Hacker Tools
  83. Hacker Tools Apk Download
  84. Hacking Tools For Windows Free Download
  85. Game Hacking
  86. Hacker Tool Kit
  87. Hack Tools Online
  88. Hacking Tools Online
  89. Hacker Tools Apk Download
  90. Pentest Tools Kali Linux
  91. Game Hacking
  92. Hacking Tools For Windows
  93. Pentest Tools Android
  94. Hack Rom Tools
  95. Hack Tools
  96. Hacker Tools 2020
  97. Hacking Tools Download
  98. Hack Apps
  99. Hacking Tools And Software
  100. Hacker Tools 2020
  101. Best Hacking Tools 2019
  102. Hack Tools For Ubuntu
  103. Hacking Tools For Mac
  104. Hacking Tools
  105. Hacking Tools Pc
  106. Pentest Tools Subdomain
  107. Hacking Tools Hardware
  108. Hacking Tools Usb
  109. Hacking Tools For Beginners
  110. Hacking Tools For Windows
  111. Best Pentesting Tools 2018
  112. Nsa Hack Tools Download
  113. Tools For Hacker
  114. Tools Used For Hacking
  115. Pentest Tools List
  116. Hacker Tools Mac
  117. Ethical Hacker Tools
  118. Pentest Tools List
  119. Hacker Tools Free
  120. Install Pentest Tools Ubuntu
  121. Tools For Hacker
  122. Beginner Hacker Tools
  123. Beginner Hacker Tools
  124. Hacker Tools 2019
  125. Install Pentest Tools Ubuntu
  126. Hack Tools Download
  127. Hacking Apps
  128. Hack Tools Github
  129. Growth Hacker Tools
  130. Pentest Tools Apk
  131. Hacker Tools For Ios
  132. Hack Tools For Pc
  133. Hacking Tools Github
  134. Hacking Tools Github
  135. Hacking Tools Pc
  136. Hacking Tools 2020
  137. Hacking Tools Windows 10
  138. Tools For Hacker
  139. Hacking Tools Windows 10
  140. Hack Tools For Windows
  141. World No 1 Hacker Software
  142. Install Pentest Tools Ubuntu
  143. Hack Apps
  144. Install Pentest Tools Ubuntu
  145. Kik Hack Tools
  146. Hacking Tools Free Download
  147. Blackhat Hacker Tools
  148. Hacking Tools Windows 10
  149. Tools For Hacker
  150. Install Pentest Tools Ubuntu
  151. Hacking Tools Software
  152. Pentest Tools For Windows
  153. Pentest Tools Bluekeep
  154. Pentest Tools Free
  155. Pentest Tools Android
  156. Github Hacking Tools
  157. Pentest Tools Apk
  158. Computer Hacker
  159. Hacker Search Tools
  160. Top Pentest Tools
  161. Pentest Tools Free
  162. Pentest Tools Apk
  163. Easy Hack Tools
  164. Hack Tools 2019
  165. Underground Hacker Sites
  166. Pentest Box Tools Download
  167. Hack Tools
  168. Pentest Tools List
  169. Hacking Tools Kit
  170. Pentest Tools Tcp Port Scanner