Profile cover photo
Profile photo
blackMORE Ops
176 followers
176 followers
About
Posts

Post has attachment
DoS website with GoldenEye – Layer 7 DoS tool with KeepAlive NoCache
It takes 15 seconds to bring down a web server! Tested GoldenEye Layer7 # DoS tool with KeepAlive NoCache. http://www. darkmoreops.com/?p=326 I’ve talked about testing few DoS too tools that can put heavy load on
HTTP servers in order to bring them to thei...
Add a comment...

Post has attachment
View compressed .gz files without uncompressing using #Zcommands in Linux #zcat #zgrep #zdiff
Add a comment...

Just finished installing #NVIDIA driver and Cuda on a new #KaliLinux 1.0.7 installation. #Cudahashcat works. It's tricky. Guide coming soon.
Add a comment...

Post has attachment
Add a comment...

Post has shared content
Detect #Exploit #openSSL #Heartbleed vulnerability using #Nmap and #Metasploit on #KaliLinux #hacking #hack #hackingtutorial

Detect Exploit openSSL Heartbleed vulnerability using Nmap and Metasploit on Kali Linux     Background The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information…
Add a comment...

Post has attachment
Hashcat or cudaHashcat is the self-proclaimed world’s fastest CPU-based password recovery tool. Versions are available for Linux, OSX, and Windows and can come in CPU-based or GPU-based variants. Hashcat or cudaHashcat currently supports a large range of hashing algorithms, including: Microsoft LM Hashes, MD4, MD5, SHA-family, Unix Crypt formats, MySQL, Cisco PIX, and many others.
Hashcat or cudaHashcat comes in two main variants:

Hashcat – A CPU-based password recovery tool
oclHashcat or cudaHashcat – A GPU-accelerated tool

Many of the algorithms supported by Hashcat or cudaHashcat can be cracked in a shorter time by using the well-documented GPU-acceleration leveraged in oclHashcat or cudaHashcat (such as MD5, SHA1, and others). However, not all algorithms can be accelerated by leveraging GPUs.

Hashcat or cudaHashcat is available for Linux, OSX and Windows. oclHashcat or cudaHashcat is only available for Linux and Windows due to improper implementations in OpenCL on OSX.
Add a comment...

Post has attachment
This guide explains how to install proprietary “NVIDIA Accelerated Linux Graphics Driver” or NVIDIA driver on Kali Linux system. If you are using Kali Linux and have NVIDIA graphics card then most likely you are using open source NVIDIA driver nouveau. You can see it by lsmod | grep nouveau command. nouveau driver works quite well, but if you want to use 3D acceleration feature or want to use GPU based applications (such as CUDA and GPU pass through) then you need to install proprietary NVIDIA driver. The proprietary “NVIDIA Accelerated Linux Graphics Driver” provides optimized hardware acceleration of OpenGL applications via a direct-rendering X server. It is a binary-only Xorg driver requiring a Linux kernel module for its use. The first step is to fully update your Kali Linux system and make sure you have the kernel headers installed.
This guide replaces the old guide
How to Install NVIDIA Kernel Module CUDA and Pyrit in Kali Linux
Where you had to download NVIDIA Driver (CUDA) manually and edit grub.cfg file to make everything work.
Because it will be a long guide, I had to divide it into two parts:
Install proprietary NVIDIA driver on Kali Linux – NVIDIA Accelerated Linux Graphics Driver
Install NVIDIA driver kernel Module CUDA and Pyrit on Kali Linux – CUDA, Pyrit and Cpyrit
You use the first guide to install NVIDIA Driver. If you want GPU acceleration, (cudahashcat, GPU pass through etc.) keep reading and follow the second guide to complete your installation. I’ve included as much details I can, including troubleshooting steps and checks but I would like to hear your part of the story, so leave a comment with your findings and issues.
Add a comment...

Post has shared content
  Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty– with cuda or calpp in Kali Linux There are just too many guides on Cracking Wifi WPA/WPA2 passwords using different methods. Everyone has their own take on it. Personally, I think there’s no right…
Add a comment...

Post has shared content
List of #UDP based #Amplification Attacks #DDOS #Alert

Source: http://www.us-cert.gov/ncas/alerts/TA14-017A This is something I would like to keep track, so posting it here. Very useful and scary that how easily it can happen.   Alert (TA14-017A) Following diagram shows how UDP based Amplification Attacks are…
Add a comment...

Post has attachment
Add a comment...
Wait while more posts are being loaded