linux poison RSS
linux poison Email

UI Forensic Tool for File Information - FileInfo

FileInfo is an GUI forensic tool for Ubuntu Linux written in Python, that helps you in identifying files with specific values for certain attributes in order to search and sort these files and present the results in an easily readable tabular fashion.

Using fileinfo you can access this information for many files at once without opening these files individually with a dedicated application, which can be very time consuming.

FileInfo features includes:
 * Meta Data Information
 * String ASCII and Unicode
 * Hash MD5 and SHA1
 * Malicious PDF Analyzer
 * Detect and Show PE32 Information
 * Detect and Extract Thumbnail from JPEG file

FileInfo Installation:
Download Fileinfo from here and extract the content using command:
$ tar xfz fileinfo-x.tar.gz
Then change into the newly created directory ``fileinfo`` and install `fileinfo` by running the following command::
$ bash fileinfo --install

Read more

How To Generate QR Code under Ubuntu Linux

A QR Code (it stands for "Quick Response") is a mobile phone readable barcode - simply encode a URL into the QR Code and then point a mobile phone (or other camera-enabled mobile) at it. If the device has had QR Code decoding software installed on it, it will fire up its browser and go straight to that URL.

But it doesn't stop there - a QR Code can also contain a phone number, an SMS message, V-Card data or just plain alphanumeric text, and the scanning device will respond by opening up the correct application to handle the encoded data appropriately courtesy of the FNC1 Application Identifiers that are embedded in the encoded data.

The technical specifications for a QR Code are set down in the ISO-18004 standard so they are the same all over the world, and the only significant variations from one QR code to another (apart from the data it contains) is the number of modules required to store the data.

Read more

SQL injection Tool - Havij

We are NOT responsible for any damage or illegal actions caused by the use of this program. 
Use on your own risk!

SQL injection is yet another common vulnerability that is the result of lax input validation. Unlike cross-site scripting vulnerabilities that are ultimately directed at your site’s visitors, SQL injection is an attack on the site itself—in particular its database. The goal of SQL injection is to insert arbitrary data, most often a database query, into a string that’s eventually executed by the database. The insidious query may attempt any number of actions, from retrieving alternate data, to modifying or removing information from the database

Read more

Allow Remote Ronnections Acess to MySQL Server

MySQL by default allows you to connect to it via localhost, you can not connect to MySQL server directly from some remote IP address.

To enable remote mysql access you just need to perform a little editing in the mysql configuration file. Open the mysql configuration file -- /etc/mysql/my.cnf and look for line
bind-address =
Change the above line (Comment out) with following and save the changes
#bind-address =

Read more
Related Posts with Thumbnails