VirtualBox: two network interfaces (NAT eth0 and host-only eth1 ones)

allow-hotplug eth1 iface eth1 inet dhcp The second line instructs the interface to obtain an IP via DHCP. However, doing it would only wor  after I've called ifup eth1. So I added the first line, which would load the interface at boot tim EDIT: full /etc/network/interfaces: ======================= # This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). # The loopback network interface auto lo iface lo inet loopback # The primary network interface allow-hotplug eth0 iface...
تابع القراءة ←

analysing a Blue Screen issue

Most Blue Screens are caused by drivers or other kernel mode software attempting to access protected memory. The tools for analyzing the crash dump created during a Blue Screen are not very friendly. Follow these steps to determine the cause of the Blue Screen. Download WinDbg. Firstly down load the Standalone Debugging Tools for Windows (WinDbg) from: https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx Install WinDbg Run the installer Select Install the Windows Software Development Kit for Windows to this computer. Accept the...
تابع القراءة ←

LFI: beyond /proc/self/environ

Let’s suppose that we have a simple php application. The web app has a login form and a small news system based on txt files. So a user can simple log into the system And access the company’s internal board: After looping through all the pages, one can guess that the web app is loading the content for each section from a plain text file. Reviewing the code clarifies the question. So at this point, an evil user could perform some local file inclusion and read files in the remote system. We all know how to exploit that via the “/proc/self/environ”...
تابع القراءة ←

SQL INJECTION INTRODUCTION

SQL INJECTION INTRODUCTION SQL INJECTION INTRODUCTION-- SQL Injection is the most common vulnerability on the internet. It is mainly flaw in the web application & not a Database or web server issue. most programmer are still not aware of this threat. What is SQL Injection ???? Sql injection is a technique used to take advantage of non-validate Input vulnerabilities to pass SQL commands through a web Application for execution by back-end Database. In Other words,Sql injection is a basic techniques /attack used to either...
تابع القراءة ←

How to Create a Bootable Windows 7

How to Create a Bootable Windows 7  # Run Command Prompt as an administrator. To open a command prompt, go to the Start menu and search for CMD. Right-click on it and select Run as Administrator to use it with admin rights. # Using the Diskpart utility find the drive number of your flash drive. To do so, type in the following command in the command prompt: DISKPART Running DISKPART will display the version of DISKPART you are running and the name of your PC. Type “list disk” to see a display of all your connected disk drives. Make a note...
تابع القراءة ←
صفحة 1 من 131234567 ~ 13التالي
;