iaxflood tool in kali linux

A UDP Inter-Asterisk_eXchange (i.e. IAX) packet was captured from an IAX channel between two Asterisk IP PBX’s. The content of that packet is the source of the payload for the attack embodied by this tool. While the IAX protocol header might not match the Asterisk PBX you’ll attack with this tool, it may require more

whois lookup

A very simple but effective means for collecting additional information about our target is Whois. The Whois service allows us to access specific information about our target including the IP addresses or host names of the company’s Domain Name Systems (DNS) servers and contact information usually containing an address and phone number. Whois is built into the Linux

List of PC file Extensions

List of PC file Extensions This is a list of the most commonly found extensions, what type of file they are and what program if any they are associated with.   .$$$ Temporary file   .$$A OS/2 program file   .$$F OS/2 database file   .$$S OS/2 spreadsheet file   . OS/2 planner file  

make a private folder

To make Private folder which nobody can open, delete, see properties, rename. To make such a folder you need to make a folder with any name. For example – parth on desktop. And then open command prompt and then type the following command on the screen. cd desktop   Then type cacls folder /E /P

blinking in a hover effect in css

<html> <head> <style type=’text/css’> a.tooltip { outline: none; color: yellow; -webkit-animation: blink .75s linear infinite; -moz-animation: blink .75s linear infinite; -ms-animation: blink .75s linear infinite; -o-animation: blink .75s linear infinite; animation: blink .75s linear infinite; } @-webkit-keyframes blink { 0% {opacity: 1;} 50%{opacity:1;} 100%{opacity:0;} } @-moz-keyframes blink { 0% {opacity: 1;} 50%{opacity:1;} 100%{opacity:0;} } @keyframes

How To Recover From Corrupted USB

How To Recover From Corrupted USB  If your computer fails to recognize your hard drive, then you can try assigning a new drive letter to your storage media. This method will work wonderfully, and you will not need any third party tool to recover the files. Here’s how you can assign a new drive letter.

3D Cube Animation in html and css

<!DOCTYPE html> <html> <head> <title>3D cube animation</title> <style type=”text/css”> .rotating-box { width: 400px; height: 400px; margin: 10px auto; perspective: 800px; } .single-rb { width: 400px; animation: rotate 15s linear infinite; transform-style: preserve-3d; margin-top: 120px; } .single-rb img { height: 400px; width: 400px; } .single-rb div { position: absolute; width: 400px; height: 400px; } .front-side {

WPA3 security is ready

WiFi security is finally getting an upgrade after 14 years. the next-generation standard that promises to tackle many of the vulnerabilities that have persisted in wireless networking. Most notably, it brings individualized data encryption that should protect your data against eavesdropping from within the WiFi network. If you’re using professional-grade WPA3-Enterprise security, you’ll get the “equivalent” to 192-bit

How to close ports in windows

Close the port in windows machine In this post i am show the code from the how to close the ports in windows from the vbs script and batch file programming . In the below post you can try at your own risk and enjoy programming . —–> VBS Script  set ss = createobject(“wscript.shell”) set