Skip to main content

Maria.B. Ready-To-Wear Eid Collection

Facebook
Instagram
Twitter
Copyright © 2023 Maria B Designs, All rights reserved.
You are receiving this email because you opted in at our website. Thanks for signing up!

Our mailing address is:
Maria B Designs
Lahore
Lahore 54600
Pakistan

Add us to your address book


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.

Email Marketing Powered by Mailchimp

Comments

Popular posts from this blog

Kali Linux 2018.3 Release - Penetration Testing And Ethical Hacking Linux Distribution

Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes, improved power management, and better GPU support. New Tools and Tool Upgrades Since our last release, we have added a number of new tools to the repositories, including: idb – An iOS research / penetration testing tool gdb-peda – Python Exploit Development Assistance for GDB datasploit – OSINT Framework to perform various recon techniques kerberoast – Kerberos assessment tools In addition to these new packages, we have also upgraded a number of tools in our repos including aircrack-ng , burpsuite , openvas , wifite , and wpscan . For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog . Download Kali Linux 2018.3 If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Ka...

PHASES OF HACKING

What is the process of hacking or phases of hacking? Hacking is broken up into six phases:The more you get close to all phases,the more stealth will be your attack. 1-Reconnaissance-This is the primary phase of hacking where hacker tries to collect as much as information as possible about the target.It includes identifying the target,domain name registration records of the target, mail server records,DNS records.The tools that are widely used in the process is NMAP,Hping,Maltego, and Google Dorks. 2-Scanning-This makes up the base of hacking! This is where planning for attack actually begins! The tools used in this process are Nessus,Nexpose,and NMAP. After reconnaissance the attacker scans the target for services running,open ports,firewall detection,finding out vulnerabilities,operating system detection. 3-Gaining Access-In this process the attacker executes the attack based on vulnerabilities which were identified during scanning!  After the successful, he get access t...

EasySploit: A Metasploit Automation Bash Scripts To Use Metasploit Framework Easier And Faster Than Ever

About EasySploit:  EasySploit is  Metasploit automation tool to use Metasploit Framework EASIER and FASTER than EVER. EasySploit's options: Windows --> test.exe (payload and listener) Android --> test.apk (payload and listener) Linux --> test.py (payload and listener) MacOS --> test.jar (payload and listener) Web --> test.php (payload and listener) Scan if a target is vulnerable to ms17_010 (EnternalBlue) Exploit Windows 7/2008 x64 ONLY by IP (ms17_010_eternalblue) Exploit Windows Vista/XP/2000/2003 ONLY by IP (ms17_010_psexec) Exploit Windows with a link (HTA Server) Contact with me - My accounts EasySploit's installation    You must install Metasploit Framework first.    For Arch Linux-based distros, enter this command: sudo pacman -S metasploit    For other Linux distros, enter these command to install Metasploit Framework:    And then, enter these commands to install EasySploit: How to use EasySploit? (EasySploit video...