<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: powerexploit</title>
    <description>The latest articles on DEV Community by powerexploit (@powerexploit).</description>
    <link>https://dev.to/powerexploit</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F186356%2F6f5d407d-a67e-4f7f-a18a-7dc9d9507343.png</url>
      <title>DEV Community: powerexploit</title>
      <link>https://dev.to/powerexploit</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/powerexploit"/>
    <language>en</language>
    <item>
      <title>Operating system Detection using TTL value Powershell &amp; Ping! </title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Fri, 17 Jan 2020 09:05:31 +0000</pubDate>
      <link>https://dev.to/powerexploit/operating-system-detection-using-ttl-value-powershell-ping-51l8</link>
      <guid>https://dev.to/powerexploit/operating-system-detection-using-ttl-value-powershell-ping-51l8</guid>
      <description>&lt;p&gt;When I was working on networking &amp;amp; data communication using several scripting &amp;amp; tools, Ping was my first tool in networking. I found an article about operating system detection using &lt;strong&gt;TTL(TIME TO Live) &amp;amp; Ping, which jerked my brain. Ping is a networking utility in DCN used to check connectivity between two devices in networking which can be used from the command line of window &amp;amp; terminal of Linux operating systems. and Time TO Live simply means, how long a resolver is supposed to cache the DNS query before the query expires and a new one needs to be done.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fluz0b3q17k6uwiq4pl3c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fluz0b3q17k6uwiq4pl3c.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
As You can see in the above ipv4 header there is one field about Time to live which contains 8 bits, it is a mechanism that limits the lifespan or lifetime of data in a computer or network in ipv4.&lt;br&gt;
&lt;strong&gt;Note: For more information about ipv4 TTL visit Wikipedia.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;What I Did ?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fbu08xrrc3mf51at6112a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fbu08xrrc3mf51at6112a.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;This diagram shows the different TTL values of operating systems according to their window size(discuss later)&lt;/strong&gt;.&lt;br&gt;
It's time to detect an operating system with TTL values &amp;amp; Ping, So first of all because I was working on a window, the time was to open the power shell(the only reason why I used the window). In step one, I ran the tracert(traceroute in Linux) command to trace the route of IP or domain.&lt;br&gt;
&lt;strong&gt;Command: tracert dev.to&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fbvvkzurty1gqak4rbneu.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fbvvkzurty1gqak4rbneu.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Note : Number Of Hops : 10 .&lt;/strong&gt;&lt;br&gt;
Time was to run ping, Ping operates by sending Internet Control Message Protocol (ICMP) Echo Request packets to the target host and waiting for an ICMP Echo Reply.&lt;br&gt;
&lt;strong&gt;Command: ping dev. to&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fdb2rf87c0kcz0x6cbka3.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fdb2rf87c0kcz0x6cbka3.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Now TTL value is 54 &amp;amp; Number Of Hops we get 10 By adding TTL value with Hops in number &lt;strong&gt;(54+10 = 64)&lt;/strong&gt;, we can conclude that there is a Linux Machine Running Because The first diagram shows that Linux includes 64 TTL.&lt;br&gt;
&lt;strong&gt;In the next para I am explaining the power-shell script to detect OS.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Powershell to detect Operating System:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Power-shell has its function &amp;amp; cmdlets that can work as same as ping to get TTL value, so because I wanted to automate the whole Operating system detection process using TTL in a single power-shell module as ping.&lt;br&gt;
In the coding part, I wrote a power-shell module with the &lt;strong&gt;PsPing&lt;/strong&gt; function for Os in which I implemented the &lt;strong&gt;test-connection&lt;/strong&gt; cmdlet of powershell.&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag_gist-liquid-tag"&gt;
  
&lt;/div&gt;
&lt;br&gt;
To run above module/script I opened up my power-shell terminal:&lt;br&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;import-module&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-name&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s1"&gt;'path of file/name'&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;get-command&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-module&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;TTLOs.psm1&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="mi"&gt;3&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;PsPing&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;google.com&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  &lt;strong&gt;Execution:&lt;/strong&gt;
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;exploit&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;import-module&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-name&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;TTlOs.psm1&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;exploit&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;wc&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;F:\coding_part\powershell_scripting\scripts\TTlOs.psm1&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="mi"&gt;52&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;130&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;803&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;F:\coding_part\powershell_scripting\scripts\TTlOs.psm1&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="nx"&gt;exploit&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;PsPing&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;google.com&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Target&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;is&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;running&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;on&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Linux&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Machine&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;according&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;to&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;TTL&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;value&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;53&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Research Paper is also present on my github related to TTL.&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;so enjoy &amp;amp; support me follow me on &lt;a href="https://github.com/powerexploit" rel="noopener noreferrer"&gt;github&lt;/a&gt; and &lt;a href="https://twitter.com/arjundobal96" rel="noopener noreferrer"&gt;twitter&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>powershell</category>
      <category>beginners</category>
      <category>ttl</category>
      <category>ping</category>
    </item>
    <item>
      <title>Syn Stealth Scan With Power Of Python &amp; Scapy </title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Mon, 25 Nov 2019 10:39:34 +0000</pubDate>
      <link>https://dev.to/powerexploit/syn-stealth-scan-with-power-of-python-scapy-58aj</link>
      <guid>https://dev.to/powerexploit/syn-stealth-scan-with-power-of-python-scapy-58aj</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fankitdobhal.github.io%2Fimages%2FEreet_Packet_Trace_Connect_Open.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fankitdobhal.github.io%2Fimages%2FEreet_Packet_Trace_Connect_Open.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This blog post is a memo of python code snippets that I found particularly useful and good in the field of scanning and hacking.From a week I am working on one of the best module 'Scapy'.Then today I finally created a script which can execute syn stealth scan.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Execute the Scapy Code For $Syn Stealth Sc@n:
&lt;/h2&gt;


&lt;div class="ltag_gist-liquid-tag"&gt;
  
&lt;/div&gt;


</description>
      <category>python</category>
      <category>linux</category>
    </item>
    <item>
      <title>Powershell For Hackers - Part 1</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Mon, 25 Nov 2019 10:22:53 +0000</pubDate>
      <link>https://dev.to/powerexploit/powershell-for-hackers-part-1-39l3</link>
      <guid>https://dev.to/powerexploit/powershell-for-hackers-part-1-39l3</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fwpmlojwamqinca6aer91.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fwpmlojwamqinca6aer91.gif" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Welcome back my aspiring hackers this is a series of Powershell Which Will Explain to You the power of command lines! So Let's Get Started!!&lt;/strong&gt;&lt;br&gt;
As you all know for being a professional hacker(white, black) you need to be proficient in Linux &amp;amp; its flavors. There are some reasons for this.&lt;br&gt;
&lt;strong&gt;[!0]Linux is an open-source operating system &amp;amp; most of the hacking tools are built-in Linux.&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;[!1]The Terminal of Linux has full control over the operating system besides cmd.exe in windows.&lt;/strong&gt;&lt;br&gt;
For these couple of reasons, we as a hacker/pen-tester believe that Linux provides us a good environment for our penetration testing tasks but In recent years, Microsoft seems to have gained religion in terms of the advantage of the command line and terminal in Linux. Finally, now it seems they understand the strengths and advantages of the command line, and as a response, then it comes windows &lt;strong&gt;powershell&lt;/strong&gt;.&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;What is Powershell?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fxhpdy7hlvmupwnqvqefd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fxhpdy7hlvmupwnqvqefd.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
PowerShell is a task-based command-line shell and scripting language built on. NET. PowerShell helps system administrators and power-users rapidly automate tasks that manage operating systems (Linux, macOS, and Windows) and processes. PowerShell commands let you manage computers from the command line.&lt;br&gt;
&lt;strong&gt;note: For more details about the history of powershell visit Wikipedia&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Cmdlet In Powershell?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fpyukt5jeneg1ujuxlmf0.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fpyukt5jeneg1ujuxlmf0.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Cmdlets are specialized commands in the PowerShell environment that implement specific functions. Cmdlets are similar to commands in the Linux terminal.&lt;br&gt;
One of the key differences between Windows PowerShell and the BASH shell in Linux is that Microsoft has developed cmdlets (command lets) for PowerShell. The cmdlets are single commands that accomplish sometimes more complex tasks similar to functions. These cmdlets take the form of verb-noun, such as "get-help".&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Powershell Commands vs Linux Terminal Command&lt;/strong&gt; :
&lt;/h1&gt;

&lt;p&gt;There are some major commands those are the same in Linux &amp;amp; as well as powershell, but they both have their advantages in the field of pen-testing for example cat command is used in Linux for reads data from the file and gives their content as output, this command also works in powershell.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Windows&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;PowerShell&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Copyright&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;C&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Microsoft&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Corporation.&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;All&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;rights&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;reserved.&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Loading&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;personal&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;and&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;system&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;profiles&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;took&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;703ms.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;C:\windows\system32&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;cat&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;cmdlet&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Get-Content&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;at&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;command&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;pipeline&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;position&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;1&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Supply&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;values&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;for&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;the&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;following&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;parameters:&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Path&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;]:&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  &lt;strong&gt;Get-help In Powershell ?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Get help in one of the important &amp;amp; basic commands in power-shell, especially if you want to use powershell as a hacking framework or tool this command will be very helpful for you. Get-help lets you find out whole help info about any particular command with detailed examples.&lt;br&gt;
&lt;strong&gt;note: For example, there is a command in PowerShell 'invoke-psnmap' a nmap wrapper as a port scanner &amp;amp; you don't know how to use this particular one so will use 'get-help'.&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Windows&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;PowerShell&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Copyright&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;C&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Microsoft&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Corporation.&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;All&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;rights&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;reserved.&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;Loading&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;personal&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;and&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;system&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;profiles&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;took&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;908ms.&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;C:\Users\HP&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;get-help&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;invoke-psnmap&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="n"&gt;NAME&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nx"&gt;Invoke-PSnmap&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F04w89zt5rzw2scky8bg2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F04w89zt5rzw2scky8bg2.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is part one of 'power-shell for pen-tester' series with some basic information about powershell its commands thanks for visiting this blog.&lt;br&gt;
In the next part I will explain some important commands in power-shell which will help you to execute your penetration task in easy with window without using Linux.&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;Its a series only for learners in hacking so enjoy &amp;amp; support me&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;follow me on &lt;a href="https://github.com/powerexploit" rel="noopener noreferrer"&gt;github&lt;/a&gt;,&lt;a href="https://twitter.com/arjundobal96" rel="noopener noreferrer"&gt;twitter&lt;/a&gt; &amp;amp; checkout &lt;a href="https://ankitdobhal.github.io" rel="noopener noreferrer"&gt;ankitdobhal.github.io&lt;/a&gt;.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fsxq10aw718i7xwf9hgkz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fsxq10aw718i7xwf9hgkz.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>powershell</category>
      <category>commandline</category>
      <category>beginners</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Did I Execute Mass Mail Attack To The Gmail or not?</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Mon, 28 Oct 2019 14:54:58 +0000</pubDate>
      <link>https://dev.to/powerexploit/did-i-execute-mass-mail-attack-to-the-gmail-or-not-1c2f</link>
      <guid>https://dev.to/powerexploit/did-i-execute-mass-mail-attack-to-the-gmail-or-not-1c2f</guid>
      <description>&lt;p&gt;"&lt;strong&gt;Python is just not a scripting language but it is one of dangerous tool which helps us to execute pen testing tasks.&lt;/strong&gt;"&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;The Beginning:&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;There was a time when I didn't know about the thing &lt;strong&gt;gmail&lt;/strong&gt; or how to create a gmail account &amp;amp; how to send mail using such type of mailing services,Yeh! it sound to much awkward but I am talking about a lot of year ago. There was my friend in school who told me about such type of mail services basic understanding about how to create &amp;amp; send mail from &lt;strong&gt;gmail&lt;/strong&gt;,I was happy.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Azw6oSck--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/8e6vh7v0fnco9ql60ow0.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Azw6oSck--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/8e6vh7v0fnco9ql60ow0.gif" alt="Alt Text" width="880" height="466"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;The Research:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Then after lot of year being computer geek I tried to understand the basic concept of mail servcies that how they works on web.&lt;strong&gt;So what I learned?&lt;/strong&gt; Gmail or any other services basically works on smtp service &amp;amp; the protocol used behind these mailing action is &lt;strong&gt;smtp&lt;/strong&gt; or &lt;strong&gt;Simple Mail Transfer Protocol&lt;/strong&gt; with port no : 25 but for gmail is usuaully works on 587 port.And A bit of research and I found out the dangerous fact of SMTP infrastructure.You have to basically setup smtp server to send mails.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JXfc_ONB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/5wndqtl7ruchow439ayo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JXfc_ONB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/5wndqtl7ruchow439ayo.png" alt="Alt Text" width="880" height="646"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;note : Yeh! there is another one protocol imap but it can read the mails and does not work as same as smtp because it doesn't provide send method.&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Mass Mail To The Gmail Working Or Not:&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;So after understanding the smtp server concept,I thought let's try to set up the smtp server in programming way.Because I was working one of my favourite scripting language &lt;strong&gt;python&lt;/strong&gt;, So I decided to use python module &lt;strong&gt;smtplib&lt;/strong&gt;.&lt;strong&gt;SMTPLIB&lt;/strong&gt; provides amazing functions to connect smtp server,so firstly created a simple script just to connect &amp;amp; login server only for &lt;strong&gt;gmail&lt;/strong&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="nn"&gt;smtplib&lt;/span&gt;
&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="nn"&gt;getpass&lt;/span&gt;
&lt;span class="n"&gt;smtpobj&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;smtplib&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;SMTP&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;'smtp.gmail.com'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="mi"&gt;587&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;my_email&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;input&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"What is  your gmail?:"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;my_passw&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;getpass&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;getpass&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Enter the password:"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;smtpobj&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;starttls&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; 
&lt;span class="c1"&gt;#This step enables encryption(TLS Encryption) for your connection.
&lt;/span&gt;&lt;span class="n"&gt;smtpobj&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;login&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;my_email&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;my_passw&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="c1"&gt;#this will help user to logged in gmail account
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;center&gt;&lt;b&gt;wow! the above script was working amazingly now it was very simple to connect smtp server for me and login to gmail account.Then after this one geeky thing came into my mind let's try to send multiple mail to a particular gmail address like &lt;a href="https://medium.com/@hackersleague/what-is-mass-mailer-attack-6f205c2d9937"&gt;mass mail&lt;/a&gt;.&lt;/b&gt;&lt;/center&gt;

&lt;h4&gt;&lt;center&gt;Let's begin the fun&lt;/center&gt;&lt;/h4&gt;

&lt;p&gt;So I created a fully automated script/tool to send 100 mails to the receiver or recipient.Bravo! It was working very amazing helping me to send 100 mails or mass mail other one gmail.I have also uploaded this script into my &lt;a href="https://gist.github.com/ankitdobhal"&gt;gist&lt;/a&gt; .&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag_gist-liquid-tag"&gt;
  
&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;But the problem I was having that it was working only for 100 mails &amp;amp; surely this is not full mass mail attack to gmail,So to get rid I decided to create this as a open source project name as &lt;a href="https://github.com/ankitdobhal/MailBomber"&gt;MailBomber&lt;/a&gt;,Now I am working with some open source contributor to get rid this problem &amp;amp;  trying to build one of the super amazing tool for pentester.&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;This article is designed to express my experience about how mass mail attack can be done using python &amp;amp; If their is any python lover want to collaborate with me this super amazing project can contribute your codes in below given project.&lt;/strong&gt; &lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--566lAguM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/powerexploit"&gt;
        powerexploit
      &lt;/a&gt; / &lt;a href="https://github.com/powerexploit/MailBomber"&gt;
        MailBomber
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      Osint Mass Mail 😎 Attack tool.
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;h1&gt;
MaiBomber - Mass Mail Attack tool&lt;/h1&gt;
&lt;p&gt;MailBomber is one of the easiest &amp;amp; simple tool in python which basically works on &lt;strong&gt;mass mail attack&lt;/strong&gt; to send multiple mails to victim.It is inspired by &lt;strong&gt;Mass mail attack vector&lt;/strong&gt; in &lt;strong&gt;kali linux&lt;/strong&gt;  &lt;strong&gt;Setoolkit(Social engineering tool)&lt;/strong&gt;.It is designed with smtplib library.
&lt;a rel="noopener noreferrer" href="https://camo.githubusercontent.com/8456a798cc3ddadb3cadc13394d79888830ef11e10e5b704ca219aaffd584b7a/68747470733a2f2f74686570726163746963616c6465762e73332e616d617a6f6e6177732e636f6d2f692f3634336c7274396e64716c397a397978656d6e322e706e67"&gt;&lt;img src="https://camo.githubusercontent.com/8456a798cc3ddadb3cadc13394d79888830ef11e10e5b704ca219aaffd584b7a/68747470733a2f2f74686570726163746963616c6465762e73332e616d617a6f6e6177732e636f6d2f692f3634336c7274396e64716c397a397978656d6e322e706e67" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
Vision&lt;/h2&gt;
&lt;h4&gt;
print("Just to contribute &amp;amp; help hacking community")&lt;/h4&gt;
&lt;h4&gt;
print("Helps to understand the power of python")&lt;/h4&gt;
&lt;p&gt;&lt;a rel="noopener noreferrer" href="https://camo.githubusercontent.com/2345e2d11fd30e747ab0a12c55f497a3c7a9a355d6eb340e7effad60aa949721/68747470733a2f2f74686570726163746963616c6465762e73332e616d617a6f6e6177732e636f6d2f692f683638377a33673234366470627230737a6778782e706e67"&gt;&lt;img src="https://camo.githubusercontent.com/2345e2d11fd30e747ab0a12c55f497a3c7a9a355d6eb340e7effad60aa949721/68747470733a2f2f74686570726163746963616c6465762e73332e616d617a6f6e6177732e636f6d2f692f683638377a33673234366470627230737a6778782e706e67" alt="Alt Text"&gt;&lt;/a&gt;
&lt;a rel="noopener noreferrer" href="https://camo.githubusercontent.com/a337b284cc8a405d923127c7c9b364beea7089aa29da9cfc868ac2c3efd37b82/68747470733a2f2f74686570726163746963616c6465762e73332e616d617a6f6e6177732e636f6d2f692f3631683866706d677935696d66733235643778702e706e67"&gt;&lt;img src="https://camo.githubusercontent.com/a337b284cc8a405d923127c7c9b364beea7089aa29da9cfc868ac2c3efd37b82/68747470733a2f2f74686570726163746963616c6465762e73332e616d617a6f6e6177732e636f6d2f692f3631683866706d677935696d66733235643778702e706e67" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
Contribution&lt;/h2&gt;
&lt;p&gt;If you want to contribute to this super amazing tool , So You can contribute in following ways:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Report bugs&lt;/li&gt;
&lt;li&gt;Add some code&lt;/li&gt;
&lt;li&gt;Give suggestions to make it better&lt;/li&gt;
&lt;li&gt;Fix issues &amp;amp; submit a pull request&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;



&lt;/div&gt;
&lt;br&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/powerexploit/MailBomber"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;/div&gt;
&lt;br&gt;
&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Thanks for visiting my blog please keep follow me on &lt;a href="https://twitter.com/arjundobal96"&gt;twitter&lt;/a&gt; , &lt;a href="https://github.com/ankitdobhal"&gt;github&lt;/a&gt;, &lt;a href="https://www.linkedin.com/in/ankit-dobhal-aa237015b/"&gt;linkedin&lt;/a&gt;&lt;/strong&gt;

</description>
      <category>python</category>
      <category>git</category>
      <category>linux</category>
    </item>
    <item>
      <title>Let's! Ping The Network with 15 Line Of Code Using Python &amp; Scapy!</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Sat, 12 Oct 2019 10:59:14 +0000</pubDate>
      <link>https://dev.to/powerexploit/let-s-ping-the-network-with-python-scapy-5g18</link>
      <guid>https://dev.to/powerexploit/let-s-ping-the-network-with-python-scapy-5g18</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F3jivpktvsvhavic0km8d.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F3jivpktvsvhavic0km8d.gif" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;This Blog is basically published first in my blog &lt;a href="https://ankitdobhal.github.io/posts/2019/10/Ping%20The%20Network%20with%20Python%20&amp;amp;%20Scapy/" rel="noopener noreferrer"&gt;ankitdobhal.github.io&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;My funny experience:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Let's try to travel the time 1 year back when I started to learn about little bit about hacking and networking in windows and &lt;strong&gt;Linux&lt;/strong&gt;. &lt;strong&gt;Ping&lt;/strong&gt; was my first tool,it is a basic networking utility which helps to check connectivity and communication b/w two systems.So When first time I used this utility it helped me to understand the basic concept of &lt;strong&gt;packets&lt;/strong&gt;,and I was very much happy. well I know its sound to much awkward now.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F4qgkyv4m36qp8botka49.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F4qgkyv4m36qp8botka49.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Well!! Then after spending my more time in pentesting, I started to automate more stuff using &lt;strong&gt;python&lt;/strong&gt;. yesterday &lt;strong&gt;ping&lt;/strong&gt; came back to me, when I was working and trying to understand how packets works, &amp;amp; found one of the module of the python &lt;a href="https://scapy.net" rel="noopener noreferrer"&gt;&lt;strong&gt;scapy&lt;/strong&gt;&lt;/a&gt; and tried to break the code &amp;amp; ping the network,lets try to understnd what I did with with &lt;strong&gt;scapy&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Scapy and How it works:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;So before discussing about &lt;strong&gt;scapy&lt;/strong&gt; you need to be able that how to write code in python ,&amp;amp; if you don't know then this place is not for you!! Now What is &lt;strong&gt;Scapy&lt;/strong&gt; and how it works?&lt;br&gt;
Well &lt;a href="https://scapy.net" rel="noopener noreferrer"&gt;&lt;strong&gt;scapy&lt;/strong&gt;&lt;/a&gt; is a powerful &lt;strong&gt;Python-based interactive packet manipulation program and library&lt;/strong&gt;.It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work.&lt;/p&gt;

&lt;p&gt;To install this super amazing python based library &amp;amp; tool you need to write this following commands in your os terminal:&lt;/p&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;

&lt;p&gt;&lt;span class="n"&gt;pip&lt;/span&gt; &lt;span class="n"&gt;install&lt;/span&gt; &lt;span class="nf"&gt;scapy &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Windows&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;br&gt;
&lt;span class="n"&gt;pip3&lt;/span&gt; &lt;span class="n"&gt;install&lt;/span&gt; &lt;span class="nf"&gt;scapy &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Linux&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;/p&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;h2&gt;
&lt;br&gt;
  &lt;br&gt;
  &lt;br&gt;
  &lt;strong&gt;My ping script with scapy &amp;amp; python:&lt;/strong&gt;&lt;br&gt;
&lt;/h2&gt;
&lt;br&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;

&lt;p&gt;&lt;span class="c1"&gt;#!/usr/bin/python3&lt;/span&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  pingscanner.py
&lt;/h1&gt;

&lt;p&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;sys&lt;/span&gt;&lt;br&gt;
&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;scapy.all&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt;&lt;br&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;pinging the target....&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;br&gt;
&lt;span class="n"&gt;ip&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sys&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;argv&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;    &lt;span class="c1"&gt;# command line argument&lt;br&gt;
&lt;/span&gt;&lt;span class="n"&gt;icmp&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;IP&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;dst&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;ip&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="nc"&gt;ICMP&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;&lt;br&gt;
&lt;span class="c1"&gt;#IP defines the protocol for IP addresses&lt;/span&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  dst is the destination IP address
&lt;/h1&gt;
&lt;h1&gt;
  
  
  TCP defines the protocol for the ports
&lt;/h1&gt;

&lt;p&gt;&lt;span class="n"&gt;resp&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;sr1&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;icmp&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;br&gt;
&lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;resp&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="bp"&gt;None&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;br&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;This host is down&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;br&gt;
&lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;br&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;This host is up&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;/p&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;h2&gt;
&lt;br&gt;
  &lt;br&gt;
  &lt;br&gt;
  &lt;strong&gt;what is this code doing? Let's break&lt;/strong&gt;&lt;br&gt;
&lt;/h2&gt;

&lt;p&gt;Python have its power to automate most of the stuffs which lets the pentester to ease their hacking task,In above code the basic first thing I did &lt;strong&gt;imported scapy and sys module&lt;/strong&gt; to use them their functions,&lt;strong&gt;ip&lt;/strong&gt; is the variable which stores the target ip address ,&lt;strong&gt;icmp&lt;/strong&gt; variable which creates packet and &lt;strong&gt;resp&lt;/strong&gt; variable which  contain &lt;strong&gt;sr1&lt;/strong&gt; function that Send packets at layer 3 and return only the first answer.Then finally conditional statement to check host is up or down.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thankyou for visiting and understanding the power of python,You can also find above code in my &lt;a href="https://gist.github.com/ankitdobhal/158606d8c60827abbeca86880d2e020c" rel="noopener noreferrer"&gt;gist&lt;/a&gt; and can ask me about anything follow me on &lt;a href="https://twitter.com/arjundobal96" rel="noopener noreferrer"&gt;twitter&lt;/a&gt;,&lt;a href="https://github.com/ankitdobhal" rel="noopener noreferrer"&gt;github&lt;/a&gt;,&lt;a href="https://medium.com/@ankudobal46" rel="noopener noreferrer"&gt;medium&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>github</category>
    </item>
    <item>
      <title>Wow! Scraping Wikipedia content With 10 line of code!</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Sat, 05 Oct 2019 11:30:06 +0000</pubDate>
      <link>https://dev.to/powerexploit/wow-scraping-wikipedia-content-with-10-line-of-code-327l</link>
      <guid>https://dev.to/powerexploit/wow-scraping-wikipedia-content-with-10-line-of-code-327l</guid>
      <description>&lt;p&gt;"&lt;strong&gt;Hackers loves to use scraping to harvest data.~Ankit Dobhal&lt;/strong&gt;"&lt;br&gt;
original blog is here - &amp;gt;&lt;a href="https://ankitdobhal.github.io/posts/2019/10/Scraping%20Wikipedia%20With%20Python/" rel="noopener noreferrer"&gt;blog&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Welcome to My Blog&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Hello my Computer Geek Friend!!This is a blog about scraping wikipedia content using python &amp;amp; bs4(python module),So what is exactly web scraping &amp;amp; from where this term comes from?Let's Try To Understand!!&lt;br&gt;
&lt;strong&gt;Web Scraping - :&lt;/strong&gt;&lt;br&gt;
Web scraping is data scraping process used for extracting data from websites.Web scraping can be done manually by a software user, the term typically refers to automated processes implemented using a bot or web crawler.It comes when world wide web born.Most of time search engine like google uses crawling process in their search result.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scraping With Python - :&lt;/strong&gt;&lt;br&gt;
Web scraping &amp;amp; crawling can be done with the help of some softwares but in Nowadays Python is gaining its popularty in the field of web scraping &amp;amp; crawling ,&amp;amp; as we all know python is one of the most famous &amp;amp; powerful scripting languages generally for hackers &amp;amp; shell coders.Python have some amazing &amp;amp; powerful modules &amp;amp; libraries which makes this scraping process so easy &amp;amp; useful,Their are two important modules in python one is &lt;strong&gt;requests&lt;/strong&gt; &amp;amp; another is &lt;strong&gt;BeautifulSoup&lt;/strong&gt;.&lt;/p&gt;

&lt;h1&gt;
  
  
  Let's Write Python Script to scrape wikipedia content or wikpedia searcher:
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;I have a basic understanding how to do get request  to websites using python , so first of all I open up my &lt;strong&gt;vscode&lt;/strong&gt; editor and create file name as &lt;strong&gt;wikipy.py&lt;/strong&gt;.Then import &lt;strong&gt;sys&lt;/strong&gt; library(&lt;strong&gt;command line argument&lt;/strong&gt;), &lt;strong&gt;requests&lt;/strong&gt; library(&lt;strong&gt;for downloading &amp;amp; get method to wikipedia&lt;/strong&gt;), &amp;amp; my favorite library &lt;strong&gt;BeautifulSoup&lt;/strong&gt; as &lt;strong&gt;bs4&lt;/strong&gt; (&lt;strong&gt;To extact content from wikipedia page&lt;/strong&gt;).&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fwflp6q7l9jvrdwt0yfbp.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fwflp6q7l9jvrdwt0yfbp.JPG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Now its time to use get method to requests data from wikipedia server , but wait  I want to create a wikipedia searcher which will scrape the data according to my command line argument.So let's create a variable name as &lt;strong&gt;res&lt;/strong&gt; to store get method to wikipedia search url &amp;amp; add it with my command line argument.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F815z46vojx879xkbr51e.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F815z46vojx879xkbr51e.JPG" alt="Alt Text"&gt;&lt;/a&gt; &lt;br&gt;
&lt;strong&gt;note: I uses raise_for_status() method if their is any error code and status code comes so this method will raise that &amp;amp; whole script will terminate.&lt;/strong&gt;&lt;br&gt;
 &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F0lz57c8hrcqtn488yf7a.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F0lz57c8hrcqtn488yf7a.JPG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;res&lt;/strong&gt; download the whole page but it is complicating to extract data from the page bacuase it shows the html format data , so now this is time to use &lt;strong&gt;BeautifulSoup&lt;/strong&gt; to extract data. So I am creating a variable name as &lt;strong&gt;wiki&lt;/strong&gt; to extract data.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fw1q8rhinaq6j5cpiczor.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fw1q8rhinaq6j5cpiczor.JPG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;note: As you can in wiki variable I uses Beautiful Soup function with two parameters ,So what they are exactly? let's understand. res.text is a text format of the page which is downloaded with the help of res variable  &amp;amp; html.parser is a parser which will help me to structure the data into html format.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I want to scrape the p tag content according to command line argument because the whole text content of Wikipedia page is inside the p tag you can check this with the help of developer tools of chrome &amp;amp; Firefox.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Favqkw2464ox3ivqtsqyi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Favqkw2464ox3ivqtsqyi.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Now I am using .select() function to select p tag &amp;amp; for loop to looping throgh it ,then finally printing the text elements imside p tag with.getText() function.&lt;br&gt;
 &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F9w6lk4jrnl9zu7ts5qdx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F9w6lk4jrnl9zu7ts5qdx.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Yeah we did it in just 10 line of code bravo!!!&lt;/strong&gt;&lt;br&gt;
Its time to run the script with command line argument &amp;gt;&amp;gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F9nw28k5v7plrk5qocnip.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F9nw28k5v7plrk5qocnip.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thankyou all for visting my blog you can also check my gist for wikipy script the link is below!!&lt;br&gt;
&lt;a href="https://gist.github.com/ankitdobhal/cc40a40cccd69bd646aaa06b7a05046e" rel="noopener noreferrer"&gt;wiki.py&lt;/a&gt;&lt;br&gt;
follow me on github &amp;amp; linkedlin for more exciting blogs and scripts!&lt;/strong&gt; &lt;br&gt;
This blog is basically quoted from my blog website visit original blog-&amp;gt;&lt;br&gt;
&lt;a href="https://ankitdobhal.github.io/posts/2019/10/Scraping%20Wikipedia%20With%20Python/" rel="noopener noreferrer"&gt;https://ankitdobhal.github.io/posts/2019/10/Scraping%20Wikipedia%20With%20Python/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>vscode</category>
    </item>
    <item>
      <title>Hack The Box invite code challenge!Its time to begin hack.</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Fri, 30 Aug 2019 15:36:07 +0000</pubDate>
      <link>https://dev.to/powerexploit/hack-the-box-invite-code-challenge-its-time-to-begin-hack-34a6</link>
      <guid>https://dev.to/powerexploit/hack-the-box-invite-code-challenge-its-time-to-begin-hack-34a6</guid>
      <description>&lt;p&gt;&lt;strong&gt;Its an open challenge for all dev.to programmers &amp;amp; hackers hack the invite code of Hackthebox ,play with this explain your tools &amp;amp; tricks in comment box ~Thankyou.&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hackthebox&lt;/strong&gt;* is An online platform to test and advance your skills in penetration testing and cyber security. Join today and start training in our online labs.If you want learn ore about &lt;strong&gt;pentesting,hacking&lt;/strong&gt; so &lt;strong&gt;hackthebox&lt;/strong&gt; is one of the best online platform for all beginner's.&lt;br&gt;
But wait Let's talk the fun part to start working on the hackthebox first of all you need to hack it,means you need to get the invite code of this super platform.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VQYoYyXk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/6k48fwa5bm6r594d1m1u.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VQYoYyXk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/6k48fwa5bm6r594d1m1u.JPG" alt="Alt Text" width="880" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I have explained my methods for this challenge below!&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;My Tools and tricks to hack the invite code of hackthebox:&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  My First Method:
&lt;/h3&gt;

&lt;p&gt;-&amp;gt; Tools:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;chrome devtools&lt;/li&gt;
&lt;li&gt;Burpsuit&lt;/li&gt;
&lt;li&gt;curl&lt;/li&gt;
&lt;li&gt;base64&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  My Second Method:
&lt;/h3&gt;

&lt;p&gt;-&amp;gt; Tools:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;chrome devtools&lt;/li&gt;
&lt;li&gt;curl&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-&amp;gt; Scripting:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Javascript&lt;/li&gt;
&lt;li&gt;Python script&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;My Python Script to hack the hackthebox invite code:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ss7YWqHY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/udnne9jqzu8216u4oe3n.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ss7YWqHY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/udnne9jqzu8216u4oe3n.JPG" alt="Alt Text" width="880" height="368"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://gist.github.com/ankitdobhal/c6ef926cd943383a5ada4a0a8e47fd8c"&gt;https://gist.github.com/ankitdobhal/c6ef926cd943383a5ada4a0a8e47fd8c&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So after using curl I found the encrypted message of code and decode the message using my python script.To decrypt the code I used base64 python library and sys library for passing command line arguments.&lt;br&gt;
-&amp;gt; import sys&lt;br&gt;
-&amp;gt; import base64&lt;br&gt;
The &lt;a href="https://gist.github.com/ankitdobhal/c6ef926cd943383a5ada4a0a8e47fd8c"&gt;Script&lt;/a&gt; is avalibale in my github account.`&lt;strong&gt;Thankyou&lt;/strong&gt; &lt;br&gt;
So its a challenge explain your tools &amp;amp; tricks in comment section Hope we will do something amazing with this challenge.&lt;/p&gt;

</description>
      <category>python</category>
      <category>linux</category>
      <category>javascript</category>
      <category>challenge</category>
    </item>
    <item>
      <title>Top 5 Basic Networking Commands In Windows</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Mon, 12 Aug 2019 09:02:52 +0000</pubDate>
      <link>https://dev.to/powerexploit/top-5-basic-networking-commands-in-windows-198o</link>
      <guid>https://dev.to/powerexploit/top-5-basic-networking-commands-in-windows-198o</guid>
      <description>&lt;p&gt;"&lt;strong&gt;If you want to know about networking and System hacking so first of all understand the command line interface of any operating system(Linux,Window,Ubuntu...) - Ankit Dobhal&lt;/strong&gt;"&lt;/p&gt;

&lt;p&gt;I love to work mostly on Command line interface(terminal) of any operating system either it is window,Linux,Ubuntu etc. &lt;/p&gt;

&lt;p&gt;Well &lt;strong&gt;Window&lt;/strong&gt; operating system contain  numerous built-in, command line networking utilities or tools.Most important think that as windows &lt;strong&gt;administrator&lt;/strong&gt; you have to know about the basic networking utility or tools in Window machine.Windows operating system contain some build in networking &lt;strong&gt;utility&lt;/strong&gt; or &lt;strong&gt;commands&lt;/strong&gt;. &lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Networking Commands In Window :&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fx9vu71wm5nzpd1mkv2zb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fx9vu71wm5nzpd1mkv2zb.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;ipconfig :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;ipconfig is one of the important &amp;amp; basic command in windows which can be used to display the network information of your machine like ip address,DNS etc..&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;-&amp;gt; open your window terminal and run 'ipconfig' command.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fdwx6i9ko3u3b6t2m21x3.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fdwx6i9ko3u3b6t2m21x3.JPG"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;ping :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;ping is more often used networking utilities in windows which is used for detecting devices on a network and for troubleshooting network problem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;-&amp;gt; open your window terminal and run 'ping' command.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Ftlj5hm4yiuyj1ptbd6z9.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Ftlj5hm4yiuyj1ptbd6z9.JPG"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;netstat :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;netstat is very useful command. It is used for displaying the udp and tcp connection &amp;amp; ports in your system.It is also used to detect any tipe of virus in your system by showing an unknown port. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;-&amp;gt; open your window terminal and run 'netstat -a' command.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F4awtwvhxp7bmxsvm9b73.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F4awtwvhxp7bmxsvm9b73.JPG"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;note: -a is used for all ports in system.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;tracert :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;tracert stands for traceroute like ping it sends out a data packet as a way to troubleshoot any network issues you might have, but instead tracks the route of the packet as it hops from server to server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;-&amp;gt; open your window terminal and run 'tracert ip_address' command.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fr0tszipsjlze396iz9lf.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fr0tszipsjlze396iz9lf.JPG"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;nbtstat :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;nbstat is a utility that displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP).&lt;br&gt;
In ethical hacking their is a term called enumeration which is used to extract user names, machine names, network resources, shares and services from a system.&lt;br&gt;
So for enumeration sometime nbtstat command uses to enumerate sharing services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;-&amp;gt; open your window terminal and run 'nbstat ip_address' command.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Flye3ffiim2a5jx5j3ada.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Flye3ffiim2a5jx5j3ada.JPG"&gt;&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;So as I explained the basic networking commands in window . For more details about these commands you can &lt;a href="https://github.com/ankitdobhal" rel="noopener noreferrer"&gt;ask&lt;/a&gt; me.&lt;/p&gt;

</description>
      <category>commandline</category>
      <category>github</category>
      <category>linux</category>
      <category>discuss</category>
    </item>
    <item>
      <title>How Do I Hunt Down Social Media Accounts Using Sherlock?</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Thu, 01 Aug 2019 10:40:25 +0000</pubDate>
      <link>https://dev.to/powerexploit/how-do-i-hunt-down-social-media-accounts-using-sherlock-511i</link>
      <guid>https://dev.to/powerexploit/how-do-i-hunt-down-social-media-accounts-using-sherlock-511i</guid>
      <description>&lt;p&gt;"&lt;strong&gt;Social media is one of the easiest platform for hackers to find out information about any particular person or target. - Ankit Dobhal&lt;/strong&gt;"&lt;/p&gt;

&lt;p&gt;Today! I wake up very late in the morning,&amp;amp; later at 9:30 I had a breakfast.&lt;br&gt;
Then something happened one of my friend sent me a link about a tool &lt;strong&gt;Sherlock&lt;/strong&gt; which could hunt down social media accounts with username.&lt;/p&gt;

&lt;p&gt;Well as I usually do !!&lt;br&gt;
I sat down in a cheer in front my computer with a cup of coffee,boot up my operating system.&lt;br&gt;
Then I go through &lt;a href="https://github.com/sherlock-project/sherlock" rel="noopener noreferrer"&gt;github link&lt;/a&gt; of &lt;strong&gt;Sherlock&lt;/strong&gt; &amp;amp; started learning about that tool.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;What is Sherlock?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Sherlock is a python based tool which can reveal many user accounts created by the same person in the multiple social media platforms with their &lt;strong&gt;screen_name&lt;/strong&gt; or &lt;strong&gt;username&lt;/strong&gt;.&lt;br&gt;
sherlock script is written on python. You can checkout the whole script from its &lt;a href="https://github.com/sherlock-project/sherlock" rel="noopener noreferrer"&gt;github&lt;/a&gt; link.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fi5s59ny60iirfedqyno4.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fi5s59ny60iirfedqyno4.JPG"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How I Hunt Down Social media Accounts With Sherlock?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Step 1 -&amp;gt; Installed Sherlock&lt;/strong&gt;&lt;br&gt;
 In a terminal window I copied the link of sherlock from &lt;a href="https://github.com/ankitdobhal/sherlock" rel="noopener noreferrer"&gt;github&lt;/a&gt; and run following commands.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F3ox2dolbvwaz1ko6cb2i.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F3ox2dolbvwaz1ko6cb2i.JPG"&gt;&lt;/a&gt;&lt;br&gt;
 &lt;strong&gt;Note : Python3 and python3-pip have to be installed.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To get help about Sherlock I tried &lt;strong&gt;python sherlock -h&lt;/strong&gt; command from inside &lt;br&gt;
 the Sherlock folder.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F947hil9pokhs7zqkzf6k.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F947hil9pokhs7zqkzf6k.JPG"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 -&amp;gt; Identify screen name&lt;/strong&gt;&lt;br&gt;
Just after reading the help I was ready to start script.But wait how to find out screen name of my target? Then I found screen name of my target by running a Google search and "Twitter."&lt;/p&gt;

&lt;p&gt;My target was Sir &lt;strong&gt;&lt;a href="https://twitter.com/fs0c131y" rel="noopener noreferrer"&gt;Robert Baptiste&lt;/a&gt; aka elliot_alderson&lt;/strong&gt;. He is french security researcher &amp;amp; I admire his work on security a lot.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fmii62u4ur7lqkmjgp3bc.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fmii62u4ur7lqkmjgp3bc.JPG"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 -&amp;gt; Scan for accounts&lt;/strong&gt;&lt;br&gt;
Then finally I ran sherlock.py script with following commands in my terminal screen &lt;strong&gt;python target_name -r --print-found&lt;/strong&gt; to find out all social media account of my target.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fux8c4jwmmzjsza9ljsox.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fux8c4jwmmzjsza9ljsox.JPG"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Note : '-r' argument in the above command will organize the list of found &lt;br&gt;
          accounts by which websites are most popular,&amp;amp; '--print-found' will &lt;br&gt;
          show all accounts in terminal screen.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So as you can see above example that how I hunt down account all over internet using sherlock.py script.I also tried to contribute some file in this tool You can go through with this link to find out &lt;a href="https://github.com/ankitdobhal/sherlock" rel="noopener noreferrer"&gt;sherlock&lt;/a&gt; tool.&lt;br&gt;
-&amp;gt; &lt;a href="https://github.com/sherlock-project" rel="noopener noreferrer"&gt;https://github.com/sherlock-project&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>security</category>
      <category>github</category>
      <category>python</category>
    </item>
    <item>
      <title>How JavaScript Can Be Used To Accept Friend Request in Facebook &amp; Invitation in LinkedIn?</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Thu, 18 Jul 2019 14:36:00 +0000</pubDate>
      <link>https://dev.to/powerexploit/how-javascript-can-be-used-to-accept-friend-request-in-facebook-invitation-in-linkedin-3ne1</link>
      <guid>https://dev.to/powerexploit/how-javascript-can-be-used-to-accept-friend-request-in-facebook-invitation-in-linkedin-3ne1</guid>
      <description>&lt;p&gt;&lt;strong&gt;JavaScript :&lt;/strong&gt;&lt;br&gt;
JavaScript is one of the famous and most used scripting language in the cross platform or web platform. Its easy to learn and also used html and web.&lt;/p&gt;

&lt;p&gt;A few weeks ago I was working on &lt;strong&gt;‘getElementsByName()’ &amp;amp; ‘getElementsByClassName()’&lt;/strong&gt; methods of JavaScript and Found something special about these two function after implementing them on &lt;strong&gt;‘Social Media Platforms like : Facebook and LinkedIn. These two methods helped me to accept the friend request in Facebook and accept invitation in LinkedIn.’&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;getElementByName() Implementation In Facebook:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So firstly I opened up my ‘VSCODE’ editor in my system then wrote a script with my friend that helped me to accept friend request in my &lt;strong&gt;Facebook&lt;/strong&gt; account.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ha2sIx7U--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/7cdz4x3blgxdb3x4gkss.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ha2sIx7U--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/7cdz4x3blgxdb3x4gkss.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then fired up my chrome browser login to facebook account and open developer option using &lt;strong&gt;‘ctrl+shift+i’&lt;/strong&gt; and pasted my script into a console box of developer option and hit enter . And it was successfully executed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Console Box in chrome developer option →&lt;/strong&gt; &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uOH2gpL5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/mylvtxbfvfa2f0hhiep7.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uOH2gpL5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/mylvtxbfvfa2f0hhiep7.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7t63O-3k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/imr0lem062aa0ci73yyo.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7t63O-3k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/imr0lem062aa0ci73yyo.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The script is available here →&lt;/strong&gt; &lt;br&gt;
&lt;a href="https://github.com/ankitdobhal/javascript-console/blob/master/Javascript-programming/facebook.js"&gt;https://github.com/ankitdobhal/javascript-console/blob/master/Javascript-programming/facebook.js&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;getElementsByClassName() Implementation In LinkedIn:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I fired up my &lt;strong&gt;‘VSCODE’&lt;/strong&gt; editor again and wrote a script which helped me to accept invitation in &lt;strong&gt;LinkedIn&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EzznH8OZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/9uavblnccgih0g219w24.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EzznH8OZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/9uavblnccgih0g219w24.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then in my chrome browser I opened &lt;strong&gt;‘developer option’&lt;/strong&gt; using &lt;strong&gt;‘ctrl+shift+i’&lt;/strong&gt; and pasted this script into the console box and hit enter.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Console Box in chrome developer option →&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PQvsTpXj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/aqabbt17w8eebv8nfdi2.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PQvsTpXj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/aqabbt17w8eebv8nfdi2.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FIm33zUD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/kg0yxv6874p6l7orc0w5.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FIm33zUD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/kg0yxv6874p6l7orc0w5.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The script is available here →&lt;/strong&gt; &lt;br&gt;
&lt;a href="https://github.com/ankitdobhal/javascript-console/blob/master/Javascript-programming/linkedin_script.js"&gt;https://github.com/ankitdobhal/javascript-console/blob/master/Javascript-programming/linkedin_script.js&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This shows that &lt;strong&gt;JavaScript&lt;/strong&gt; is one of the power-full scripting language in cross platform and web.&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>beginners</category>
      <category>webdev</category>
    </item>
    <item>
      <title>The World's most dangerous search engine:Shodan</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Mon, 15 Jul 2019 05:22:54 +0000</pubDate>
      <link>https://dev.to/powerexploit/the-world-s-most-dangerous-search-engine-shodan-1ja5</link>
      <guid>https://dev.to/powerexploit/the-world-s-most-dangerous-search-engine-shodan-1ja5</guid>
      <description>&lt;p&gt;Its about a year ago when I started to learn about cyber security &amp;amp; hacking.&lt;/p&gt;

&lt;p&gt;' I was working on a tool which helps me to find out particular router on internet but it was getting difficult me to find it.just after a minute I opened up my browser &amp;amp; searched about how to find webcams and router on internet? &lt;/p&gt;

&lt;p&gt;Wow!!&lt;br&gt;
I saw something amazing which let's me amazed a shodan search engine .&lt;/p&gt;

&lt;p&gt;SHODAN:&lt;/p&gt;

&lt;p&gt;Shodan worlds most dangerous search engine over the internet that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F7bn2kfsej7wvccfq364z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2F7bn2kfsej7wvccfq364z.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Shodan is also available as Linux tool it means we can use this dangerous search engine using Linux terminal.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fxgj4nkq0jphs6xytj6s9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fthepracticaldev.s3.amazonaws.com%2Fi%2Fxgj4nkq0jphs6xytj6s9.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For more info visit Shodan official site.&lt;/p&gt;

</description>
      <category>discuss</category>
      <category>security</category>
      <category>linux</category>
    </item>
    <item>
      <title>How to crawl website using #bash script?</title>
      <dc:creator>powerexploit</dc:creator>
      <pubDate>Thu, 27 Jun 2019 07:46:29 +0000</pubDate>
      <link>https://dev.to/powerexploit/how-to-crawl-website-using-bash-script-28cf</link>
      <guid>https://dev.to/powerexploit/how-to-crawl-website-using-bash-script-28cf</guid>
      <description>&lt;p&gt;Bash script is one of the amazing scripting language used to automate tasks in Linux &amp;amp; Unix and it is one of my favourite scripting language for automating the tasks.&lt;/p&gt;

&lt;p&gt;A few days ago I was searching about how to crawl website page?&lt;br&gt;
After founding lot of stuff in the internet I learnt about 'Wget' tool into linux system. &lt;/p&gt;

&lt;p&gt;Wget is a useful for downloading and crawling a website page.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ni6pn3emqhs8clq83z3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ni6pn3emqhs8clq83z3.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So after this I started writing a bash script for website page crawling.&lt;br&gt;
-&amp;gt; Firstly open up my favourite vim editor&lt;br&gt;
  &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7ohs010cbbl0mc60frel.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7ohs010cbbl0mc60frel.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;-&amp;gt; Then started writing script with case statement&lt;br&gt;
  &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhkuxxvkf2dax2twew1xq.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhkuxxvkf2dax2twew1xq.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;-&amp;gt;As you can see I uses case statements and automated wget tool into a simple bash script and it its a working code..&lt;/p&gt;

&lt;p&gt;For more details about bash and automation&lt;br&gt;
visit my github account&lt;/p&gt;

</description>
      <category>bash</category>
      <category>linux</category>
      <category>github</category>
    </item>
  </channel>
</rss>
