This module is can be used to build various projects for spying and can be interfaced with SIM900, Motion Sensor so on and so forth.
A Basic Video demonstrating operations of this module can be found at-
Awarded with the prestigious Award of Excellence by National Cyber Defense and Research Center
Demonstrating the Usage of Advanced Hadware Devices and Facial Recognition
Interview for India Watch Channel on Security in India. Click to Know More...
In Simple Terms: Feed in Equivalent Calling tones to the Mic of the Land Line from Android, this will allow you to call the number for whom the tones are generated for.
#include<stdio.h>In the above program, we have two different functions- main and noexec. When we run this program, it simply receives the command line argument, copies it into the buffer variable and simply prints it. Now, you might ask, why do we have noexec() function if we are not calling it any where in the program? this is because in order to work out the simplest buffer overflow, we will try to execute this function by exploiting it.
printf("this never executes");
void main(int argc, char** argv)
#gcc -ggdb -o rofl -fno-stack-protector expl1.c -mpreferred-stack-boundary=2To compile a C program in linux, we use gcc, -ggdb option allows the code to be executed and listed in debugger by supplying enough information to the debugger, about the program, -fno-stack-protector option turns off stack protection mechanisms in Linux while compiling the program and -mpreferred-stack-boundary=2 option aligns the stack on a 4-byte boundary and will be susceptible to crash as well. However, by default it's on 16-byte boundary.
(gdb) disas noexec
airmon-ng start wlan0
tshark -i mon0 -R wlan.fc.type_subtype==0x04 -T fields -E separator=- -e wlan.sa -e wlan_mgt.ssid
Today, let us talk about Firewall rules and how we can evade them. However, i will be producing more advanced and complex tutorials for ni...