Bug in Splunk Universal Forwarder on Windows

Installing Splunk Forwarder on Windows seems to be very easy, thanks to the user friendly installation wizard. But after installation, there are several issues including a bug, which prevents a smooth experience of this report indexer. I recommend to use “Customize Options” during the installation so you can specify the deployment server and other configuration […]

Read More

Install Splunk Universal Forwarder unattended (silent mode)

Here it might seem odd, but some times small things might take a lot of times, specially when you are at the project. One of them that bugged me a lot recently, is to install Splunk Universal Forwarder unattended. Here is the command to install 64-bit version: [crayon-5dec606095057186798939/] But the catch is, you should run […]

Read More

File Inclusion Attack

A file inclusion is a vulnerability which allows an attacker to access unauthorised file on web server and can execute the malicious code by using ‘include’ functional vulnerability. The local file inclusion LFI is a process of Including Local File available on webserver. This vulnerability occur when a user input contains the path of the […]

Read More

Brute-Force WPA/WPA2 via GPU without dictionary

I personally don’t like dictionary attacks, although many people still believe they are safe while their favorite passwords are from their personal data or from the nearest dictionary around. Here, I will show you how to pipe different tools in order to crack a WPA/WPA2 protected WiFi by generating different passwords on-the-fly through GPU and use […]

Read More

Powered by themekiller.com anime4online.com animextoon.com