Group Details Private

administrators

Member List

  • Chia farming can ruin a 512GB SSD in 40 days

    According to the Chinese site Fast Technology (via Hardware Times), constantly farming Chia on a 512GB SSD, which usually lasts anywhere from five to ten years, can reduce its life to just 40 days—the result of writing 256TB of data during that time.

    To learn about Chia visit the official repo: https://github.com/Chia-Network/chia-blockchain

    Source: https://www.techspot.com/community/topics/chia-farming-can-reportedly-ruin-a-512gb-ssd-in-40-days.269174/

    posted in Technology
  • A very happy Eid Mubarak to everyone around the world!

    On this holy festive, wishing you a day filled with lots of laughter and happy moments. Eid Mubarak to you and your family from everyone at Flaw Tech!

    posted in General Discussion
  • RE: What does the “yield” keyword do?

    Think of it this way:

    An iterator is just a fancy-sounding term for an object that has a next() method. So a yield-ed function ends up being something like this:

    Original version:

    def some_function():
        for i in xrange(4):
            yield i
    
    for i in some_function():
        print i
    

    This is basically what the Python interpreter does with the above code:

    class it:
        def __init__(self):
            # Start at -1 so that we get 0 when we add 1 below.
            self.count = -1
    
        # The __iter__ method will be called once by the 'for' loop.
        # The rest of the magic happens on the object returned by this method.
        # In this case it is the object itself.
        def __iter__(self):
            return self
    
        # The next method will be called repeatedly by the 'for' loop
        # until it raises StopIteration.
        def next(self):
            self.count += 1
            if self.count < 4:
                return self.count
            else:
                # A StopIteration exception is raised
                # to signal that the iterator is done.
                # This is caught implicitly by the 'for' loop.
                raise StopIteration
    
    def some_func():
        return it()
    
    for i in some_func():
        print i
    

    For more insight as to what's happening behind the scenes, the for loop can be rewritten to this:

    iterator = some_func()
    try:
        while 1:
            print iterator.next()
    except StopIteration:
        pass
    

    Does that make more sense or just confuse you more? 🙂

    I should note that this is an oversimplification for illustrative purposes. 🙂

    posted in Python
  • Installing Win-Kex (Kali Linux on Windows 10) with WSL

    I have been wanting to do a little tutorial on something for a while now and I thought a tutorial on how to setup Win-Kex (aka Kali Linux on Windows 10 with a graphical user interface) could be one that some members might find interesting.

    You'll find using Win-Kex useful if, for a simple example, you'd like to natively run Kali Linux on top of Windows 10 without having to use Virtualbox.

    I enjoyed using WSL in general when I was doing programming with Python and not wanting to deal with Windows 10 (python is a pain to program with on Windows 10 compared to programming with it on Linux).

    If you're still a bit confused as to what Win-Kex is, this short screen recording I took might help:

    Kali WSL

    Links to kali.org and Microsoft guide on Win-Kex and installing Windows Subsystem for Linux, in case anyone needs more information that I haven't included in my tutorial: https://www.kali.org/docs/wsl/

    Let's start

    The first thing you'll need is to install WSL 2.

    One way you can install WSL, is by using the Simplified Installation for Windows Insiders. If you've joined the Windows Insider Program, all you have to do is enter the command:

    wsl --install
    

    Yep, it's apparently that easy if you are in the Windows Insider Program.

    If you haven't joined the Windows Insider Program, like I haven't, then no problem, just a few more steps you'll have to take.

    1. Open Windows Powershell as an administrator and run this command:

      Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux
      
    2. Restart

    3. Open Powershell as administrator and run these commands:

      dism.exe /online /enable-feature /featurename:VirtualMachinePlatform /all /norestart
      dism.exe /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux /all /norestart
      
    4. Restart

    5. Download and install the WSL 2 Linux Kernel: https://aka.ms/wsl2kernel

    6. Open Powershell as administrator (yet again) and enter the command:

      wsl --set-default-version 2
      
    7. Install Kali Linux from the Microsoft Store (or from this link: Get Kali Linux)

      --To upgrade an existing WSL 1 Kali Linux installation, run:

      wsl --set-version kali-linux 2
      
    8. Run Kali and finish the initial setup

    Now, you need to install Win-Kex (open up Kali Linux in Windows Terminal to do this, don't enter the following commands in Powershell):

    After installing Win-Kex, you can use the kex command to start up Win-Kex, end Win-Kex sessions, and numerous other things.

    If you're wondering what those other things are, just type kex --help and you'll get a list of all the different commands and the syntax usage.

    Anyway, that should be pretty much all you need to know to get Win-Kex installed and start checking it out.

    Hope you found this guide helpful!

    posted in Security
  • Compilation of Penetration Testing Tools

    Here is a compilation of multiple forensic and penetration testing tools for applications, networks, and websites.

    Nmap

    Nmap is a very versatile tool developed to scan addresses (IPV6 included), this tool allows the users to gather a mass amount of information about the target quickly, information including open ports, + much, much more.

    Nmap supports a large number of scanning techniques such as UDP, TCP connect(), TCP SYN (half-open), FTP proxy (bounce attack), ICMP (ping sweep), FIN, ACK sweep, Xmas Tree, SYN sweep, IP Protocol, and Null scan.

    zenmap-multi-1220x700.png

    Official Website

    Wireshark

    A very powerful network troubleshooting and analysis tool, Wire shark provides the ability to view data from a live network and supports hundreds of protocols and media formats.

    ws-main.png

    Official Website

    Cain & Abel

    Cain and Abel is a revolutionary tool that provides many functions that are able to do various password retrieval jobs, cracking passwords, sniffing networks, and routing/analyzing protocols. This tool is Windows-only, unlike many other tools that exist, this is a pleasant twist to modern penetration testing and forensic tools.

    CainAbel.Password.Recovery.png

    Official Website

    MetaSploit

    Metasploit, a very powerful network security and analysis tool, used often for penetration attacks, this tool has a clean interface and easily gathers the information that you seek.

    msfconsolehelp-2.png

    Official Website

    Ettercap

    Ettercap is a suite for man-in-the-middle attacks on LAN. It features sniffing of live connections, content filtering on the fly, and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many features for network and host analysis. (Taken from their website).

    1_COPKdh8DhgByyYHCfBNLdw.jpeg

    Official Website

    Nessus

    The Nessus tool provides high-speed data discovery, asset profiling, configuration auditing, and vulnerability analysis of networks.

    nessus-pre-built-policies-and-templates_large.png

    Official Website

    w3af

    W3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plugins. In some ways, it is like a web-focused Metasploit.

    plugin-config.png

    Official Website

    Burp Suite

    Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface to finding and exploiting security vulnerabilities.

    what-is-buprsuite.png

    Official Website

    posted in Security
  • Moving Placeholder to Top on Focus (Input Element)

    If you want the placeholder to move to the top when the textbox is on focus and also while the user is typing, here's the code for it:

    HTML:

    <div>
      <input type="text" class="inputText" required/>
      <span class="floating-label">Email Address</span>
    </div>
    

    CSS:

    input:focus ~ .floating-label,
    input:not(:focus):valid ~ .floating-label{
      top: 5px;
      bottom: 10px;
      left: 15px;
      font-size: 11px;
      height: 11px;
      opacity: 1;
      padding: 0 5px;
      background-color:#fff;
    }
    
    .inputText {
      font-size: 14px;
      width: 200px;
      height: 45px;
      padding: 0 10px;
      color: #202124;
      border: 1px solid gray;
      border-radius: 8px;
    }
    
    .floating-label {
      position: absolute;
      pointer-events: none;
      left: 20px;
      top: 22px;
      transition: 0.2s ease all;
      font-family: Roboto,'Noto Sans Myanmar UI',arial,sans-serif;
    }
    
    posted in HTML
  • No Selling of Cracks or Warez

    Members are warned that selling of any crack, illegally copied software, warez, etc, is NOT ALLOWED and any members suspected of this will be BANNED. Both seller AND customer will be banned.

    Please keep your questions, answers, and knowledge out of PM and in the forum where it belongs, and where everybody benefits by learning rather than one person benefiting financially.

    posted in Marketplace
  • Over 25% Of Tor Exit Relays Spies On Users

    An unknown threat actor managed to control over 27% of the entire Tor network exit capacity in early February 2021, a new study on the dark web infrastructure revealed.

    For more information read this article: https://thehackernews.com/2021/05/over-25-of-tor-exit-relays-are-spying.html

    posted in Security
  • Announcing VIP Subscription

    We are pleased to announce an exclusive VIP subscription for the most discerning members of our fine community.

    Starting today anyone can subscribe to our VIP subscription by donating any amount. You can choose to donate $5 or $500, it doesn't matter!

    List of VIP members of our forum can be found here: https://flaw.tech/groups/vip

    For more information please read our blog post: https://dev.flaw.tech/blog/2021/05/11/vip-upgrades

    posted in Announcements
  • RE: Cryptocurrency Frequently Asked Questions

    @victor-oparaugo Please mention the group you are referring to. If you are not clear about what you are saying and asking people to contact you to get information, personally I would consider you a scammer as well.

    posted in Cryptocurrency