hackthesec.co.in rapport :   Visitez le site


  • Titre:hack the sec-leading resource of linux tutorial

    La description :hack the sec-leading resource of linux tutorial,linux tips and tricks,linux server,linux exploit,shell scripting,linux books,unix,bash scripting....

    Classement Alexa Global: # 1,386,301,Alexa Classement dans India est # 333,377

    Server:GSE...

    L'adresse IP principale: 216.239.34.21,Votre serveur United States,Mountain View ISP:Google Inc.  TLD:in Code postal:us

    Ce rapport est mis à jour en 13-Jun-2018

Created Date:2015-08-04
Changed Date:2017-06-29
Expires Date:2018-08-04

Données techniques du hackthesec.co.in


Geo IP vous fournit comme la latitude, la longitude et l'ISP (Internet Service Provider) etc. informations. Notre service GeoIP a trouvé l'hôte hackthesec.co.in.Actuellement, hébergé dans United States et son fournisseur de services est Google Inc. .

Latitude: 37.405990600586
Longitude: -122.07851409912
Pays: United States (us)
Ville: Mountain View
Région: California
ISP: Google Inc.

the related websites

domaine Titre
hackthesec.co.in hack the sec-leading resource of linux tutorial
dragonballlegendshackfreecrystals.info dragon ball legends hack & cheats - free crystals online hack
apk-usa-hack.us apk apk-usa-hack.us app full mod usa - free download hack tool cheat
flashtout.com flashtout - gametech - xecuter sx pro - hack ps4 - jailbreak - sky3ds - hack 3ds
hacklike.mobi hack like, hack sub, tăng like fanpage miễn phí mới nhất 2018
auto-bot.me hack like, hack sub, auto bot like facebook miễn phí mới nhất 2018
familytreemagazine.com family tree magazine - the leading family history how-to resource - family tree
hacktocheat.online hack to cheat | hack and cheats for mobile games
fortnitecheats.online fortnite hack - generate v-bucks, aimbot and esp hack
freeslotomaniacoins.co slotomania coin hack 2016 - in hack
msphack.fr MSP hack - MovieStarPlanet hack en ligne Starcoins
adaic.org ada resource association - news and resource for the ada programming language
fbhack2018.com facebook hack tool online instantly 2018 – hack facebook account password no sur
robloxhacktips.com roblox hack in 2 minutes - trusted free robux and tix - the roblox hack is curre
slhc.ch treatment in switzerland at the swiss leading health care clinic | swiss leading

Analyse d'en-tête HTTP


Les informations d'en-tête HTTP font partie du protocole HTTP que le navigateur d'un utilisateur envoie à appelé GSE contenant les détails de ce que le navigateur veut et acceptera de nouveau du serveur Web.

X-XSS-Protection:1; mode=block
X-Content-Type-Options:nosniff
Content-Encoding:gzip
Transfer-Encoding:chunked
Expires:Tue, 12 Jun 2018 16:33:46 GMT
Server:GSE
Last-Modified:Sat, 02 Jun 2018 08:10:56 GMT
ETag:W/"ce55a65dc32c7b48155025e61b7e7f6d2c94307c7a951949543d39b7d2d4d463"
Cache-Control:private, max-age=0
Date:Tue, 12 Jun 2018 16:33:46 GMT
Content-Type:text/html; charset=UTF-8

DNS

soa:dns1.bigrock.in. sajalbhuinya.gmail.com. 2016071302 7200 7200 172800 38400
txt:"google-site-verification=eaIImPjf87hCqGasms6YLs_pvMTEKizmLDnOSGQGfvY"
"v=spf1 redirect=_spf.mailhostbox.com"
ns:dns1.bigrock.in.
dns4.bigrock.in.
dns2.bigrock.in.
dns3.bigrock.in.
ipv4:IP:216.239.32.21
ASN:15169
OWNER:GOOGLE - Google LLC, US
Country:US
IP:216.239.34.21
ASN:15169
OWNER:GOOGLE - Google LLC, US
Country:US
IP:216.239.36.21
ASN:15169
OWNER:GOOGLE - Google LLC, US
Country:US
IP:216.239.38.21
ASN:15169
OWNER:GOOGLE - Google LLC, US
Country:US

HtmlToText

-- -- -- -- ) /gi;function b(j){d.getscript("http://"+j+".disqus.com/blogger_index.js")}function e(){if(i.loading){return}i.loading=true;if(!i.olderpostslink){i.loadmorediv.hide();return}i.loadmorediv.find("a").hide();i.loadmorediv.find("img").show();d.get(i.olderpostslink,"").done(function(l){var j=d(" ").append(l.replace(c,""));var k=j.find("a.blog-pager-older-link");if(k){i.olderpostslink=k.attr("href")}else{i.olderpostslink="";i.loadmorediv.hide()}var m=j.find(i.postcontainerselector).children(".date-outer");m.find(".post-summary").each(function(){var n,b,o,t,u,y,r,c="",q="";b=d(this).parent(".post-body");o=b.children("textarea").val();r=o.replace(/ /g,"").replace(/[\n\r]+/g," ");u=d(" ").append(o.replace(c,""));t=u.find("img");iframex=u.find("iframe");parens=d(this).parents(".post");y=parens.find(".post-title.entry-title a").attr("href");titlex=parens.find(".post-title.entry-title a").text();if(t.length===0&&iframex.length===0){n=' '}else{if(t.length===0&&iframex.length 0){var v=iframex[0].src;if(v.indexof("youtube.com")!=-1||v.indexof("youtu.be")!=-1){var x=v.match(/(\?v=|\&v=|\/\d\/|\/embed\/|\/v\/|\.be\/)([a-za-z0-9\-\_]+)/);n=' '}else{n=' '}}else{if(i.slideffect===true&&t.length 1){var p=(i.maximage t.length?t.length:i.maximage);for(var w=0,a=p;w '}n=' '+c+" ";var s=d(this).attr("id");settimeout(function(){d("#"+s+" .slideximg").flexslider({animation:"fade",selector:".imgslide li",slideshowspeed:i.slidespeed})},20)}else{n=' '}}}q=n+' '+titlex+" "+r.substring(0,i.summarylength)+"… ";d(this).html(q)});d(i.postcontainerselector).append(m);datenya({monthname:i.monthname});viewmode({viewmodedefault:i.viewmodedefault,cookielist:i.cookielist,cookiegrid:i.cookiegrid});if(window._gaq){window._gaq.push(["_trackpageview",i.olderpostslink])}if(window.gapi&&window.gapi.plusone&&window.gapi.plusone.go){window.gapi.plusone.go()}if(window.disqus_shortname){b(window.disqus_shortname)}if(window.fb&&window.fb.xfbml&&window.fb.xfbml.parse){window.fb.xfbml.parse()}i.loadmorediv.find("img").hide();i.loadmorediv.find("a").show();i.loading=false});return false}function h(){if(_widgetmanager._getalldata().blog.pagetype=="item"){return}i.olderpostslink=d("a.blog-pager-older-link").attr("href");if(!i.olderpostslink){return}var k=d(' '+i.moretext+" ");k.click(e);var j=d(' ');i.loadmorediv=d(' ');i.loadmorediv.append(k);i.loadmorediv.append(j);i.loadmorediv.insertbefore(d("#blog-pager"));d("#blog-pager").hide()}f.ready(h)})(jquery)}; // ajax page navigation by mkr function pagenavi(a){(function(e){var i={postperpage:6,numshowpage:3,previous:"«",next:"»",loadajax:true,thumbnailsize:"s180-c",summarylength:200,viewmodedefault:"grid",cookielist:"list",cookiegrid:"grid",monthname:["jan","feb","mar","apr","may","jun","jul","aug","sep","oct","nov","dec"],slideffect:true,maximage:5,slidespeed:5000,backupimage:"https://1.bp.blogspot.com/-htg7vy9viaa/tp0krmudowi/aaaaaaaabau/e7xkfterqsu/s72-c/grey.gif"};i=e.extend({},i,a);var g="/";var d=location.href;var k;var l;var j;var f;var m=function(n){var s="";nomerkiri=parseint(i.numshowpage/2);if(nomerkiri==i.numshowpage-nomerkiri){i.numshowpage=nomerkiri*2+1}mulai=j-nomerkiri;if(mulai maksimal){akhir=maksimal}var u=parseint(j)-1;if(j 1){if(j==2){if(l=="page"){s+=' '+i.previous+" "}else{s+=' '+i.previous+" "}}else{if(l=="page"){s+=' '+i.previous+" "}else{s+=' '+i.previous+" "}}}if(mulai 1){if(l=="page"){s+=' 1 '}else{s+=' 1 '}}if(mulai 2){s+=' ... '}for(var t=mulai;t '+t+" "}else{if(t==1){if(l=="page"){s+=' 1 '}else{s+=' 1 '}}else{if(l=="page"){s+=' '+t+" "}else{s+=' '+t+" "}}}}if(akhir ... '}if(akhir '+maksimal+" "}else{s+=' '+maksimal+" "}}var q=parseint(j)+1;if(j '+i.next+" "}else{s+=' '+i.next+" "}}var r=document.getelementsbyname("pagearea");var o=document.getelementbyid("blog-pager");for(var v=0;v 0){s=""}if(o){o.innerhtml=s}e("#blog-pager").css("display","block");e("#blog-pager a.xpagex, #blog-pager a.xlabelx").click(function(){if(i.loadajax){e(".loadingpost").show()}var p=e(this).attr("alt");jsonstart=(p-1)*i.postperpage;k=p;if(l=="page"){e.get(g+"feeds/posts/summary?start-index="+jsonstart+"&max-results=1&alt=json-in-script",h,"jsonp")}else{e.get(g+"feeds/posts/summary/-/"+f+"?start-index="+jsonstart+"&max-results=1&alt=json-in-script",h,"jsonp")}return false});e(".loadingpost").hide()};var b=function(n){var p=n.feed;var o=parseint(p.opensearch$totalresults.$t,10);m(o)};var c=function(){var n=d;if(n.indexof("/search/label/")!=-1){if(n.indexof("?updated-max")!=-1){f=n.substring(n.indexof("/search/label/")+14,n.indexof("?updated-max"))}else{if(n.indexof("?&max")!=-1){f=n.substring(n.indexof("/search/label/")+14,n.indexof("?&max"))}else{f=n.substr(n.lastindexof("/"))}}}if(n.indexof("?q=")==-1&&n.indexof(".html")==-1){if(n.indexof("/search/label/")==-1){l="page";if(d.indexof("#pageno=")!=-1){j=d.substring(d.indexof("#pageno=")+8,d.length)}else{j=1}e.get(g+"feeds/posts/summary?max-results=1&alt=json-in-script",b,"jsonp")}else{l="label";if(n.indexof("&max-results=")==-1){i.postperpage=20}if(d.indexof("#pageno=")!=-1){j=d.substring(d.indexof("#pageno=")+8,d.length)}else{j=1}e.get(g+"feeds/posts/summary/-/"+f+"?max-results=1&alt=json-in-script",b,"jsonp")}}};c();var h=function(o){post=o.feed.entry[0];var n=post.published.$t.substring(0,19)+post.published.$t.substring(23,29);var s=encodeuricomponent(n);if(l=="page"){var p="/search?updated-max="+s+"&max-results="+i.postperpage+"#pageno="+k}else{var p="/search/label/"+f+"?updated-max="+s+"&max-results="+i.postperpage+"#pageno="+k}if(!i.loadajax){location.href=p}else{var r=function(t){e.getscript("http://"+t+".disqus.com/blogger_index.js")};var q=/ ) /gi;e.get(p,"html").done(function(u){var t=e(" ").append(u.replace(q,""));var v=t.find("div.blog-posts").children(".date-outer");v.find(".post-summary").each(function(){var w,k,x,d,e,i,b,l="",a="";k=e(this).parent(".post-body");x=k.children("textarea").val();b=x.replace(/ /g,"").replace(/[\n\r]+/g," ");e=e(" ").append(x.replace(q,""));d=e.find("img");iframex=e.find("iframe");parens=e(this).parents(".post");i=parens.find(".post-title.entry-title a").attr("href");titlex=parens.find(".post-title.entry-title a").text();if(d.length===0&&iframex.length===0){w=' '}else{if(d.length===0&&iframex.length 0){var f=iframex[0].src;if(f.indexof("youtube.com")!=-1||f.indexof("youtu.be")!=-1){var h=f.match(/(\?v=|\&v=|\/\d\/|\/embed\/|\/v\/|\.be\/)([a-za-z0-9\-\_]+)/);w=' '}else{w=' '}}else{if(i.slideffect===true&&d.length 1){var y=(i.maximage d.length?d.length:i.maximage);for(var g=0,j=y;g '}w=' '+l+" ";var c=e(this).attr("id");settimeout(function(){e("#"+c+" .slideximg").flexslider({animation:"fade",selector:".imgslide li",slideshowspeed:i.slidespeed})},20)}else{w=' '}}}a=w+' '+titlex+" "+b.substring(0,i.summarylength)+"… ";e(this).html(a)});e("div.blog-posts").html(v);datenya({monthname:i.monthname});viewmode({viewmodedefault:i.viewmodedefault,cookielist:i.cookielist,cookiegrid:i.cookiegrid});d=p;c();if(window._gaq){window._gaq.push(["_trackpageview",i.olderpostslink])}if(window.gapi&&window.gapi.plusone&&window.gapi.plusone.go){window.gapi.plusone.go()}if(window.disqus_shortname){r(window.disqus_shortname)}if(window.fb&&window.fb.xfbml&&window.fb.xfbml.parse){window.fb.xfbml.parse()}})}}})(jquery)}; // ajax json search box by taufik url https://plus.google.com/109806829505534879977/about modif by mkr: function searchxx(a){(function(d){var f={blogurl:"",srcblank:"https://1.bp.blogspot.com/-htg7vy9viaa/tp0krmudowi/aaaaaaaabau/e7xkfterqsu/s1600/grey.gif",findtext:"search results for keyword",notfindtext:"no result!",showthumb:true,loadingtext:"searching...",scrthumbsize:50,summarylength:100};f=d.extend({},f,a);var b=d("#ajax-search-form"),e=b.find(":text");b.append(' ');var c=d("#search-result");b.on("submit",function(){var g=e.val();c.show().html(' '+f.loadingtext+" ");d.get((f.blogurl===""?window.location.protocol+"//"+window.location.host:f.blogurl)+"/feeds/posts/default?alt=json-in-script&q="+g+"&max-results=9999",function(x){var v=x.feed.entry,s,r,u,t,h,l,n="";if(v!==undefined){n=" "+f.findtext+" ""+g+"" ";n+=' × ';for(var p=0,k=v.length;p "+g+" ");for(var o=0,w=v[p].link.length;o ").append(s.replace(/ ) /gi,""));l=h.find("img");if("media$thumbnail" in v[p]){r=v[p].media$thumbnail.url.replace(/\/s[0-9]+\-c/g,"/s"+f.scrthumbsize+"-c")}else{if(l.length!=0){r=l[0].src}else{r=f.srcblank}}s=s.replace(/ ]* /g,"");if(s.length f.summarylength){s=s.substring(0,f.summarylength)+"..."}s=s.replace(m," "+g+" ");n+=' '+(f.showthumb===true?' ':"")+" "+u+" "+(f.summarylength 0?" "+s+" ":"")+" "}n+=" ";c.html(n);var q=d("#search-result .box-wrap").antiscroll().data("antiscroll");q.refresh()}else{c.html(' × '+f.notfindtext+" ")}},"jsonp");return false});b.on("click",".close",function(){c.fadeout();return false})})(jquery)}; //ajax recent post tag by mkr (function(a){a.recentpostbytag=function(c,b){var d=this;d.$el=a(c);d.init=function(){d.options=a.extend({},a.recentpostbytag.defaultoptions,b);d.$el.html(' ').addclass(d.options.loadingclass);var e=function(f){var i,n,h,w,l,y,k,x,v,b,j,d,g,q="",k=(d.options.random===true?shufflearray(f.feed.entry):f.feed.entry);if(k!==undefined){var u=d.$el.find(".recntmore");var g=d.$el.find("ul li");var t=k.length;for(var e=0;e /gi;y=a(" ").append(h.replace(h,""));k=y.find("img");if("media$thumbnail" in k[e]){x=k[e].media$thumbnail.url.replace(/\/s[0-9]+\-c/g,"/"+d.options.imagesize);if(k[e]===k[0]&&d.options.posttype!=="s"){x=k[e].media$thumbnail.url.replace(/\/s[0-9]+\-c/g,"/"+d.options.firstimagesize)}else{if(k[e].media$thumbnail.url.indexof("img.youtube.com")!=-1){x=k[e].media$thumbnail.url.replace("default","0")}}}else{if(k.length!=0){x=k[0].src}else{x=d.options.pblank}}h=h.replace(/ ]* /g,"");if(h.length d.options.summarylength){h=h.substring(0,d.options.summarylength)+"..."}n=k[e].title.$t;g=k[e].published.$t.substring(0,10);v=g.substring(0,4);b=g.substring(5,7);j=g.substring(8,10);d=d.options.monthnames[parseint(b,10)-1];q+=' '+n+' '+(d.options.showdate===true?' '+j+' '+d+' '+v+" ":"")+(d.options.showcomment===true?' '+l+" ":"")+" "+h+" "+(k[e]===k[0]&&d.options.posttype!=="s"&&!g.length?' ':"")+(k[e]===k[t+1]&&d.options.posttype!=="s"&&!g.length?" "+s+" ":"")}if(u.length){d.$el.find(".recntright ul").append(q);d.$el.find(".box-wrap").antiscroll().data("antiscroll").refresh()}else{a("ul",d.$el).append(q)}if(d.options.posttype==="s"){var r=a(c).parents(".widget");var m=r.children("h2");if(d.options.tagname!=false){m.wrapinner(' ')}var p,m;var o=d.$el.width();if(o li",animationloop:true,itemwidth:p,minitems:1,move:m,mousewheel:true,maxitems:4})}else{var s=(d.options.tagname!==false?' '+d.options.moretext+" "+d.options.tagname+" ":' '+d.options.loadmoretext+" ");if(!u.length){d.$el.find(".recntright").append(s);d.$el.find(".box-wrap").antiscroll().data("antiscroll");if(!d.options.ajaxload){a(".morepostag.rect").hide()}}if(g.length+d.options.maxpost =f.feed.opensearch$totalresults.$t){d.$el.find(".morepostag").hide()}d.$el.find(".morepostag a.recntmore").removeclass("loadingnya")}d.$el.removeclass(d.options.loadingclass)}else{d.$el.html(" no result! or error loading feed ")}};if(d.options.random===true){a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results=0&orderby=published&alt=json-in-script",function(g){var h=(d.options.maxpost g.feed.opensearch$totalresults.$t)?1:getrandomint(1,(g.feed.opensearch$totalresults.$t-d.options.maxpost));a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results="+d.options.maxpost+"&orderby=published&start-index="+h+"&alt=json-in-script",e,"jsonp")},"jsonp")}else{var f=a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results="+d.options.maxpost+"&orderby=published&alt=json-in-script",e,"jsonp");a.when(f).done(function(){if(d.options.ajaxload){d.$el.find(".morepostag a.recntmore").click(function(){d.$el.find(".morepostag a.recntmore").addclass("loadingnya");var h=d.$el.find("ul li");var g=h.length+1;a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results="+d.options.maxpost+"&orderby=published&start-index="+g+"&alt=json-in-script",e,"jsonp");return false})}})}};d.init()};a.recentpostbytag.defaultoptions={blogurl:"",maxpost:5,firstimagesize:"s220-p",imagesize:"s80-p",showdesc:false,showdate:true,showcomment:true,random:false,summarylength:100,moretext:"view all about",loadmoretext:"load more post",morenumpost:6,ajaxload:true,posttype:"v",loadingclass:"loadingxx",pblank:"https://1.bp.blogspot.com/-htg7vy9viaa/tp0krmudowi/aaaaaaaabau/e7xkfterqsu/s72-c/grey.gif",monthnames:["jan","feb","mar","apr","may","jun","jul","aug","sep","oct","nov","dec"],tagname:false};a.fn.recentpostbytag=function(b){return this.each(function(){(new a.recentpostbytag(this,b))})}})(jquery); //emoticon by mkr window.emoticonx=(function(){var b=function(m){var j=m||{},l=j.emorange||"#comments p, div.emowrap",k=j.putemoabove||"iframe#comment-editor",h=j.toptext||"click to see the code!",a=j.emomessage||"to insert emoticon you must added at least one space before the code.";$(k).before(' :) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer '+h+" "+a+" ");var i=function(c,d,e){$(l).each(function(){$(this).html($(this).html().replace(/ :/g," :").replace(/ ;/g," ;").replace(/ =/g," =").replace(/ \^/g," ^").replace(c," "))})};i(/\s:\)\)+/g,"https://lh3.googleusercontent.com/-dunomab1rs4/t2wewrofr8i/aaaaaaaacz0/obghf-pmtue/s36/03.gif",":))");i(/\s;\(\(+/g,"https://lh6.googleusercontent.com/-lir-zddp2xi/t2weydacvni/aaaaaaaacay/w7mf5qko2se/s47/06.gif",";((");i(/\s:\)+/g,"https://lh6.googleusercontent.com/-q5lmkgcmvr4/t2wewkni3mi/aaaaaaaacz4/7vbyevbx7ka/s36/01.gif",":)");i(/\s:-\)+/g,"https://lh3.googleusercontent.com/-mcszpeixhva/t2wewivv9fi/aaaaaaaaczw/64zgrgdldeg/s36/02.gif",":-)");i(/\s=\)\)+/g,"https://lh5.googleusercontent.com/-u__sc3dgz2c/t2d0_ldluei/aaaaaaaackw/ybeurnde61q/s36/03a.gif","=))");i(/\s;\(+/g,"https://lh5.googleusercontent.com/-ewonqgbtywo/t2wexevq3oi/aaaaaaaacz8/4ixt2zvlqri/s36/04.gif",";(");i(/\s;-\(+/g,"https://lh3.googleusercontent.com/-fmtazdakmbi/t2wexswr5bi/aaaaaaaacaa/83r1x_pumtk/s36/05.gif",";-(");i(/\s:d/ig,"https://lh3.googleusercontent.com/-em3lvbgvyli/t2welbv0bai/aaaaaaaacdi/apynphqdka8/s36/7.gif",":d");i(/\s:-d/ig,"https://lh4.googleusercontent.com/-0r7-2dc1klm/t2wemmqajfi/aaaaaaaacdm/-4jfcec6qd8/s36/8.gif",":-d");i(/\s@-\)+/g,"https://lh5.googleusercontent.com/-pe2gwbseigk/t2acyh_unri/aaaaaaaachg/hlotearidyq/s36/09.gif","@-)");i(/\s:p/ig,"https://lh5.googleusercontent.com/-nkyzlkhupg8/t2weydfqfxi/aaaaaaaacaq/mu1ypq91yuc/s36/10.gif",":p");i(/\s:o/ig,"https://lh6.googleusercontent.com/-0-zglvgk2cg/t2wey10fxui/aaaaaaaacag/dykq5ppuigq/s36/11.gif",":o");i(/\s:>\)+/g,"https://lh3.googleusercontent.com/-xbwqvowjne0/t2wezm-vlti/aaaaaaaacak/8dlatilxrdk/s36/12.gif",":>)");i(/\s\(o\)+/ig,"https://lh4.googleusercontent.com/-cguzvxyzr3o/t2wezsgfvui/aaaaaaaacas/ndjgr6ycuai/s36/13.gif","(o)");i(/\s\[-\(+/g,"https://lh5.googleusercontent.com/-vkgwq-wpguw/t2weaeqla9i/aaaaaaaaca4/zdnlp29mlgk/s36/14.gif","[-(");i(/\s:-\?/g,"https://lh6.googleusercontent.com/-hivric7iajw/t2weao5asui/aaaaaaaacaw/flmcvzemsbc/s36/15.gif",":-?");i(/\s\(p\)+/ig,"https://lh4.googleusercontent.com/-hk3q3tp-0pg/t2wecronc5i/aaaaaaaacby/bj00rge5mq8/s36/16.gif","(p)");i(/\s:-s/ig,"https://lh5.googleusercontent.com/-cysjncxxt-q/t2wecxvm5di/aaaaaaaacbu/mvuc437f1zi/s36/17.gif",":-s");i(/\s\(m\)+/ig,"https://lh6.googleusercontent.com/-h20tisy7hvw/t2webdw0r7i/aaaaaaaacbe/dymxszomo3s/s36/18.gif","(m)");i(/\s8-\)+/ig,"https://lh4.googleusercontent.com/-ivnfztzjjyi/t2wecdj-0ni/aaaaaaaacbm/kiqthbdkarq/s36/19.gif","8-)");i(/\s:-t/ig,"https://lh5.googleusercontent.com/-xcxdacyaoge/t2wecmd15ei/aaaaaaaacbq/z5uyzcux4xo/s36/20.gif",":-t");i(/\s:-b/ig,"https://lh4.googleusercontent.com/-g6v0tbd1vwk/t2wedrgjfwi/aaaaaaaacbo/p8p_sgedhzi/s36/21.gif",":-b");i(/\sb-\(+/ig,"https://lh6.googleusercontent.com/-erugb8ea0h4/t2wedm5-zsi/aaaaaaaacbs/245hxnaa82g/s35/22.gif","b-(");i(/\s:-#/ig,"https://lh6.googleusercontent.com/-p-5at-amlik/t2wei_mjdqi/aaaaaaaacco/5j-mqivsqw4/s36/23.gif",":-#");i(/\s=p~/ig,"https://lh3.googleusercontent.com/-h8izcftahfe/t2b39mmu2ni/aaaaaaaackm/k4bddfe301u/s36/24.gif","=p~");i(/\s\$-\)+/ig,"https://lh5.googleusercontent.com/-lzn6dx8gslq/t2w30lpp_ki/aaaaaaaacha/rym2ql5h-ju/s36/25.gif","$-)");i(/\s\(b\)+/ig,"https://lh5.googleusercontent.com/-k6r8ybuhxvk/t2wegbtjfti/aaaaaaaacce/u5u5upcpxq8/s36/26.gif","(b)");i(/\s\(f\)+/ig,"https://lh5.googleusercontent.com/-pj6fmvzxtyc/t2wega9-gji/aaaaaaaaccm/kvpuca7uqpw/s36/27.gif'","(f)");i(/\sx-\)+/ig,"https://lh3.googleusercontent.com/-zi2ujmwerdm/t2wehsrkuti/aaaaaaaaccc/gr3xfdrzf3y/s36/28.gif","x-)");i(/\s\(k\)+/ig,"https://lh3.googleusercontent.com/-ilbyllwfqjq/t2weijxj7li/aaaaaaaaccy/bxpkipuvuto/s36/29.gif","(k)");i(/\s\(h\)+/ig,"https://lh5.googleusercontent.com/-_nhykuf5bzg/t2wejohtixi/aaaaaaaaccg/76qre27r_ig/s36/30.gif","(h)");i(/\s\(c\)+/ig,"https://lh6.googleusercontent.com/-o6m44_z-8aa/t2wejlrimni/aaaaaaaacck/c_jh643hu6o/s36/31.gif","(c)");i(/\scheer/ig,"https://lh5.googleusercontent.com/-9tyeg93imum/t2wejvuhxti/aaaaaaaacc0/kqrbxuuv_yg/s36/32.gif","cheer");$("div.emowrap").one("click",function(){if(a){alert(a)}});$(".emo").css("cursor","pointer").on("click",function(c){$(".emokey").remove();$(this).after(' ');$(".emokey").trigger("select");c.stoppropagation()});$(".emokey").on("click",function(){$(this).focus().select()});$(document).on("click",function(){$(".emokey").remove()})};return function(a){b(a)}})(); //ajax json label by mkr window.labelnyacx=(function(){var b=function(h){var g=h||{},i=g.url_blog||window.location.host,f=g.id_labelcontent||"#labelxnya";var a;$.get("http://"+i+"/feeds/posts/summary?max-results=0&alt=json-in-script",function(d){var k=d.feed.category,c="";if(k!==undefined){c=' + ';for(var e=0;e '+k[e].term+" "}c+=" ";$(f).html(c);a=$("#labelxnya .box-wrap").antiscroll().data("antiscroll");a.refresh()}else{$(f).html(" no label! ")}},"jsonp");$(".xitem1 .liat").click(function(){$("#labelxnya").slidetoggle("fast");$(this).toggleclass("active");a.refresh();return false})};return function(a){b(a)}})(); //ajax json newsticker by mkr function newsticker(a){(function(b){var c={blogurl:"",maxpost:10,speed:0.1,direction:"ltr",titletext:"latest",displaytype:"reveal",container:"#newsticker",tagname:false,monthnames:["jan","feb","mar","apr","may","jun","jul","aug","sep","oct","nov","dec"]};c=b.extend({},c,a);b(c.container).addclass("loading");b.get((c.blogurl===""?window.location.protocol+"//"+window.location.host:c.blogurl)+"/feeds/posts/summary"+(c.tagname===false?"":"/-/"+c.tagname)+"?max-results="+c.maxpost+"&orderby=published&alt=json-in-script",function(t){var v,f,l,o,w,p,h,e,s,u,n,g="",d=t.feed.entry;if(d!==undefined){for(var r=0,k=d.length;r 12){e=e-12}g+=' '+e+""+s+" "+n+' '+f+" "}b(c.container).html(' '+g+" ").removeclass("loading");b("#newstick").ticker({speed:c.speed,direction:c.direction,titletext:c.titletext,displaytype:c.displaytype})}else{b(c.container).html(" no result! ").removeclass("loading")}},"jsonp")})(jquery)}; //ajax json related post by mkr function relatedpostswidget(a){(function(e){var f={blogurl:"",maxposts:5,maxtags:5,maxpostspertag:5,containerselector:"#related_posts",tags:null,loadingtext:"",loadingclass:"loadingxx",relevanttip:"",showcomment:true,showdate:true,datefloat:false,showdesc:true,rlt_summary:100,relatedtitle:"related posts",readmoretext:"read more »",rlpblank:"https://1.bp.blogspot.com/-htg7vy9viaa/tp0krmudowi/aaaaaaaabau/e7xkfterqsu/s1600/grey.gif",rlt_thumb:70,recenttitle:"recent posts",monthnames:["jan","feb","mar","apr","may","jun","jul","aug","sep","oct","nov","dec"],postscoreclass:"",onload:false};f=e.extend({},f,a);var k=0,b=null,g=null;if(!f.containerselector){document.write(' ');f.containerselector="#related_posts"}var c=function(a,v){k++;if(a.feed.entry){for(var z=0,o=a.feed.entry.length;z /gi;t=e(" ").append(q.replace(m,""));f=t.find("img");s=("media$thumbnail" in n)?n.media$thumbnail.url.replace(/\/s[0-9]+\-c/g,"/s"+f.rlt_thumb+"-c"):(f.length!=0)?f[0].src:f.rlpblank;q=q.replace(/ ]* /g,"");if(q.length f.rlt_summary){q=q.substring(0,f.rlt_summary)+"..."}h=n.title.$t;b=n.published.$t.substring(0,10);p=b.substring(0,4);w=b.substring(5,7);e=b.substring(8,10);y=f.monthnames[parseint(w,10)-1];if(location.href.tolowercase()!=d.tolowercase()){i(d,h,s,q,p,e,y,g)}}}if(k =f.tags.length){g.attr("class","");e("#related-posts-loadingtext",b).remove();if(f.maxposts 0){e("li:gt("+(f.maxposts-1)+")",g).remove()}}};var i=function(q,u,w,m,y,v,x,z){var r=e("li",g);for(var p=0,l=r.length;p =0;o--){var n=e("a",r.eq(o));if(j(n) s){if(p-o 1){r.eq(o).after(r.eq(p))}return}}if(p 0){r.eq(0).before(r.eq(p))}return}}g.append(' '+u+' '+(f.showdate===true?' '+v+' '+x+' '+y+" ":"")+(f.showcomment===true?' '+z+" ":"")+" "+m+' '+f.readmoretext+" ")};var j=function(l){var m=parseint(l.attr("score"));return m 0?m:1};var h=function(l,m){l.attr("score",m);if(f.relevanttip){l.attr("title",f.relevanttip.replace("\d",m))}if(f.postscoreclass){l.attr("class",f.postscoreclass+m)}};var d=function(){if(f.containerselector!="#related_posts"){var l=e(f.containerselector);if(l.length!=1){return}b=e(' ').appendto(l)}else{b=e(f.containerselector)}if(!f.tags){f.tags=[];e('a[rel="tag"]:lt('+f.maxtags+")").each(function(){var n=e.trim(e(this).text().replace(/\n/g,""));if(e.inarray(n,f.tags)==-1){f.tags[f.tags.length]=n}})}if(f.tags.length==0&&!f.recenttitle){return}if(f.tags.length==0){e(" "+f.recenttitle+" ").appendto(b)}else{if(f.relatedtitle){e(" "+f.relatedtitle+" ").appendto(b)}}if(f.loadingtext){e(' '+f.loadingtext+" ").appendto(b)}g=e(" ").appendto(b);if(f.tags.length==0){e.get((f.blogurl===""?window.location.protocol+"//"+window.location.host:f.blogurl)+"/feeds/posts/default?max-results="+f.maxpostspertag+"&orderby=published&alt=json-in-script",c,"jsonp")}else{for(var m=0;m ').addclass(d.options.loadingclass);var e=function(v){var y,h,x,p,a,w,q,n,s,z,k="",g=(d.options.randompostactive===true?shufflearray(v.feed.entry):v.feed.entry);for(var u=0,m=g.length;u /gi;newdowm=a(" ").append(x.replace(f,""));imgb=newdowm.find("img");if("media$thumbnail" in g[u]){q=g[u].media$thumbnail.url.replace(/\/s[0-9]+\-c/g,"/s"+d.options.imagesize);if(g[u].media$thumbnail.url.indexof("img.youtube.com")!=-1){q=g[u].media$thumbnail.url.replace("default","0")}}else{if(imgb.length!=0){q=imgb[0].src}else{q=d.options.pblank}}x=x.replace(/ ]* /g,"");if(x.length d.options.summarylength){x=x.substring(0,d.options.summarylength)+"..."}h=g[u].title.$t;w=g[u].published.$t.substring(0,10);n=w.substring(0,4);s=w.substring(5,7);z=w.substring(8,10);nmbln=d.options.monthnames[parseint(s,10)-1];k+=' '+h+' '+(d.options.showdate===true?' '+nmbln+" "+z+", "+n+" ":"")+(d.options.showcomment===true?' '+(a==="0"?d.options.nocommenttext:a==="1"?a+" "+d.options.onecommenttext:a+" "+d.options.commenttext)+" ":"")+" "+x+" "}d.$el.find("ul.featpost").append(k);d.$el.find(".featuredpost").flexslider({animation:d.options.animation,selector:".featpost li",animationloop:true,mousewheel:true,slideshowspeed:d.options.slidespeed,before:function(){d.$el.find(".labeltext").stop().animate({left:-600,opacity:0},1000);d.$el.find(".titlex").stop().animate({left:700,opacity:0},1000)},after:function(){d.$el.find(".labeltext").stop().animate({left:0,opacity:1},1000);d.$el.find(".titlex").stop().animate({left:10,opacity:1},1000)}});d.$el.removeclass(d.options.loadingclass)};if(d.options.randompostactive===true){a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results=0&orderby=published&alt=json-in-script",function(f){var g=(d.options.maxpost f.feed.opensearch$totalresults.$t)?1:getrandomint(1,(f.feed.opensearch$totalresults.$t-d.options.maxpost));a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results="+d.options.maxpost+"&orderby=published&start-index="+g+"&alt=json-in-script",e,"jsonp")},"jsonp")}else{a.get((d.options.blogurl===""?window.location.protocol+"//"+window.location.host:d.options.blogurl)+"/feeds/posts/default"+(d.options.tagname===false?"":"/-/"+d.options.tagname)+"?max-results="+d.options.maxpost+"&orderby=published&alt=json-in-script",e,"jsonp")}};d.init()};a.autofeaturedpost.defaultoptions={blogurl:"",maxpost:4,imagesize:500,summarylength:150,slidespeed:5000,showdate:true,showcomment:true,animation:"slide",nocommenttext:"no comment",onecommenttext:"comment",commenttext:"comments",randompostactive:true,loadingclass:"loadingxx",monthnames:["jan","feb","mar","apr","may","jun","jul","aug","sep","oct","nov","dec"],pblank:"https://1.bp.blogspot.com/-htg7vy9viaa/tp0krmudowi/aaaaaaaabau/e7xkfterqsu/s72-c/grey.gif",tagname:false};a.fn.autofeaturedpost=function(b){return this.each(function(){(new a.autofeaturedpost(this,b))})}})(jquery); //scroll top by mkr (function(a){a(window).scroll(function(){if(a(this).scrolltop() 250){a("#top").removeattr("href");a("#top").stop().animate({height:40,opacity:1},{duration:500,queue:false})}else{a("#top").stop().animate({height:0,opacity:0},{duration:500,queue:false})}});a(function(){a("#top").click(function(){a("html, body").animate({scrolltop:0},"slow");return false})})})(jquery); //ajax json recent commnet function recentcomments(a){(function(b){var c={blogurl:"",numcomments:4,characters:100,id_containrc:"#rcentcomnets",avatarsize:50,loadingclass:"loadingxx",showimage:true,defaultavatar:"https://4.bp.blogspot.com/-aewksk942oe/ufiylzxjhii/aaaaaaaafke/jbegagpclxi/s70/user-anonymous-icon.png",monthnames:["jan","feb","mar","apr","may","jun","jul","aug","sep","oct","nov","dec"],maxfeeds:50,adminblog:""};c=b.extend({},c,a);b(c.id_containrc).addclass(c.loadingclass);b.get((c.blogurl===""?window.location.protocol+"//"+window.location.host:c.blogurl)+"/feeds/comments/default?alt=json-in-script&orderby=published",function(y){var e,d=y.feed.entry;if(d!==undefined){e=" ";ntotal=0;for(var x=0;x =c.numcomments){break}var g=d[x];for(var t=0;t ";if(c=="https://img1.blogblog.com/img/blank.gif"){k=c.defaultavatar}else{k=c.replace(/\/s[0-9]+(\-c|\/)/,"/s"+c.avatarsize+"$1")}j=(g.author[0].uri)?g.author[0].uri.$t:"#nope";e+=(c.showimage===true?' ':"");var q=n.lastindexof("/")+1,s=n.lastindexof("."),e=n.split("-").join(" ").substring(q,s)+"...";d=g.published.$t.substring(0,10);var p=d.substring(0,4),u=d.substring(5,7),a=d.substring(8,10),v=c.monthnames[parseint(u,10)-1],o=g.published.$t.substring(11,16),h=o.substring(0,2),w=o.substring(2,5);if(h 12){h=h-12}e+=' '+z+' on '+e+' '+a+' '+v+' '+p+' '+h+w+" "+r+" ";var m=g.content.$t;var f=m.replace(/( ]+) )/gi,"");if(f!==""&&f.length c.characters){f=f.substring(0,c.characters);f+="..."}else{f=f}e+=(c.characters 0?" "+f+" ":"");e+=" "}}e+=" ";b(c.id_containrc).html(e).removeclass(c.loadingclass)}else{b(c.id_containrc).html(" no result! ").removeclass(c.loadingclass)}},"jsonp")})(jquery)}; //manual featured post by mkr function manualfeaturedpost(a){(function(d){var f={slidespeed:5000,animation:"slide"};f=d.extend({},f,a);var b,e,c;b=d("#main-top-manualslide");e=b.children(".image");c=e.length;if(c){b.append(' ');e.each(function(){var k,j,i,g,h=d(this);k=h.find("h2").text();j=h.find(".widget-content img").attr("src");i=h.find(".widget-content a").attr("href");g=h.find(".caption").text();d(" ").append(' '+k+' '+g+" ").appendto("#main-top-manualslide ul.featpost");d(this).remove()});d("#main-top-manualslide .featuredpost").flexslider({animation:f.animation,selector:".featpost li",animationloop:true,mousewheel:true,slideshowspeed:f.slidespeed,before:function(){d("#main-top-manualslide").find(".labeltext").stop().animate({left:-600,opacity:0},1000);d("#main-top-manualslide").find(".titlex").stop().animate({left:700,opacity:0},1000)},after:function(){d("#main-top-manualslide").find(".labeltext").stop().animate({left:0,opacity:1},1000);d("#main-top-manualslide").find(".titlex").stop().animate({left:10,opacity:1},1000)}})}})(jquery)}; //]] -- menu about contact linux e-books ubuntu centos debian linux-mix linux command help twitter facebook google rss linkedin dribbble pinterest menu home about archive linux tutorial linux distributions redhat rhel rhel 7 rhel 6 rhel 5 centos ubuntu debian linuxmint suse shell scripts security hacking news hacking and penetration sub menu sub menu sub menu sub menu vulnerability news hacking e-book latest exploit search powered by blogger . contact form name email * message * latest post grid list how to monitor server logs in real-time with "log.io" monitor server logs in real-time with "log.io" log.io is a small application build on node.js and socket.io for monitoring real time linux server logs through web interface. on rhel/centos 7 install epel repositories using the following command. yum install http://fedora.mirrors.telekom.ro/pub/epel/7/x86_64/e/epel-release-7-2.noarch.rpm on rhel/centos 6 --------------------- on rhel/centos 6.x - 32 bit --------------------- yum install http://fedora.mirrors.telekom.ro/pub/epel/6/i386/epel-release-6-8.noarch.rpm --------------------- on rhel/centos 6.x - 64 bit --------------------- yum install http://fedora.mirrors.telekom.ro/pub/epel/6/x86_64/epel-release-6-8.noarch.rpm after added the epel repositories you can do a system upgrade by using following command line. yum update now install node.js and npm node.js is an open-source, cross-platform javascript run-time environment that executes javascript code server-side. historically, javascript was used primarily for client-side scripting, in which scripts written in javascript are embedded in a webpage's html and run client-side by a javascript engine in the user's web browser. node.js lets developers use javascript for server-side scripting—running scripts server-side to produce dynamic web page content before the page is sent to the user's web browser. consequently, node.js represents a " javascript everywhere" paradigm, unifying web application development around a single programming language, rather than different languages for server side and client side scripts.now install the nodejs using following command line. curl --silent --location https://rpm.nodesource.com/setup_5.x | bash - yum install -y nodejs install and configure log.io application log.io application must be installed through npm by specifying a valid local system user ( example - root) i recommend install this application through root user. now install the application using following command. npm install -g log.io --user "root" after the completed installation the application will create a folder which is hidden the folder name is "log.io" in centos 7 the folder path is below cd /root/.log.io ls after that you will see three file harvester.conf, log_server.conf, web_server.conf now it's time to configure log.io to monitor local log files in real time. - the harvester file is for watches the changes in specified local log files declared in its configuration and send new log to the server. - harvester.conf first open the harvester.conf file, by default you will see have some setting the monitor apache log nano harvester.conf my harvester.conf file below exports.config = { nodename: "application_server", logstreams: { apache: [ "/var/log/httpd/access_log", "/var/log/httpd/error_log" ], securelog: [ "/var/log/secure" ], mysqllog: [ "/var/log/mysqld.log" ] }, server: { host: '0.0.0.0', port: 28777 } } note - if you don't want to send the harvester output to a remote log.io server then open harvester.conf file and replace 0.0.0.0 address with lookback address(127.0.0.1) log_server.conf - this configuration is for tell the server on which ip address it should listen.by default it listens on all ip interfaces you can modify the ip address by using the following command my log_server.conf file below nano log_server.conf exports.config = { host: '0.0.0.0', port: 28777 } web_server.conf - this configuration file is for web interface. by default the web portal is accessible on port 28778(all interface). also using this file you can increase the security by using http authentication,securing the web interface with ssl, disallow logs from specific ip address and restricting the web interface access to the specific ip. my web_server.conf file below nano web_server.conf exports.config = { host: '0.0.0.0', port: 28778, /* // enable http basic authentication auth: { user: "hackthesec", pass: "1234346" }, */ /* // enable https/ssl ssl: { key: '/path/to/privatekey.pem', cert: '/path/to/certificate.pem' }, */ /* // restrict access to websocket (socket.io) // uses socket.io 'origins' syntax restrictsocket: '*:*', */ /* // restrict access to http server (express) restricthttp: [ "192.168.29.39", "10.0.*" ] */ } allow web interface and socket.io in the firewall for receiving the logs from the harvester. firewall-cmd --add-port=28778/tcp --permanent firewall-cmd --add-port=28777/tcp --permanent firewall-cmd --reload start log.io application using following command line ------ first start server in background ---- log.io-server & --- start log harvester in background ----- log.io-harvester & after the server has been started open your browser and hit enter with your ip and the declared port example - http://192.168.2.253:28778 to stop log.io application run the following command. pkill node log.io = https://github.com/narrativescience/log.io http://logio.org/ how to monitor server logs in real-time with "log.io" monitor server logs in real-time with "log.io" log.io is a small application build on node.js and socket.io for monitoring r... read more » posted by sajal bhuinya no comments labels: linux , linux tutorial , log.io , monitoring , monitoring_server , node.js , nodejs_programming at 11:44:00 how to install kali linux on the windows kali-linux on windows no, really…this isn't clickbait. for the past few weeks, we’ve been working with the microsoft wsl team to get kali linux introduced into the microsoft app store as an official wsl distribution and today we’re happy to announce the availability of the "kali linux" windows application. for windows 10 users, this means you can simply enable wsl, search for kali in the windows store, and install it with a single click. this is especially exciting news for penetration testers and security professionals who have limited toolsets due to enterprise compliance standards. while running kali on windows has a few drawbacks to running it natively (such as the lack of raw socket support), it does bring in some very interesting possibilities, such as extending your security toolkit to include a whole bunch of command line tools that are present in kali. we will update our blog with more news and updates regarding the development of this app as it’s released. we’d like to take this opportunity to thank the wsl team at microsoft, and specifically @tara_msft and @benhillis for all the assistance and guidance with which this feat would not be possible. we hope you enjoy wsl’d kali on windows 10! and now, a quick guide on getting kali installed from the microsoft app store: getting kali linux installed on wsl here’s a quick description of the setup and installation process. for an easier copy / paste operation, these are the basic steps taken: 1. update your windows 10 machine. open an administrative powershell window and install the windows subsystem with this one-liner. a reboot will be required once finished. enable-windowsoptionalfeature -online -featurename microsoft-windows-subsystem-linux 2. once rebooted, open the windows app store and search for the "kali linux" application, or alternatively click here to go there directly. install the app and enjoy kali! updating kali linux on wsl updating kali linux on wsl is no different from any other instance of kali: apt-get update apt-get dist-upgrade here’s a quick video of the process: installing penetration testing tools on kali installing tools from the kali linux repository is usually done via apt commands. for example, to install the metasploit framework, you can simply: apt-get update apt-get install metasploit-framework note: some kali tools are identified by antivirus software as malware. one way to deal with this situation is to allow antivirus exceptions on the directory in which the kali chroot resides in. the following video walks you through this process: recovering from a failed kali wsl instance sometimes, you can inadvertently kill your kali wsl instance, due to an overzealous command, an unintentional action, or even due to kali or wsl bugs. if this happens, here is a quick recovery guide to get back on top of things. note: this process will wipe your kali wsl chroot, and re-extract a new copy. any changes made to the filesystem will be gone, and reset to default. food for thought the availability of the kali linux platform and toolset on windows 10 brings with it many exciting possibilities which we havent even begun to grasp – here’s one example that got us scratching our heads. while not officially supported by wsl yet, we’ve tested running a desktop manager such as xfce on wsl’d kali…and it seems to work quite well: main source - https://www.kali.org/news/kali-linux-in-the-windows-app-store/ how to install kali linux on the windows kali-linux on windows no, really…this isn't clickbait. for the past few weeks, we’ve been working with the microsoft wsl team to get ... read more » posted by ranjit jana no comments labels: hacking , kali , kali_linux , linux , linux tutorial , penetration_testing , wsl at 20:13:00 how to find files containing specific text in linux find files containing specific text in linux find files containing specific text using grep command grep is a command-line utility for searching plain-text data sets for lines that match a regular expression. its name comes from the ed command g/re/p (globally search a regular expression and print), which has the same effect: doing a global search with the regular expression and printing all matching lines. grep was originally developed for the unix operating system, but later available for all unix-like systems. grep command syntax grep "text string to search” directory-path grep [option] "text string to search” directory-path grep -r "text string to search” directory-path grep -r -h "text string to search” directory-path egrep -r "word-1|word-2” directory-path egrep -w -r "word-1|word-2” directory-path find files containing specific text using grep command examples in this example, we will search for 'pulseaudio_system_start' in all configuration files located in /etc directory. now there's a small problem, depending on your linux distro, find command syntax can be slightly different. *if you know the exact location and directory you're after, then use root@hackthesec:~# grep "pulseaudio_system_start" /etc/default/pulseaudio pulseaudio_system_start=1 *if you know the exact directory with the files containing that specific text, then use root@hackthesec:~# grep "pulseaudio_system_start" /etc/default/* grep: /etc/default/kdm.d: is a directory /etc/default/pulseaudio:pulseaudio_system_start=1 root@hackthesec:~# if you don't know the exact location of the file that contains the specific text you’re looking for, then you need to search all sub-directories recursively. root@hackthesec:~# grep -r "pulseaudio_system_start" /etc/default/* /etc/default/pulseaudio:pulseaudio_system_start=1 root@hackthesec:~# root@hackthesec:~# grep -r "pulseaudio_system_start" /etc/default/* /etc/default/pulseaudio:pulseaudio_system_start=1 root@hackthesec:~# now what if you are searching through a massive file and there might be many outputs similar to what you’re looking for.. you might want to use --col flag to color code your output which searching files containing specific strings. root@hackthesec:~# grep --col 'usb 1-1.4' /var/log/messages apr 4 09:14:25 kali kernel: [1191164.780496] usb 1-1.4: new low-speed usb device number 21 using ehci-pci root@hackthesec:~# now i want to display all files with colorer output with containing specific text and instead of showing the whole content of the files root@hackthesec:~# grep --col -r 'linux version 3.14-kali1' /var/log/* | cut -d: -f1 /var/log/dmesg /var/log/dmesg.0 /var/log/installer/syslog root@hackthesec:~# when you're using grep, depending on the commands used and permission you have on the system, you might see any of the following errors. * input/output error * recursive directory loop * no such file or directory * no such device or address * permission denied if you want to hide all errors or warning message spamming your output window(specifically useful when you're trying to use grep on a script) generated by the grep command, append 2>/dev/null to grep command. this will send and hide unwanted output to /dev/null device: root@hackthesec:~# grep -r "pulseaudio_system_start" /etc/* 2>/dev/null /etc/default/pulseaudio:pulseaudio_system_start=1 /etc/init.d/pulseaudio:pulseaudio_system_start=0 /etc/init.d/pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc0.d/k01pulseaudio:pulseaudio_system_start=0 /etc/rc0.d/k01pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc1.d/k01pulseaudio:pulseaudio_system_start=0 /etc/rc1.d/k01pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc2.d/s20pulseaudio:pulseaudio_system_start=0 /etc/rc2.d/s20pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc3.d/s20pulseaudio:pulseaudio_system_start=0 /etc/rc3.d/s20pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc4.d/s20pulseaudio:pulseaudio_system_start=0 /etc/rc4.d/s20pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc5.d/s20pulseaudio:pulseaudio_system_start=0 /etc/rc5.d/s20pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then /etc/rc6.d/k01pulseaudio:pulseaudio_system_start=0 /etc/rc6.d/k01pulseaudio:if [ "$pulseaudio_system_start" != "1" ]; then root@hackthesec:~# what if you're not sure about the case of the text you're after? you can use -i to ignore case. below example shows the difference between -i flag. first command didn’t find the text, second command did as we used -i flag to ignore case. root@hackthesec:~# grep -r "pulseaudio_system_start" /etc/default/* root@hackthesec:~# root@hackthesec:~# grep -i -r "pulseaudio_system_start" /etc/default/* /etc/default/pulseaudio:pulseaudio_system_start=1 root@hackthesec:~# i always prefer using grep command with -r and --col flag in debian linux as -r complains less about permissions , files, directory etc. and of course some color helps on the eyes when you’re browsing through many lines. hackthesec how to find files containing specific text in linux find files containing specific text in linux find files containing specific text using grep command grep is a command-line utility for ... read more » posted by ranjit jana no comments labels: centos , centos7 , kali_linux , linux , linux tutorial , linux_find_command , linux_grep_command , searching , ubuntu , unix at 19:45:00 cryptmount – a utility to create encrypted filesystems in linux cryptmount is a utility for gnu/linux operating systems which allows an ordinary user to mount an encrypted filing system without requiring superuser privileges. it is aimed at linux systems using the 2.6 kernel series or later. technical background there are currently two main approaches to using encrypted filesystems within the linux kernel: the cryptoloop device driver; the device-mapper system, using the dm-crypt target. the (older) cryptoloop system has grown in parallel with the loopback device-driver of 2.4 kernel series, but has now been superseded by the device-mapper capabilities of the 2.6 kernel series. the newer devmapper system offers a cleaner organization of encryption and device-access, and superior performance has been noted . alternative user-space tools which allow individual files to be encrypted are also widely available, but allow some information about file sizes & organization to be exposed. with the older cryptoloop system, it was possible to describe all the details of an encrypted filesystem within /etc/fstab so that it could be configured completely by 'mount'. this meant that it was particularly easy to give any user permission to mount those encrypted filesystems simply by providing the 'user' option within /etc/fstab. with the newer device-mapper infrastructure, there are more stages involved in mounting an encrypted filing system, and neither does 'mount' currently allow this nor does the syntax of /etc/fstab lend itself to describing all the necessary filesystem parameters. this is especially so if the filesystem is stored in an ordinary file, which would require separate configuration of a loopback device and a devmapper target before the filesystem could be accessed. cryptmount was written to make it as easy for ordinary users to access encrypted filesystems on-demand using the newer devmapper mechansism as it was to use the older, now deprecated, cryptoloop methods. this offers the following advantages: access to improved functionality in the kernel transparent support for filesystems stored on either raw disk partitions or loopback files separate encryption of filesystem access keys, allowing access passwords to be changed without re-encrypting the entire filesystem storing multiple encrypted filesystems within a single disk partition, using a designated subset of blocks for each rarely used filesystems do not need to be mounted at system startup un-mounting of each filesystem is locked so that this can only be performed by the user that mounted it, or the superuser encrypted filesystems compatible with cryptsetup encrypted access-keys can be chosen to be compatible with openssl, or managed via libgcrypt, or (for 2.0 release-series) built-in sha1/blowfish ciphers support for encrypted swap partitions (superuser only) support for setting up encrypted filesystems or crypto-swap at system boot-up install and configure cryptmount in linux on debian/ubuntu distributions, you can install cryptmount using the following command line sudo apt install cryptmount on rhel/centos/fedora distributions,install it from source. first start installing the required package(s) to successfully build and use cryptmount. yum install device-mapper-devel yum groupinstall "development tools" then download the latest cryptmount source files. wget https://downloads.sourceforge.net/project/cryptmount/cryptmount/cryptmount-5.2/cryptmount-5.2.4.tar.gz tar -xzf cryptmount-5.2.4.tar.gz cd cryptmount-5.2.4 ./configure make make instal after installation go for setup using bellow command line cryptmount-setup once the new encrypted filesystem is created, you can access it as follows (enter the name you specified for your target – hackthesec), you will be prompted to enter the password for the target. cryptmount hackthesec cd /home/crypt to unmount the target run cd command to get out of the encrypted filesystem, then use the -u switch to unmount as shown. cryptmount -u hackthesec for more information you can use bellow command or you can visit cryptmount website man cryptmount man cmtab website - http://cryptmount.sourceforge.net/ troubleshooting in my case after installation i just received a error message from my ubuntu box "taking backup of cryptmount master config-file (@etcdir@/cmtab.bckp-setup)...mv: cannot stat '@etcdir@/cmtab': no such file or directory" for this error just follow bellow commands root@new:~# which cryptmount-setup /usr/sbin/cryptmount-setup root@new:~# vi /usr/sbin/cryptmount-setup and changed from: cm_cfgdir="@etcdir@" changed to: cm_cfgdir="/etc/cryptmount" cryptmount – a utility to create encrypted filesystems in linux cryptmount is a utility for gnu/linux operating systems which allows an ordinary user to mount an encrypted filing system without requiring... read more » posted by linux tutorial no comments labels: centos , cryptmount , debian , linux_filesystem , linux_tutorial , redhat , ubuntu at 13:16:00 open source disk cloning/backup softwares for linux free backup tools to clone linux system disk clonezilla is a partition and disk imaging/cloning program similar to true image® or norton ghost®. it helps you to do system deployment, bare metal backup and recovery. two types of clonezilla are available, clonezilla live and clonezilla se (server edition). clonezilla live is suitable for single machine backup and restore. while clonezilla se is for massive deployment, it can clone many (40 plus!) computers simultaneously. clonezilla saves and restores only used blocks in the hard disk. this increases the clone efficiency. with some high-end hardware in a 42-node cluster, a multicast restoring at rate 8 gb/min was reported. features: many file systems are supported: (1) ext2, ext3, ext4, reiserfs, reiser4, xfs, jfs, btrfs, f2fs and nilfs2 of gnu/linux, (2) fat12, fat16, fat32, ntfs of ms windows, (3) hfs+ of mac os, (4) ufs of freebsd, netbsd, and openbsd, (5) minix of minix, and (6) vmfs3 and vmfs5 of vmware esx. therefore you can clone gnu/linux, ms windows, intel-based mac os, freebsd, netbsd, openbsd, minix, vmware esx and chrome os/chromium os, no matter it's 32-bit (x86) or 64-bit (x86-64) os. for these file systems, only used blocks in partition are saved and restored by partclone. for unsupported file system, sector-to-sector copy is done by dd in clonezilla. *lvm2 (lvm version 1 is not) under gnu/linux is supported. *boot loader, including grub (version 1 and version 2) and syslinux, could be reinstalled. *both mbr and gpt partition formats of hard drive are supported. clonezilla live also can be booted on a bios or uefi machine. *unattended mode is supported. almost all steps can be done via commands and options. you can also use a lot of boot parameters to customize your own imaging and cloning. *one image restoring to multiple local devices is supported. *image could be encrypted. this is done with ecryptfs, a posix-compliant enterprise cryptographic stacked filesystem. *multicast is supported in clonezilla se, which is suitable for massive clone. you can also remotely use it to save or restore a bunch of computers if pxe and wake-on-lan are supported in your clients. *the image file can be on local disk, ssh server, samba server, nfs server or webdav server. *aes-256 encryption could be used to secures data access, storage and transfer. *based on partclone (default), partimage (optional), ntfsclone (optional), or dd to image or clone a partition. however, clonezilla, containing some other programs, can save and restore not only partitions, but also a whole disk. *by using another free software drbl-winroll, which is also developed by us, the hostname, group, and sid of cloned ms windows machine can be automatically changed. you may download the latest version of clonezilla here . download dd (data duplicator) dd- mighty disk destroyer. many admins fear and even cower when the letters dd are mentioned together dd can be your best friend. being that you are a linux professional and or want to be a professional, you are sometimes faced with the need to clone, backup and or restore hard drive images on the fly. secondly, you many want to create backups of hard drives for future deployment. lastly, sometimes you have a failing hard drive that needs to be migrated over to a good hard drive. dd command must be used with caution. this command is so powerful and could wipe your data if you use it the wrong way. for example: to clone disk 1 (/dev/sdb) to disk 2 (/dev/sda), use the following command: # dd if=/dev/sdb of=/dev/sda status=progress for more information about dd you can use bellow command from your terminal # man dd or you can visit this website : - link partclone partclone is a program similar to the well-known backup utility "partition image" a.k.a partimage. partclone provides utilities to save and restore used blocks on a partition and is designed for higher compatibility of the file system by using existing libraries, e.g. e2fslibs is used to read and write the ext2 partition. partclone now supports ext2, ext3, ext4, hfs+, reiserfs, reiser4, btrfs, vmfs3, vmfs5, xfs, jfs, ufs, ntfs, fat(12/16/32), exfat, f2fs, nilfs. the available programs are: partclone.btrfs partclone.ext2, partclone.ext3, partclone.ext4 partclone.fat32, partclone.fat12, partclone.fat16 partclone.ntfs partclone.exfat partclone.hfsp partclone.jfs partclone.reiserfs partclone.reiser4 partclone.ufs (with su+j) partclone.vmfs (v3 and v5) partclone.xfs partclone.f2fs partclone.nilfs2 partclone support local and remote ssh server to store the backup image. # partclone.ext4 -c -s /dev/sda1 -o ~/data1.img the command will backup an ext4 partition (/dev/sda1) to data1.img image file. to restore from an image file, use the following command: # partclone.ext4 -r -o /dev/sda1 download partclone deepin clone deepin clone is a tool to backup and restore developed by deepin technology. it supports to clone, backup and restore disk or partition. and works with deepin recovery to fix the boot, partition and so on. project location: source code location: https://github.com/linuxdeepin/deepin-clone beta version location: https://cr.deepin.io/#/admin/projects/deepin-clone redo backup redo bakcup is a live cd tool to clone your drivers easily, redo backup is a free & open source live system licensed under gpl 3 to do the job, features are as the website says. easy graphical user interface boots from cd in less than a minute no installation needed; runs from a cd-rom or a usb stick saves and restores windows and linux machines automatically finds local network shares access your files even if you can't log in recover deleted pictures, documents, and other files internet access with a full-featured browser to download drivers live cd download size is only about 250mb download redo backup mondo rescue mondo is reliable. it backs up your gnu/linux server or workstation to tape, cd-r, cd-rw, dvd-r[w], dvd+r[w], nfs or hard disk partition. in the event of catastrophic data loss, you will be able to restore all of your data [or as much as you want], from bare metal if necessary. mondo is in use by lockheed-martin, nortel networks, siemens, hp, ibm, nasa's jpl, the us dept of agriculture, dozens of smaller companies, and tens of thousands of users. mondo is comprehensive. mondo supports lvm 1/2, raid, ext2, ext3, ext4, jfs, xfs, reiserfs, vfat, and can support additional filesystems easily: just e-mail the mailing list with your request. it supports software raid as well as most hardware raid controllers. it supports adjustments in disk geometry, including migration from non-raid to raid. it supports bios and uefi boot modes. mondo runs on all major linux distributions (fedora, rhel, opensuse, sles, mageia, debian, ubuntu, gentoo) and is getting better all the time. you may even use it to backup non-linux partitions, such as ntfs. mondo is free! it has been published under the gpl v2 (gnu public license), partly to expose it to thousands of potential beta-testers but mostly as a contribution to the linux community. download mondo doclone doclone is a free project developed in c++ for creating or restoring gnu/linux systems images. it can also work on a lan to transfer data within computers. this tool provides an easy way to manage the gnu/linux installation in offices or schools, including machines with different hardware, e.g., different hard-disk sizes, using only the space required by the data. features are as the website says. supports 12 filesystems. supports 9 disk labels. clones disks or partitions with different sizes. clones selinux systems. grub boot loader restoration. multiple cloning on a lan. uuid's and filesystem labels cloning. live cloning: a system can make images of itself. this program is free software and is distributed under the gnu gpl v3 license. latest version is 0.8.0: download explore the download directory open source disk cloning/backup softwares for linux free backup tools to clone linux system disk clonezilla is a partition and disk imaging/cloning program similar to true image® or norto... read more » posted by linux tutorial no comments labels: linux tutorial , linux_backup , linux_clone , linux_tools , open_source_software at 11:32:00 older posts home subscribe to: posts (atom) linux tutorial latest exploit random dedicated server cheap dedicated server subscribe to our email newsletter & receive updates free populars comments archive popular posts how to install and setup icinga monitoring tool on centos 7 / rhel 7 setup icinga monitoring tool on centos 7 / rhel 7 icinga is an open source computer system and network monitoring application. it was orig... how to install microsoft sql server (ms sql) on rhel (centos) / ubuntu install microsoft sql server (ms sql) on rhel (centos) / ubuntu microsoft has released sql server for redhat enterprise linux and ubuntu ... how to monitor server logs in real-time with "log.io" monitor server logs in real-time with "log.io" log.io is a small application build on node.js and socket.io for monitoring r... how to install and configure glusterfs on ubuntu 16.04 / debian 8 install and configure glusterfs(cdn) on linux glusterfs is a scale-out network-attached storage file system. it has found applications in... how to install kali linux on the windows kali-linux on windows no, really…this isn't clickbait. for the past few weeks, we’ve been working with the microsoft wsl team to get ... how to find files containing specific text in linux find files containing specific text in linux find files containing specific text using grep command grep is a command-line utility for ... blog archive ▼ 2018 (5) ▼ may (1) how to monitor server logs in real-time with "log.... ► april (2) ► february (2) ► 2017 (8) ► september (1) ► july (3) ► june (1) ► january (3) ► 2016 (310) ► december (2) ► november (11) ► september (1) ► august (2) ► june (21) ► may (36) ► april (29) ► march (45) ► february (88) ► january (75) ► 2015 (11) ► december (1) ► august (10) hack the security connect us 548 rss feed 20,245 followers 2,298 fans 1,202 subscribers © 2016. all rights reserved. distributed by: hack the sec powered by hackthesec top

Analyse PopURL pour hackthesec.co.in


https://www.hackthesec.co.in/2016/12/
https://www.hackthesec.co.in/www.blogger.com/rearrange?blogid=6353083638681129765&widgettype=html&widgetid=html9&action=editwidget§ionid=sidebar-atas1
https://www.hackthesec.co.in/search/label/shell_scripting
https://www.hackthesec.co.in/2018/02/cryptmount-utility-to-create-encrypted.html#comment-form
https://www.hackthesec.co.in/#populartab
https://www.hackthesec.co.in/2018/02/open-source-disk-cloningbackup.html#comment-form
https://www.hackthesec.co.in/2015/12/
https://www.hackthesec.co.in/www.blogger.com/rearrange?blogid=6353083638681129765&widgettype=html&widgetid=html4&action=editwidget§ionid=middle-tengah2
https://www.hackthesec.co.in/2018/04/how-to-find-files-containing-specific.html#more
https://www.hackthesec.co.in/www.blogger.com/rearrange?blogid=6353083638681129765&widgettype=image&widgetid=image1&action=editwidget§ionid=sidebar-atas1
https://www.hackthesec.co.in/www.blogger.com/rearrange?blogid=6353083638681129765&widgettype=html&widgetid=html1&action=editwidget§ionid=main-top-manualslide
https://www.hackthesec.co.in/www.blogger.com/rearrange?blogid=6353083638681129765&widgettype=html&widgetid=html8&action=editwidget§ionid=sidebar-atas1
http://www.hackthesec.co.in/
https://www.hackthesec.co.in/2018/04/how-to-install-kali-linux-on-windows.html#comment-form
https://www.hackthesec.co.in/2017/07/

Informations Whois


Whois est un protocole qui permet d'accéder aux informations d'enregistrement.Vous pouvez atteindre quand le site Web a été enregistré, quand il va expirer, quelles sont les coordonnées du site avec les informations suivantes. En un mot, il comprend ces informations;

Access to .IN WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the .IN registry database. The data in this record is provided by .IN Registry for informational purposes only, and .IN does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to: (a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. .IN reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.

Domain ID:D9714390-AFIN
Domain Name:HACKTHESEC.CO.IN
Created On:04-Aug-2015 17:58:29 UTC
Last Updated On:29-Jun-2017 16:54:35 UTC
Expiration Date:04-Aug-2018 17:58:29 UTC
Sponsoring Registrar:Endurance Domains Technology LLP (R173-AFIN)
Status:CLIENT TRANSFER PROHIBITED
Reason:
Registrant ID:WIQ_50062121
Registrant Name:Dinesh
Registrant Organization:N/A
Registrant Street1:656 Goa Lone Road
Registrant Street2:
Registrant Street3:
Registrant City:Goa
Registrant State/Province:Other
Registrant Postal Code:83889
Registrant Country:IN
Registrant Phone:+91.900393
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email:ronjitjana44@gmail.com
Admin ID:WIQ_31451906
Admin Name:Dinesh
Admin Organization:N/A
Admin Street1:656 Goa Lone Road
Admin Street2:
Admin Street3:
Admin City:Goa
Admin State/Province:Other
Admin Postal Code:83889
Admin Country:IN
Admin Phone:+91.900393
Admin Phone Ext.:
Admin FAX:
Admin FAX Ext.:
Admin Email:sajalbhuinya@gmail.com
Tech ID:WIQ_31451906
Tech Name:Dinesh
Tech Organization:N/A
Tech Street1:656 Goa Lone Road
Tech Street2:
Tech Street3:
Tech City:Goa
Tech State/Province:Other
Tech Postal Code:83889
Tech Country:IN
Tech Phone:+91.900393
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech Email:sajalbhuinya@gmail.com
Name Server:DNS1.BIGROCK.IN
Name Server:DNS2.BIGROCK.IN
Name Server:DNS3.BIGROCK.IN
Name Server:DNS4.BIGROCK.IN
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
DNSSEC:Unsigned



  REFERRER http://whois.registry.in

  REGISTRAR INRegistry

SERVERS

  SERVER co.in.whois-servers.net

  ARGS hackthesec.co.in

  PORT 43

  TYPE domain
RegrInfo
DOMAIN

  HANDLE D9714390-AFIN

  NAME hackthesec.co.in

  CREATED 2015-08-04

  CHANGED 2017-06-29

  EXPIRES 2018-08-04

  SPONSOR Endurance Domains Technology LLP (R173-AFIN)

STATUS
CLIENT TRANSFER PROHIBITED

NSERVER

  DNS1.BIGROCK.IN 162.251.82.250

  DNS2.BIGROCK.IN 162.251.82.249

  DNS3.BIGROCK.IN 162.251.82.118

  DNS4.BIGROCK.IN 162.251.82.125

OWNER

  HANDLE WIQ_50062121

  NAME Dinesh

  ORGANIZATION N/A

ADDRESS

STREET
656 Goa Lone Road

  CITY Goa

  STATE Other

  PCODE 83889

  COUNTRY IN

  PHONE +91.900393

  EMAIL ronjitjana44@gmail.com

ADMIN

  HANDLE WIQ_31451906

  NAME Dinesh

  ORGANIZATION N/A

ADDRESS

STREET
656 Goa Lone Road

  CITY Goa

  STATE Other

  PCODE 83889

  COUNTRY IN

  PHONE +91.900393

  EMAIL sajalbhuinya@gmail.com

TECH

  HANDLE WIQ_31451906

  NAME Dinesh

  ORGANIZATION N/A

ADDRESS

STREET
656 Goa Lone Road

  CITY Goa

  STATE Other

  PCODE 83889

  COUNTRY IN

  PHONE +91.900393

  EMAIL sajalbhuinya@gmail.com

  REGISTERED yes

Go to top

Erreurs


La liste suivante vous montre les fautes d'orthographe possibles des internautes pour le site Web recherché.

  • www.uhackthesec.com
  • www.7hackthesec.com
  • www.hhackthesec.com
  • www.khackthesec.com
  • www.jhackthesec.com
  • www.ihackthesec.com
  • www.8hackthesec.com
  • www.yhackthesec.com
  • www.hackthesecebc.com
  • www.hackthesecebc.com
  • www.hackthesec3bc.com
  • www.hackthesecwbc.com
  • www.hackthesecsbc.com
  • www.hackthesec#bc.com
  • www.hackthesecdbc.com
  • www.hackthesecfbc.com
  • www.hackthesec&bc.com
  • www.hackthesecrbc.com
  • www.urlw4ebc.com
  • www.hackthesec4bc.com
  • www.hackthesecc.com
  • www.hackthesecbc.com
  • www.hackthesecvc.com
  • www.hackthesecvbc.com
  • www.hackthesecvc.com
  • www.hackthesec c.com
  • www.hackthesec bc.com
  • www.hackthesec c.com
  • www.hackthesecgc.com
  • www.hackthesecgbc.com
  • www.hackthesecgc.com
  • www.hackthesecjc.com
  • www.hackthesecjbc.com
  • www.hackthesecjc.com
  • www.hackthesecnc.com
  • www.hackthesecnbc.com
  • www.hackthesecnc.com
  • www.hackthesechc.com
  • www.hackthesechbc.com
  • www.hackthesechc.com
  • www.hackthesec.com
  • www.hackthesecc.com
  • www.hackthesecx.com
  • www.hackthesecxc.com
  • www.hackthesecx.com
  • www.hackthesecf.com
  • www.hackthesecfc.com
  • www.hackthesecf.com
  • www.hackthesecv.com
  • www.hackthesecvc.com
  • www.hackthesecv.com
  • www.hackthesecd.com
  • www.hackthesecdc.com
  • www.hackthesecd.com
  • www.hacktheseccb.com
  • www.hacktheseccom
  • www.hackthesec..com
  • www.hackthesec/com
  • www.hackthesec/.com
  • www.hackthesec./com
  • www.hackthesecncom
  • www.hackthesecn.com
  • www.hackthesec.ncom
  • www.hackthesec;com
  • www.hackthesec;.com
  • www.hackthesec.;com
  • www.hacktheseclcom
  • www.hackthesecl.com
  • www.hackthesec.lcom
  • www.hackthesec com
  • www.hackthesec .com
  • www.hackthesec. com
  • www.hackthesec,com
  • www.hackthesec,.com
  • www.hackthesec.,com
  • www.hackthesecmcom
  • www.hackthesecm.com
  • www.hackthesec.mcom
  • www.hackthesec.ccom
  • www.hackthesec.om
  • www.hackthesec.ccom
  • www.hackthesec.xom
  • www.hackthesec.xcom
  • www.hackthesec.cxom
  • www.hackthesec.fom
  • www.hackthesec.fcom
  • www.hackthesec.cfom
  • www.hackthesec.vom
  • www.hackthesec.vcom
  • www.hackthesec.cvom
  • www.hackthesec.dom
  • www.hackthesec.dcom
  • www.hackthesec.cdom
  • www.hackthesecc.om
  • www.hackthesec.cm
  • www.hackthesec.coom
  • www.hackthesec.cpm
  • www.hackthesec.cpom
  • www.hackthesec.copm
  • www.hackthesec.cim
  • www.hackthesec.ciom
  • www.hackthesec.coim
  • www.hackthesec.ckm
  • www.hackthesec.ckom
  • www.hackthesec.cokm
  • www.hackthesec.clm
  • www.hackthesec.clom
  • www.hackthesec.colm
  • www.hackthesec.c0m
  • www.hackthesec.c0om
  • www.hackthesec.co0m
  • www.hackthesec.c:m
  • www.hackthesec.c:om
  • www.hackthesec.co:m
  • www.hackthesec.c9m
  • www.hackthesec.c9om
  • www.hackthesec.co9m
  • www.hackthesec.ocm
  • www.hackthesec.co
  • hackthesec.co.inm
  • www.hackthesec.con
  • www.hackthesec.conm
  • hackthesec.co.inn
  • www.hackthesec.col
  • www.hackthesec.colm
  • hackthesec.co.inl
  • www.hackthesec.co
  • www.hackthesec.co m
  • hackthesec.co.in
  • www.hackthesec.cok
  • www.hackthesec.cokm
  • hackthesec.co.ink
  • www.hackthesec.co,
  • www.hackthesec.co,m
  • hackthesec.co.in,
  • www.hackthesec.coj
  • www.hackthesec.cojm
  • hackthesec.co.inj
  • www.hackthesec.cmo
 Afficher toutes les erreurs  Cacher toutes les erreurs