Monday, February 3, 2014

Share Folders between Windows 7 and Vmware OSs


Whenever we work in Vmware, we need to transfer some data from Windows (Host Computer) to Other OS which installed in Vmware. In this tutorial I will share with you how easy it is to share files or folder between Host Computer and VMware. If you have some basic knowledge about sharing file or folder between LANs then it will be more easiest for you. If you do not know don't worry your all concept will be clear which are require for this work.


Before starting tutorial lets see what we are covering in this tutorial.
  • How to Create Admin Password in Windows 7
  • How to enable share option in Vmware
  • How to share file/folder between windows 7 (host computer) and Kali Linux (VMware)
  • How to copy paste from windows 7 (Host Computer) to kali linux (Vmware)
1. First of all create password for your windows 7 operating system. Without creating Password you can not share. So Let's Create Password Go to Control Panel → User Accounts
Select Your Administrator account then Click on 'Create a password for your account'
(Click image for large view)

2. Write Password and click on Create Password  

3. You will notice that your administrator account is now password protect.

4. Right Click on the Folder which one you want to share with Vmware then click on Properties 

5. Select Sharing Tab then Click on Advance Sharing

6. Check Share this folder Box then click on Permissions

7. Check all Boxes then Click OK

8. Click OK

9. You will notice Now you have a Network path. Click Close

10. Now, Open Your VMware. Select your OS then go to VM → Settings..

11. Go to Option Tab. Select Shared Folders then Select Always enabled afterthat click Add

12. Click Next

13. Here we are going to select a particular folder which we had shared in our windows 7 OS. Click Browse..

14. Select Folder which one we shared in windows 7 then click OK

15. Now you have a Host Path as well Name. Click Next

16. Click Finish

17. You will notice your windows host path and name. Click OK

18. Now, Turn ON Your VMware OS (Here my OS is Kali Linux). Right Click on Computer then Click Open

19. Go → Network

20. After sometime You will see your windows 7 PC username appears in your VMware Kali Linux Network.

21. Right Click on Your Windows 7 PC username then Click Open

22. Write your windows 7 username and password and Click on Connect.

23. If everything is cool then soon you will able to see your Windows 7's all Drive as well shared Folder. Here I shared 'New Folder'

24. Now time to mount your shared folder. Right Click on 'New Folder' then Click 'Open with Files'

25. Write your windows 7 username and password and Click on Connect. 

26. Here is your all New Folder's Data. Now your are read to copy and paste.

27. You will also notice that a folder named as your shared folder appears in your kali linux desktop.
(Click image for large view)

Like it ? Share it.

Saturday, February 1, 2014

Code Execution


In computer security, Code Execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process. It is commonly used in arbitrary code execution vulnerability to describe a software bug that gives an attacker a way to execute arbitrary code.
A program that is designed to exploit such a vulnerability is called an arbitrary code execution exploit. Most of these vulnerabilities allow the execution of machine code and most exploits therefore inject and execute shellcode to give an attacker an easy way to manually run arbitrary commands.
The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code execution.
It is the worst effect a bug can have because it allows an attacker to completely take over the vulnerable process. From there the attacker can potentially take complete control over the machine the process is running on.
Arbitrary code execution vulnerabilities are commonly exploited by malware to run on a computer without the owner's consent or by an owner to run homebrew software on a device without the manufacturer's consent.


Arbitrary code execution is commonly achieved through control over the program counter (also known as the instruction pointer) of a running process. The instruction pointer points to the next instruction in the process that will be executed. Control over the value of the instruction pointer therefore gives control over which instruction is executed next.
In order to execute arbitrary code, many exploits inject code into the process (for example by sending input to it which gets stored in an input buffer) and use a vulnerability to change the instruction pointer to have it point to the injected code. The injected code will then automatically get executed.
This type of attack exploits the fact that Von Neumann architecture computers do not make a general distinction between code and data, so that malicious code can be camouflaged as harmless input data. Many newer CPUs have mechanisms to make this harder, such as a no-execute bit.
Once the invader can execute arbitrary code directly on the OS, there is often an attempt at a privilege escalation exploit in order to gain additional control. This may involve the kernel itself or an account such as Administrator, SYSTEM, or root. With or without this enhanced control, exploits have the potential to do severe damage or turn the computer into a zombie - but privilege escalation helps with hiding the attack from the legitimate administrator of the system.
An arbitrary remote code execution with privilege escalation vulnerability in widely-deployed software is thus the worst vulnerability sub-type of them all. If bugs of this kind become known, fixes are usually made available within a few hours.
A lesser kind of vulnerability is the denial of service vulnerability, where the target machine can be prevented from doing what it's supposed to do, but can't be made to positively do something the attacker wants it to do.

Preventing Code Execution Vulnerabilities
It is never advisable to utilize user supplied input for system calls. In cases where it is absolutely necessary it is vital to sanitize user input whenever passing values to system calls.
Any application that utilizes system calls should be suspect, as it is a good indicator that the web application is attempting to do something for which another solution is probably more appropriate. If user input is allowed to be passed to system calls it should be strictly controlled and limited to a predefined set of values.

Like it ? Share it.

Friday, January 31, 2014

Earn Money Online


I’ve been signed up for Bidvertiser since I started working online but didn’t put much importance in this pay per click website. They paid me recently and this is why I am so excited with this platform. Bidvertiser is just like Google Adsense and here you can get some ads to put on your website or Blog or WordPress etc. You will be getting paid when someone clicks on the ad. This is a cool for you can earn money online. It’s easy to sign up for Bidvertiser. They provides free publisher account. Once you’re approved, you can start putting ads on your page and earn money. To get started, click on, “Add a new bidvertiser” tab and add your website URL. Now one website can’t be registered in two accounts. You have to choose a category of your website and this will show up adds relevant to that category. Once you’re done, you can click on the “template” to choose the ad format, color and style. Click on “Get code” to get your ad code. Here are the reasons why it’s a better alternative to adsense.



1. They show higher paying ads: This is why the name is “Bidvertiser.” Your ad unit will show up the maximum paid ads each. This means you will have the chance to earn more money per click.

2. Add as much units you wish: If you’ve ever used adsense, then you will know that you can’t put 3 add units per page. But in bidvertiser, you can put as many ad units you want meaning more revenue. It’s a better choice for longer pages.

3. Minimum payout $50: Adsense pays a minimum of $100 per month but bidvertiser will pay you even if you made half of that. Their minimum paying check amount is $50. Now you can wish to choose bidvertiser.

4. PayPal Payments: PayPal users, it’s a good info that bidvertiser pays you with PayPal, same day payment. The minimum payout for paypal is only $10, isn’t that wonderful?

5. Custom ad units: You can also create a custom ad unit for your website. This is a feature, adsense dosn’t have. You can choose the size(Width, Height) and even fonts.

6. Current bids: These are some info that adsense will never shared with anyone. You can see the current bid of your ad unit. See the list of ads and bid amount and you will learn how much you can earn with a particular ad.

7. $20 Ad bonus: This is a promotional offer from bidvertiser. If you sign up for an advertiser in bidvertiser, you will get $20 ad credit for free. You don’t have to spend anything else until you have your free credit. This is sure a great way to promote your site.

8. Refferal bonus: Bidvertiser offers different advertiser and publisher commissions. All you have to do is to add some of the affiliate links and banners in your website. Once a person joins and spends or earns an amount of money, you will be paid a commission.

So What are you waiting ? Register Now and earn Money Online !
Click on Banner for sign up
Register as Publisher 

Payment Proof 

Don't Know How to Make Website or Blog ?
Kindly Mail Us We will design your website or blog : contact@geekyshows.com

Like it ? Share it.

EC-Council Security Certifications


The International Council of Electronic Commerce Consultants (EC-Council) is a member-supported professional organization. The EC-Council is headquartered in Albuquerque, New Mexico.
The EC-Council is known primarily as a professional certification body. Its best-known certification is the Certified Ethical Hacker. It also operates a series of IT security conferences and cosponsored SC Magazine's 2007 salary survey, as well as the EC-Council University.


The EC-Council is best known for its professional certifications for the IT security field. It offers numerous certifications in a variety of fields related to IT security, including disaster recovery, secure programming, e-Business and general IT security knowledge.

IT Security Professional Certifications -
  • Certified Ethical Hacker (CEH)
  • Certified EC-Council Instructor (CEI)
  • Computer Hacking Forensic Investigator (CHFI)
  • EC-Council Certified Chief Information Security Officer (CISO)
  • EC-Council Certified Security Analyst (ECSA)
  • EC-Council Certified Incident Handler (ECIH)
  • Certified Network Defense Architect (CNDA)
  • Licensed Penetration Tester (LPT)
  • EC-Council Certified VOIP Professional (ECVP)
  • EC-Council Network Security Administrator (ENSA)
  • EC-Council Certified Computer Investigator (ECCI)
  • EC-Council Certified Encryption Specialist (ECES)
  • EC-Council Certified Chief Information Security Officer C|CISO
Entry Level Security Certifications:
  • Security 5 (Security|5)
  • Network 5 (Network|5)
  • Wireless 5 (Wireless|5)
Graduate Level Certifications:
  • Fundamentals in Computer Forensics
  • Fundamentals in Information Security
  • Fundamentals in Network Security
  • EC-Council Certified Security Specialist (ECSS)
Official Website : Click Here

Like it ? Share it.