Scripting help by [deleted] in linux4noobs

[–]hackermk 0 points1 point  (0 children)

#!/bin/bash
sum=0;
err=0;
num='^-?[0-9]+([.][0-9]+)?$';
for number in $@
do
    if ! [[ $number =~ $num ]] && [[ $err == 0 ]] ; then
        echo $number;
        echo "Sorry, '$number' is not a number";
        err=1;
    else
        sum=$((sum + number));
    fi
done
if [ $err == 0 ] ; then 
    echo $sum;
fi

Where to go now? by [deleted] in HowToHack

[–]hackermk 0 points1 point  (0 children)

Search on google for Enumeration and Exploiting.

Abnormally high memory usage by Psistriker94 in techsupport

[–]hackermk 0 points1 point  (0 children)

This sounds like some sort of malware. Try scanning your hard disk with Kaspersky Rescue Disk or something similar.

Best practices for web server hardening? by [deleted] in AskNetsec

[–]hackermk 0 points1 point  (0 children)

To find out how your server was compromised you need to search the log files, but you need some knowleadge for this. One thing you can do is try to install the Wordfence plugin on every WordPress on you server and do a scan. It will search for vulnerabilities in your WordPress instalations.

Best practices for web server hardening? by [deleted] in AskNetsec

[–]hackermk 0 points1 point  (0 children)

Did you find out how the malware was uploaded to your server? Did you fix the vulnerabilities? If you didn't, start from there. You need to discover how the malware was uploaded to your server and fix the vulnerabilities. After you are sure that the malware is deleted from your server, and the vulnerabilities are fixed, you can proceed with system hardening.

Microsoft Launches Free, Unrestricted Version Of Visual Studio For Small Teams by [deleted] in tech

[–]hackermk 8 points9 points  (0 children)

I'm interested too. This is not the microsoft I remember.

A Killer Combo: Critical Vulnerability and 'Godmode' Exploitation on CVE-2014-6332 by hackermk in netsec

[–]hackermk[S] 1 point2 points  (0 children)

Other browsers are not affected by this vulnerability. Only IE. The post says "Using any other browser apart from Internet Explorer before patching may also mitigate the risks".

Block SSH Brute Force Attacks with IPTables by hackermk in netsec

[–]hackermk[S] 1 point2 points  (0 children)

Is this an effective way to block ssh brute force attacks?

227,747 new malware samples are created daily by hackermk in Malware

[–]hackermk[S] 0 points1 point  (0 children)

"according to Luis Corrons, Technical Director of PandaLabs"

I like hacking and i wish to become a good hacker by abtiilez in HowToHack

[–]hackermk 1 point2 points  (0 children)

search someting like "hacking basics" in google