Shell context menu’s for Windows 10

Open Command Prompt here, Open PowerShell here, Open Bash Shell here – (with Elevated privileges) save these in a .reg file and open to apply. 1. Open Command Prompt and PowerShell here – registry file ; Command Prompt [HKEY_CLASSES_ROOT\Directory\shell\01MenuCmd] “MUIVerb”=“Command Prompts” “Icon”=“cmd.exe” “ExtendedSubCommandsKey”=“Directory\ContextMenus\MenuCmd” [HKEY_CLASSES_ROOT\Directory\background\shell\01MenuCmd] “MUIVerb”=“Command Prompts” “Icon”=“cmd.exe” “ExtendedSubCommandsKey”=“Directory\ContextMenus\MenuCmd” [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\open] “MUIVerb”=“Command Prompt” “Icon”=“cmd.exe” [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\open\command] @=“cmd.exe /s /k pushd "%V"” [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\runas] “MUIVerb”=“Command Prompt Elevated” “Icon”=“cmd.exe” “HasLUAShield”="" [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\runas\command] @=“cmd.exe /s /k pushd "%V"”...

August 25, 2019 · 1 min · 161 words · Akhil Jalagam

Testing IPSEC VPN Systems with ike-scan

ike-scan is a command-line tool for discovering, fingerprinting and testing IPsec VPN systems. It constructs and sends IKE Phase-1 packets to the specified hosts, and displays any responses that are received. ike-scan does two things: Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. Fingerprinting: Determine which IKE implementation the hosts are using. There are several ways to do this: (a) Backoff fingerprinting – recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns; (b) vendor id fingerprinting – matching the vendor-specific vendor IDs against known vendor ID patterns; and (c) proprietary notify message codes....

August 23, 2019 · 1 min · 155 words · Akhil Jalagam

iptables explained

Iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains. Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a ‘target’, which may be a jump to a user-defined chain in the same table....

August 21, 2019 · 3 min · 581 words · Akhil Jalagam