Tuesday, October 09, 2018
Email-based Cyber Attacks Continue to Target Users in Philippines
Cybercriminals
use social engineering techniques to trick users into providing login
credentials, initiating fraudulent transactions or unknowingly install
ransomware.
TAGUIC CITY, PHILIPPINES, 25 Sep 2018
- Fortinet, a global leader in broad, integrated and automated
cybersecurity solutions,
today remind corporate users in Philippines that email remains one of
the most vulnerable vectors targeted by cybercriminals. The
cyber-attacks are likely to happen to organizations that have yet to
implement strong email security controls and best practices.
According
to the Verizon Data Breach Investigations report, two-thirds of
installed malware are actually delivered by email. To gain access into
an organization’s network, cybercriminals often use phishing
or social engineering techniques in emails, thus counting on human
error or a lack of cybersecurity know-how to trick users into providing
login credentials or initiating fraudulent transactions, as well as to
unknowingly install malware, ransomware and other
malicious payloads.
“Due
to the ubiquity of email, it continues to be a common attack vector for
cybercriminals seeking to steal login credentials, money, and sensitive
data.” Said Mario Luis Castaneda. “The top email-based
cyberattacks carried out by cybercriminals today include phishing or
spear-phishing, man-in-the-middle attacks and zero-day vulnerabilities.
Companies must therefore ensure they have strong security controls in
place to detect and prevent these e-mail attacks.”
To help ensure email security, Fortinet’s cybersecurity experts advised users to:
1.
Filter Spam.
Because most email scams begin with unsolicited commercial email, one
should
take measures to prevent spam from getting into the mailbox. Most email
applications and web mail services include spam-filtering features, or
ways in which email applications can be configured to filter spam.
2.
Regard Unsolicited Email with Suspicion.
Don’t automatically trust any email sent by an unknown
individual or organization. Never open an attachment to unsolicited
email. Most importantly, never click on an unknown link in an email.
Cleverly crafted links can take users to forged web sites set up to
trick them into divulging private information or downloading
viruses, spyware, and other malicious software.
3.
Treat Email Attachments with Caution.
Email attachments are commonly used by online scammers to sneak
a virus onto computers. These viruses can help the scammer steal
important information from the computer, compromising the computer so
that it is open to further attack and abuse, and convert a computer into
a ‘bot’ for use in denial-of-service attacks and
other online crimes. As noted above, a familiar “from” address is no
guarantee of safety because some viruses spread by first searching for
all email addresses on an infected computer and then sending itself to
these addresses.
4.
Install Antivirus Software. Users should install an antivirus program that has an automatic update
feature. This will help ensure users to always have the most up-to-date protection possible against viruses.
5.
Install a Personal Firewall and Keep it Up to Date.
A
firewall will not prevent scam email from making its way into users’
mailbox. However, it may help protect users should they inadvertently
open a virus-bearing attachment or otherwise introduce
malware to their computer. The firewall, among other things, will help
prevent outbound traffic from a user’s computer to the attacker. When a
personal firewall detects suspicious outbound communications from a
user’s computer, it could be a sign that the
user has inadvertently installed malicious programs on his computer.
###
About Fortinet
Fortinet
secures the largest enterprise, service provider, and government
organizations around the world. Fortinet empowers its customers with
intelligent, seamless
protection across the expanding attack surface and the power to take on
ever-increasing performance requirements of the borderless network -
today and into the future. Only the Fortinet Security Fabric
architecture can deliver security without compromise to
address the most critical security challenges, whether in networked,
application, cloud or mobile environments. Fortinet ranks #1 in the most
security appliances shipped worldwide and more than 360,000 customers
trust Fortinet to protect their businesses.
Learn more at http://www.fortinet.com, the
Fortinet Blog, or
FortiGuard Labs.
Copyright
© 2018 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote
respectively federally registered trademarks and common law trademarks
of
Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks
include, but are not limited to, the following: Fortinet, FortiGate,
FortiGuard, FortiCare, FortiManager, FortiAnalyzer, FortiOS, FortiASIC,
FortiMail, FortiClient, FortiSIEM, FortiSandbox,
FortiWiFi, FortiAP, FortiSwitch, FortiWeb, FortiADC, FortiWAN, and
FortiCloud.
Other
trademarks belong to their respective owners. Fortinet has not
independently verified statements or certifications herein attributed to
third parties
and Fortinet does not independently endorse such statements.
Notwithstanding anything to the contrary herein, nothing herein
constitutes a warranty, guarantee, contract, binding specification or
other binding commitment by Fortinet or any indication of intent
related to a binding commitment, and performance and other
specification information herein may be unique to certain environments.
This news release may contain forward-looking statements that involve
uncertainties and assumptions, such as statements regarding
technology releases among others. Changes of circumstances, product
release delays, or other risks as stated in our filings with the
Securities and Exchange Commission, located at
www.sec.gov,
may cause results to differ materially from those expressed or implied
in this press release. If the uncertainties
materialize or the assumptions prove incorrect, results may differ
materially from those expressed or implied by such forward-looking
statements and assumptions. All statements other than statements of
historical fact are statements that could be deemed forward-looking
statements. Fortinet assumes no obligation to update any
forward-looking statements, and expressly disclaims any obligation to
update these forward-looking statements.Sunday, August 19, 2018
PR: Lenovo introduces new laptops for the ‘modern avid gamer’
Philippines – 17 Aug 2018 – Lenovo, a global leader in PCs and smart devices development, is
launching two new laptops designed to meet the demands of the ‘modern avid
gamers’.
“Through our
market research, we have discovered that there is a subset of gamers being
ignored – the modern avid gamers. Most of these are millennials who carried
their enthusiasm to adulthood but find it hard to continue due to their
responsibilities at work, family, and social life. They are looking for a
gaming PC that lets them partake in their passion but in a way that fits their
lifestyle and time constraints. Our newest gaming machines are designed to meet
their needs – a powerful, portable device with a stylish and minimalist
exterior,” said
Michael Ngan, Country General Manager of Lenovo
Philippines.
The new
devices, namely, the Lenovo Legion Y530 and the IdeaPad 330 are
built for more than just gaming. Both can handle programs for work or study easily,
but also allows you to watch movies and TV series, it supports digital
performance like video, animation, and graphics editing.
Lenovo Legion
Y530 – The portable gaming and office workhorse
The new Lenovo
Legion laptops are built for today’s on-the-go gamers who travel light. The
Lenovo Legion Y530 Laptop has a subtle but compelling top cover texture that
radiates out from the “O” in its Legion emblem. The laptop is fully equipped
with up to NVIDIA® GeForce® GTX 1050 Ti GPUs, up to the latest 8th Gen Intel®
Core™ i7 processors and Windows® 10.
With up to 16GB
DDR4 2666MHz memory and up to 256GB M.2 PCIe SSD or 2TB HDD storage, it can
fulfill both powering and storage demands. Heat is no longer a bother to gamers
as the new Legion Y530 features improved thermal layout with dual fan design
and quad-vent cooling for increased airflow.
Users can enjoy
clear and crisp audio with its Dolby Audio™ Premium, which can dynamically
adjust audio to deliver home theatre quality in a virtual surround sound
experience. The Legion Y530 comes in at only 24 mm thin and 5.1 lbs. light. Its
bezels are 62% thinner compared to previous gaming laptops, making it more
portable and easy to carry.
The device is
available in Onyx Black with backlit keyboards.
Lenovo IdeaPad 330 – The all-around productivity
and entertainment booster
Stacked with
premium processing and discrete graphics options, the Lenovo IdeaPad™ 330 is as powerful as it is easy to use. Buyers can choose up to 7th Generation
Intel® Core™ i7 processor, coming with the lightning-fast responsiveness and
reliable performance.
The device supports
up to NVIDIA® GeForce® GTX 1050 graphics, perfect for those who want to play
graphics-intensive games and handle resource-intensive business applications smoothly
at the same time.
In addition, users
can choose from up to 2 TB SATA HDD storage. The laptop comes in 14-, 15- and
17-inch anti-glare screens, in HD and full HD resolution options. Starting at
4.6 lbs, the device is made up of sturdy PC-ABS material chassis and it promises
up to 8 hours of battery life.
Lenovo IdeaPad
330 comes in Onyx Black, Platinum Grey, Midnight Blue, and Chocolate.
Starting price for the Legion Y530 and IdeaPad 330 are P59,995 and P17,995, respectively. Both devices are now available at leading electronics stores.
The devices will be first showcased at Conquerors Manila 2018
where Lenovo is the official gaming hardware partner.
About Lenovo
Wednesday, April 18, 2018
Epson establishes new Sales Subsidiary in Vietnam
Pasig, Philippines —April 12, 2018—Seiko
Epson Corporation (TSE: 6724, “Epson) and Epson Singapore Pte. Ltd.
recently announced the opening of its new sales subsidiary and office in
Vietnam.
The
new subsidiary, Epson Vietnam Co., Ltd. (EVNL), began its operations
last April 1 and was officially launched at Hotel Nikko Saigon in Ho Chi
Minh City,
Vietnam.
(2nd from left) Hideto Nakamura, general director, Epson Vietnam; (3rd from left) Koichi Kubota, director, senior managing executive
officer
& chief operating officer, Printing Solutions Operations Division; and (1st from right) Tanaka Toshimitsu, managing director, Epson Singapore.)
Hideto
Nakamura, general director of Epson Vietnam, said that prior to its
establishment, Epson had previously sold products through its sales
subsidiary in
Thailand. In 2010, it established a Vietnam representative office
focused on market research.
“The
establishment of the office in Vietnam will strengthen Epson’s business
and brand presence in the region. There is much potential for growth in
the country,
especially with a GDP forecast of at least 6.5 percent in 2018,” said
Nakamura. “We look forward to rolling out new Epson products in our four
key areas of innovation, such as the inkjet, visual communications,
wearables, and robotics.”
In
2017, Epson recorded a high demand for its products in Vietnam.
According to the latest IDC Quarterly Hardcopy Peripherals Tracker
report, Epson’s market
shares for high-capacity ink tank printers for the Q4 last year stood
at 53 percent.
“Vietnam’s
printer market is currently dominated by laser printers. However, there
is extensive scope for growing sales by emphasizing the advantages of
our
high-capacity ink tank printers. Epson Vietnam will play an important
role in developing this promising market,” Nakamura added.
As
a market leader, Epson will continue offering unique value and
solutions to its customers in the said region through the new Epson
Vietnam office. It is located
at Nguyen Trai Street, District 1, Ho Chi Minh City in Vietnam.
###
About Epson
Epson
is a global technology leader dedicated to connecting people, things
and information
with its original efficient, compact and precision technologies. With a
lineup that ranges from inkjet printers and digital printing systems to
3LCD projectors, smart glasses, sensing systems and industrial robots,
the company is focused on driving innovations
and exceeding customer expectations in inkjet, visual communications,
wearables and robotics.
Led by the Japan-based Seiko Epson Corporation, the Epson Group comprises more than 80,000 employees in 86 companies around the world, and is proud of its contributions to the communities in which it operates and its ongoing efforts to reduce environmental impacts.
About Epson Singapore
Since
1982, Epson has developed a strong presence across major markets in
Southeast Asia and South Asia. Led by the regional headquarters Epson
Singapore, Epson’s business in Southeast Asia spans an extensive network
of 11 countries with a comprehensive infrastructure of close to 500
service outlets, 7 Epson solution centres and
7 manufacturing facilities.
About Epson Philippines
Epson’s
corporate presence in the Philippines commenced in 1998. It grew
rapidly into a billion-peso
company in a span of a few years from its establishment due to its
client-oriented approach in its business management style by its
dedicated and innovative staff members and officers. Epson Philippines
has an extensive network of 77 Authorized Service Centers
nationwide with more than 200 dealers and more than 800 shops across
the Country. For more details, please visit our website (www.epson.com.ph) or our Facebook page (http://www.facebook.com/ EpsonPhilippines).
Thursday, April 12, 2018
SAP Announces First Collaboration in esports and Becomes the Official Innovation Partner of Team Liquid
Taguig, Philippines — April 10, 2018 —SAP
SE
(NYSE: SAP) today announced a new sponsorship deal with Team
Liquid, one of the most successful teams in esports. The sponsorship of
Team Liquid is the first collaboration of SAP with a professional
esports organization. As official innovation partner, SAP will work with
Team Liquid on co-developing software based on
in-game data, which will help Team Liquid analyze performance and
achieve greater precision in areas like team and player performance and
scouting new talent.
SAP will support Team Liquid by implementing a range of innovative technology solutions
that deliver cutting-edge analytics to the team to improve overall performance in training and in competition. The SAP HANA® business data platform will serve as the core technology for co-development. Additional components such as SAP®
Cloud Platform, the SAP Leonardo digital innovation system as well as
the Internet of Things (IoT) and predictive and machine learning
functionalities will be evaluated as part of the co-innovation process.
By equipping Team Liquid with the most innovative
tools possible to track and improve performance, SAP hopes to
participate as an authentic, global and sustainable player in the
esports ecosystem, addressing a young and tech-savvy esports community.
“After
deciding to become a sponsor in the field of esports, SAP took time to
observe and
analyze the market and its ecosystem before finally deciding to partner
with Team Liquid – one of the most successful teams in the business,”
said Stefan Ries, chief human resources officer, SAP. “For SAP, esports
opens us up to a tech-savvy and highly skilled
young audience and potential new talent for SAP. As a global,
innovative and forward-looking technology company, SAP provides a high
brand fit to the esports ecosystem.”
“There
is a strong demand for meaningful data and analytics software in
esports,” said
Victor Goossens, co-CEO, Team Liquid. “For Team Liquid, competitive
performance is key – and smart technology and data give us the best
possible tools to analyze and improve. As a technology company at the
cutting edge of innovation and with sponsorship experience
across sports and entertainment, SAP is the perfect partner to
collaborate with Team Liquid to create tools and solutions to fuel our
competitive journey.”
About Team Liquid
Team
Liquid was founded in 2000 as a clan on the gaming platform Battle.net,
and has now
evolved into one of the leading international multigame esports teams
with training centers in Utrecht, The Netherlands, and Los Angeles,
California. Team Liquid has over 70 athletes competing across 13
distinct games, including all major esports titles, such
as DOTA 2, League of Legends and CS:GO. Team Liquid is one of the most
successful esports teams in the Western market in terms of competitive
achievement and fan engagement across multiple sports. In 2017 its DOTA 2
team, led by German superstar Kuro “KuroKy”
Salehi Takhasomi as team captain, won The International and took home
the most important title and prize pool in the sport.
About SAP
As
market leader in enterprise application software, SAP (NYSE: SAP)
helps companies of all sizes and industries run better. From back
office to boardroom, warehouse to storefront, desktop to mobile device –
SAP empowers people and organizations to work together more efficiently
and use business insight more effectively to
stay ahead of the competition. SAP applications and services enable
more than 378,000 business and public sector customers to operate
profitably, adapt continuously, and grow sustainably. For more
information, visit
www.sap.com.
# # #
Any
statements contained in this document that are not historical facts are
forward-looking
statements as defined in the U.S. Private Securities Litigation Reform
Act of 1995. Words such as “anticipate,” “believe,” “estimate,”
“expect,” “forecast,” “intend,” “may,” “plan,” “project,” “predict,”
“should” and “will” and similar expressions as they
relate to SAP are intended to identify such forward-looking statements.
SAP undertakes no obligation to publicly update or revise any
forward-looking statements. All forward-looking statements are subject
to various risks and uncertainties that could cause
actual results to differ materially from expectations. The factors that
could affect SAP's future financial results are discussed more fully in
SAP's filings with the U.S. Securities and Exchange Commission ("SEC"),
including SAP's most recent Annual Report
on Form 20-F filed with the SEC. Readers are cautioned not to place
undue reliance on these forward-looking statements, which speak only as
of their dates.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE in Germany and other countries. Please see http://www.sap.com/corporate-
Wednesday, March 07, 2018
How To Get WiFi Password With Linux Linset Tools
How To Get WiFi Password With Linux Linset Tools
Linset Is Not a Social Enginering Tool - Hacking without brute force-Disconnecting all the clients in the selected network, connecting them to my fake network Capture handshake (can be used without handshake but a chance of fail), asking for the router password. If they introduce the asked password, LINSET will stop working, will save the password and the client will reconnect to the legit network.
This is for educational purposes only
Requirements :
- Linux OS
- Laptop or PC with WiFi Adaptor
Gamit ka USB bootable Kali Linux with Persistence mas portable gamitin di mo need mag dual boot at nasasave din yung ginawa mo sa USB
Tuts: http://www.blogmytuts.net/2016/02/how-to-make-bootable-kali-linux-20-usb.html
Instructions :
1. Download the Linset patched and extract it on your PC running on Linux OS
( pwede extract mo nalang sa desktop linset at airmon )

2. Update software for linset (Kali Linux) internet needed dito
Open terminal (yung parang CMD)
First Command
apt-get update && apt-get install -f
Second
apt-get install isc-dhcp-server
Third
apt-get install hostapd
Fourth
apt-get install lighttpd
Fifth
apt-get install php5-cgi
Pag may error punta ka dito source list update mo then try again
# Regular repositories
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# Source repositories
deb-src http://http.kali.org/kali sana main non-free contrib
deb-src http://security.kali.org/kali-security sana/updates main contrib non-free
For Newbie hindi alam ano source list visit :http://www.blogmytuts.net/2016/02/how-to-fix-kali-linux-unable-to-locate.html
#################################
2. Change the terminal directory to extracted folder Type "cd Desktop" press enter
or sample naka folder sa Desktop wpa2 folder Type "cd wpa2" press enter after nyo mag cd Desktop.
3. Type this command in terminal "chmod +x linset" and "chmod +x airmon"
4. Finally "./linset"
Dapat OK OK OK lahat lilitaw
5. Ganito dapat lilitaw lilitaw yung WiFi device mo
Type 1 Press Enter
6. Select Channel All Channel Press mo 1 then press Enter.
7. Then makikita BOX list ng available na WiFi SSID sa area mo wait mo mga 1 minute or 30 seconds.
8. Close the White Box List then may lilitaw na ganito APS list yung may (*) sa number maganda i hack.. available yun for handshake. Select ka sample I select 2 Type 2 then press Enter.
9. Mode of Fake AP ( eto gagawin neto mag gegenerate ng Fake AP same ng target pati Mac at Vendor Name )
Press 1 recommended Hostapd then Enter.
10. Info MAC just press Enter lang dito
11. Examination Handshake Press 1 then Enter
Tapos Capture HandShake Target Mass AP
12. Now wait to have WPA handshake ( at this momment i di disconnect nya yun mga user kaya makakita kayo ng mga mac list yun ang mac ng user ng WiFi at mag rerecon)
Kapag nakita nyo na may WPA handshake Press 1 Yes..
pag Wala Press 2 Strike Again
13. Now After success handshake Select Web Interface Press 1 and Enter
14. Select Language English Press 1 and Enter
15. WiFi Attack is on Going ( at this momment gagawa siya ng Fake AP at Fake DNS at DHCP)
ma didisconnect yung mga device sa original AP at i coconnect sila sa Fake AP )
Kailangan 6 windows ang lilitaw yung isa madalas natatakpan ng mdk3 yung AP
1.Main window
2.DHCP
3.Esperando
4.AP
5.FakeDNS
6.mdk3
16. Wait nyo lang may kumagat sa Fake AP SSID nyo
Ganito mang yayari sa Device ng ina atack na WiFi router mag ma rerecieve silang Notification Sign into WiFi network.. Hindi sila mag kaka internet hangat di nila na enter ang tamang password!
Pag nag open sila ng browser ganito lilitaw mag aask parin ng Password... yung Router nila kuhang kuha din Name Mac at Mac Vendor
17. Success!! Kapag na inpunt na nila yung password nila at na verify na correct titigil ang 4 Aps Window eto na yung password.
Yung password ma sasave yan sa root folder .
Sample video clip
link: http://webm.host/56377/
Minsan di lumilitaw yun dhcp
Eto gagawin :
Punta kasa root/var/lib/dhcp/ or buksan mo computer var then lib then dhcp folder tapos meron isang file jan na .leases ang format rename mo un ng dhcpd.leases
Kapag blanko yung var/lib/dchp walang laman punta kasa var/lib/networkmanagement/ nandyan yung may file.leases
rename mo ng dhcpd.lease copy mo sa /var/lib/dhcp/
You might also like :
Top 10 Wifi Hacking Tools in Kali Linux
Linset Is Not a Social Enginering Tool - Hacking without brute force-Disconnecting all the clients in the selected network, connecting them to my fake network Capture handshake (can be used without handshake but a chance of fail), asking for the router password. If they introduce the asked password, LINSET will stop working, will save the password and the client will reconnect to the legit network.
This is for educational purposes only
Requirements :
- Linux OS
- Laptop or PC with WiFi Adaptor
Gamit ka USB bootable Kali Linux with Persistence mas portable gamitin di mo need mag dual boot at nasasave din yung ginawa mo sa USB
Tuts: http://www.blogmytuts.net/2016/02/how-to-make-bootable-kali-linux-20-usb.html
Instructions :
1. Download the Linset patched and extract it on your PC running on Linux OS
( pwede extract mo nalang sa desktop linset at airmon )

2. Update software for linset (Kali Linux) internet needed dito
Open terminal (yung parang CMD)
First Command
apt-get update && apt-get install -f
Second
apt-get install isc-dhcp-server
Third
apt-get install hostapd
Fourth
apt-get install lighttpd
Fifth
apt-get install php5-cgi
Pag may error punta ka dito source list update mo then try again
# Regular repositories
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# Source repositories
deb-src http://http.kali.org/kali sana main non-free contrib
deb-src http://security.kali.org/kali-security sana/updates main contrib non-free
For Newbie hindi alam ano source list visit :http://www.blogmytuts.net/2016/02/how-to-fix-kali-linux-unable-to-locate.html
#################################
2. Change the terminal directory to extracted folder Type "cd Desktop" press enter
or sample naka folder sa Desktop wpa2 folder Type "cd wpa2" press enter after nyo mag cd Desktop.
3. Type this command in terminal "chmod +x linset" and "chmod +x airmon"
4. Finally "./linset"
Dapat OK OK OK lahat lilitaw
5. Ganito dapat lilitaw lilitaw yung WiFi device mo
Type 1 Press Enter
6. Select Channel All Channel Press mo 1 then press Enter.
7. Then makikita BOX list ng available na WiFi SSID sa area mo wait mo mga 1 minute or 30 seconds.
8. Close the White Box List then may lilitaw na ganito APS list yung may (*) sa number maganda i hack.. available yun for handshake. Select ka sample I select 2 Type 2 then press Enter.
9. Mode of Fake AP ( eto gagawin neto mag gegenerate ng Fake AP same ng target pati Mac at Vendor Name )
Press 1 recommended Hostapd then Enter.
10. Info MAC just press Enter lang dito
11. Examination Handshake Press 1 then Enter
Tapos Capture HandShake Target Mass AP
12. Now wait to have WPA handshake ( at this momment i di disconnect nya yun mga user kaya makakita kayo ng mga mac list yun ang mac ng user ng WiFi at mag rerecon)
Kapag nakita nyo na may WPA handshake Press 1 Yes..
pag Wala Press 2 Strike Again
13. Now After success handshake Select Web Interface Press 1 and Enter
14. Select Language English Press 1 and Enter
15. WiFi Attack is on Going ( at this momment gagawa siya ng Fake AP at Fake DNS at DHCP)
ma didisconnect yung mga device sa original AP at i coconnect sila sa Fake AP )
Kailangan 6 windows ang lilitaw yung isa madalas natatakpan ng mdk3 yung AP
1.Main window
2.DHCP
3.Esperando
4.AP
5.FakeDNS
6.mdk3
16. Wait nyo lang may kumagat sa Fake AP SSID nyo
Ganito mang yayari sa Device ng ina atack na WiFi router mag ma rerecieve silang Notification Sign into WiFi network.. Hindi sila mag kaka internet hangat di nila na enter ang tamang password!
Pag nag open sila ng browser ganito lilitaw mag aask parin ng Password... yung Router nila kuhang kuha din Name Mac at Mac Vendor
17. Success!! Kapag na inpunt na nila yung password nila at na verify na correct titigil ang 4 Aps Window eto na yung password.
Yung password ma sasave yan sa root folder .
Sample video clip
link: http://webm.host/56377/
Minsan di lumilitaw yun dhcp
Eto gagawin :
Punta kasa root/var/lib/dhcp/ or buksan mo computer var then lib then dhcp folder tapos meron isang file jan na .leases ang format rename mo un ng dhcpd.leases
Kapag blanko yung var/lib/dchp walang laman punta kasa var/lib/networkmanagement/ nandyan yung may file.leases
rename mo ng dhcpd.lease copy mo sa /var/lib/dhcp/
You might also like :
Top 10 Wifi Hacking Tools in Kali Linux







































