Setup Browser Based Framework for Web Penetration Testing in Kali Linux...
OWASP Mantra – Free and Open Source Browser based Security Framework, is a collection of free and open source tools integrated into a web browser, which can become handy for penetration testers, web...
View ArticleCertified Ethical Training Program in Delhi (Enjoy Ethical Hacking with me)
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking...
View ArticleDOS Attack in Network using Colasoft Packet Builder (Beginner Guide)
A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host...
View ArticleWeb Pentest Lab Setup using bWAPP in Windows 10
bWAPP, or a buggy web application, is a deliberately insecure web application. It helps security enthusiasts, systems engineers, developers and students to discover and to prevent web vulnerabilities....
View ArticleHack Remote Windows 10 PC using JSRAT
JSRAT is a python Script that can be used to get a remote shell of victim pc. Open terminal and Type git clone https://github.com/Hood3dRob1n/JSRat-Py.git Now go to the jsrat foler using cd JSRAT-Py...
View ArticleHack Call Logs, SMS, Camera of Remote Android Phone using Metasploit
In 2015 we were using msfpayload and msfencode tools to perform this hack but on June 8th 2015 both msfpayload and msfencode is replaced by msfvenom tool. So simply now msfvenom is an updated...
View ArticleHack Wallpaper of Remote Android Phone using Metasploit
This module will set the desktop wallpaper background on the specified session. The method of setting the wallpaper depends on the platform type. First Hack the Victim Android Phone Using Metasploit...
View ArticleFinding Vulnerability in Server/Client using Nmap
Heartbleed bug The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected by the SSL/TLS encryption...
View ArticleHack anyone’s Whatsapp through QR code (Working)
Recently Whatsapp has released a new important update for their Whatsapp users that is End-to-End Encryption, means it’s impossible to decrypt this type of encryption even Whatsapp can’t decrypt it....
View ArticleFinding Vulnerability in EasyCafe Server using Metasploit
This module exploits file retrieval vulnerability in EasyCafe Server. The vulnerability can be triggered by sending a specially crafted packet (opcode 0x43) to the 831/TCP port. This module has been...
View ArticleHack Remote Windows 10 Password in Plain Text using Wdigest Credential...
On Windows 8/2012 or higher, the Digest Security Provider (WDIGEST) is disabled by default. This module enables/disables credential caching by adding/changing the value of the UseLogonCredential DWORD...
View ArticleGather Browser and OS Information of Remote PC using Http Client Exploit
This module gathers information about a browser that exploits might be interested in, such as OS name, browser version, plugins, etc. By default, the module will return a fake 404, but you can...
View ArticleHack Remote Windows PC using Easy File Sharing HTTP Server 7.2 SEH Overflow
This module exploits a SEH overflow in the Easy File Sharing FTP Server 7.2 software Exploit Targets Easy File Sharing FTP Server 7.2 Requirement Attacker: kali Linux Victim PC: Windows 7 Most Easy...
View ArticleHack Remote Windows PC using PCMAN FTP Server Buffer Overflow – PUT Command
This module exploits a buffer overflow vulnerability found in the PUT command of the PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous credentials are enabled… Exploit...
View ArticlePentest Lab Setup for Windows Server Environment (Beginner Guide)
To install Windows server 2008 R2 click this link To install active directory in the windows server, assign static IP address. Such as IP Address : 192.168.0.101...
View ArticleVulnerability Scanning in WordPress Site using WPScan
WPScan is a black box vulnerability scanner for WordPress written in PHP mainly focus on different types of vulnerability in WordPress, WordPress themes, and plugins. Well, WPScan tool is already...
View ArticleHack Remote Linux PC using PHPFilemanager 0.9.8 Remote Code Execution
This module exploits remote code execution vulnerability in phpFileManager 0.9.8 which is a filesystem management tool on a single file. Exploit Targets phpFileManager 0.9.8 Requirement Attacker: kali...
View ArticleHack Remote PC using WordPress N-Media Website Contact Form with File Upload...
This module exploits an arbitrary PHP code upload in the WordPress N-Media Website Contact Form plugin, version 1.3.4. The vulnerability allows for arbitrary file upload and remote code execution....
View ArticleHack Remote PC using WordPress Reflex Gallery Upload Vulnerability
This module exploits an arbitrary PHP code upload in the WordPress Reflex Gallery version 3.1.3. The vulnerability allows for arbitrary file upload and remote code execution Exploit Targets Reflex...
View ArticleHack Remote PC using WordPress Ajax Load More PHP Upload Vulnerability
This module exploits an arbitrary file upload in the WordPress Ajax Load More version 2.8.1.1. It allows uploading arbitrary php files and getting remote code execution. This module has been tested...
View Article