Hack Password using Rogue Wi-Fi Access Point Attack (WiFi-Pumpkin)
WiFi-Pumpkin framework for Rogue Wi-Fi Access Point Attack It helps a hacker to create a free open fake wifi and as soon as victim connects to the fake open wifi, he gets trapped. However, the best...
View ArticleOpenSSH User Enumeration Time-Based Attack with Osueta
OpenSSH (also known as OpenBSD Secure Shell) is a suite of security-related network-level utilities based on the Secure Shell (SSH) protocol, which help to secure network communications via the...
View ArticleHack Wifi using Evil Twin Method with Linset in kali Linux
Linset is a tool for Evil twin attack How it works Scan the networks. Select network. Capture handshake (can be used without handshake) We choose one of several web interfaces tailored for me (thanks...
View ArticleHack Remote Windows PC using Regsvr32.exe (.sct) Application Whitelisting...
This module simplifies the Regsvr32.exe Application Whitelisting Bypass technique. The module creates a web server that hosts an .sct file. When the user types the provided regsvr32 command on a...
View ArticleExploit Remote Server using Tiki-Wiki CMS Calendar Command Execution
Tiki-Wiki CMS’s calendar module contains a remote code execution vulnerability within the viewmode GET parameter. The calendar module is NOT enabled by default. If enabled, the default permissions are...
View ArticleHack Web Server using PHP Command Injection (Smplshllctrlr)
Smplshllctrlr is a PHP Command Injection exploitation tool so for demo we will be using DVWA (Damn Vulnerable Web App). 1.) Exploit web page and upload simple-shell.php (or simply find an existing...
View ArticleHack Remote PC using Malicious MS Office Documents
Veil-Evasion is a powerful tool to generate payload executables that bypass common antivirus solutions. To install veil-evasion on your kali linux, type : apt-get install veil-evasion After the...
View ArticleHack Web Server using Tiki Wiki Unauthenticated File Upload Vulnerability
This module exploits a file upload vulnerability in Tiki Wiki <= 15.1 which could be abused to allow unauthenticated users to execute arbitrary code under the context of the web server user. The...
View ArticleFirewall Penetration Testing in Remote Windows PC (Part 1)
To play with firewall, we, first, should understand how it works. Firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be...
View ArticleFirewall Penetration Testing in Remote Windows PC (Part 2)
For introduction to firewall please visit Firewall Penetration Testing – Part 1. In this article we will learn how to view inbound and outbound rules of firewall in remote PC, how to delete a rule,...
View ArticleHack Remote Windows PC using Macros with Msfvenom
Open metasploit framework by typing the command: and type use windows/meterpreter/reverse_https msf exploit (reverse_https)>set lhost 192.168.0.104 (IP of Local Host) msf exploit...
View ArticleGather Credential of WebNMS Framework Server using Metasploit
This module abuses two vulnerabilities in WebNMS Framework Server 5.2 to extract all user credentials. The first vulnerability is a unauthenticated file download in the FetchFile servlet, which is used...
View ArticleCapture VNC Session of Remote Windows PC by Payloads Injection
This article contains post exploitation method. To run following commands successfully first take a session of meterpreter and then follow the commands In this digital era, more and more people are...
View ArticlePenetration Testing in Windows Server Active Directory using Metasploit (Part 1)
Open Kali terminal type nmap -sV 192.168.0.104 you’ll see that port 445 is open, port 445 is a traditional Microsoft networking port. Specifically, TCP port 445 runs Server Message Block(SMB) over...
View ArticleFirewall Penetration Testing in Remote Windows PC (Part 3)
To execute all the given commands first you need to hack you victim, to do so click here. To read part 1 click here and for part 2 here In this article, we will learn about how to block /allow...
View ArticleHow to Setup Cloud Computing Penetration Testing Lab
XAMPP is the most popular PHP development environment. XAMPP is a completely free, easy to install Apache distribution containing MariaDB, PHP and Perl. The XAMPP open source package has been set up to...
View ArticleProxy Server Lab Setup using Wingate (Part 1)
Albert Einstein always said “Imagination is important than knowledge” and this imagination accompanied by knowledge helps our world to more and more every day. Thus, technology grows and grows and...
View ArticleWifi Penetration Testing in Remote PC (Part 1)
People often say “news travel fast”. How? The answer is one word Wireless. Wireless network all around the world helps us to move faster in our life. It enables us to make more of already running time....
View ArticleProxy Server Lab Setup using Wingate (Part 2)
Digital era allows company to work securely and much efficiently. For doing so software’s and hardware’s play a major role. Today, it is nearly impossible to work without technology. And we all know...
View ArticleFirewall Pentest Lab Setup with pfsense in VMware
Firewall: It is a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall holds a lot of importance our technical world as it assures...
View Article