Hack Drupal Website using Drupal RESTWS Module Remote PHP Code Execution
This module exploits a Remote PHP Code Execution vulnerability in Drupal RESTWS Module. Unauthenticated users can execute arbitrary code under the context of the web server user. RESTWS alters the...
View ArticleHack Remote Windows 10 PC using TheFatRat
TheFatRat is an easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter reverse_tcp payload In it that can then be executed on...
View ArticlePerform Man in the Middle Attack in Network using Xerosploit
Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow realising efficient attacks, and also allows...
View ArticleGet Admin Access of Remote Windows PC using MS16-016 mrxdav.sys WebDav...
This module exploits the vulnerability in mrxdav.sys described by MS16-016. The module will spawn a process on the target system and elevate it’s privileges to NT AUTHORITY\SYSTEM before executing the...
View ArticleHack Remote Windows PC using DLL Files (SMB Delivery Exploit)
This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads. Currently supports DLLs and Powershell. Exploit Targets Windows 7 Requirement...
View ArticlePenetration Testing in Active Directory using Metasploit (Part 2)
Enumerate all logged on users This module will enumerate current and recently logged on Windows users. msf > use post/windows/gather/enum_logged_on_users msf post(enum_logged_on_users) > set...
View ArticlePenetration Testing in SMB Protocol
In Hacking, Ports and Protocols play a major role as hacking is not possible without them. And to work with them, let us first understand ports and protocols. In information technology, a protocol is...
View Article4 Ways to Hack SMB Login Password
Previously we have learned all about the port SMB and how to identify its working on the remote host. To read that click here In this article, we will learn how to gain control over our victim’s PC...
View Article4 ways to Connect Remote PC using SMB Port
To understand what is SMB protocol, click here To know how collect username and passwords to your remote host via SMB protocol, click here In this article, we will learn how to exploit your remote PC...
View ArticleA New Way to Hack Remote PC using Xerosploit and Metasploit
In this article we will learn about that how we can change an on-going downloading file with your metasploit’s payload in your victim’s PC. That means if your victim is about to download an .exe file...
View ArticleControl Remote PC using PSTools
PS Tools Kit is a collection of 13 tools developed by Mark Russinovich. These tools are command-line tool that lets you execute processes on remote systems and redirect console applications’ output to...
View ArticleHow to Detect Meterpreter in Your PC
Anti-metasploit is an article to know about how can you detect if you are hacked by someone through metasploit or not. Today, most of the time we stumble upon the ways about how we can be hacked or how...
View ArticleHack Remote Windows PC using Office OLE Multiple DLL Hijack Vulnerabilities
Multiple DLL side loading vulnerabilities were found in various COM components. These issues can be exploited by loading various these components as an embedded OLE object. When we instantiate a...
View ArticleFun with Metasploit Payloads
Ordinarily small things have no use but whenever it comes up to their greater relevance then at certain point of time it has a universalized impact and can create a complex situation. And this article...
View ArticleShodan a Search Engine for Hackers (Beginner Tutorial)
Many people have described Shodan as a search engine for hackers, and have even called it “the world’s most dangerous search engine”. It was developed by John Matherly in 2009, and unlike other search...
View ArticleSetup VPN Penetration Testing Lab in Server 2008
You just need to follow the basic steps for configuring a remote access virtual private network (VPN) server using Server Manager, the Add Roles Wizard, and the Routing and Remote Access Server Setup...
View ArticlePenetration Testing Skills Practice with Metasploitable (Beginner Guide)
Metasploitable is a voluntarily created vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities Based virtual machine which helps us to conduct...
View ArticlePenetration Testing in PwnLab (CTF Challenge)
In this article we will walkthrough a root2boot penetration testing challenge i.e PwnLab. PwbLab is a vulnerbale framework, based on the concept of CTF (capture the flag), with a bit of security which...
View ArticleHack the Mr. Robot VM (CTF Challenge)
This is our another article of root2boot penetration testing challenge. We will walk through a exploitable framework Mr. Robot. It is based on the TV show, Mr. Robot, it has three keys hidden in...
View ArticleHack Admin Access of Remote Windows 10 PC using TpmInit UACBypass
Microsoft is increasing its security with the evolution of their windows. And with that it is getting more and more difficult to hack them. It is often said “where there is will; there is a way”,...
View Article