5 Ways to Create Dictionary for Bruteforcing
We live in digital era, and in the world of technology everything is password protected. There are many ways to crack the password such as social engineering, try and error method, etc. but the three...
View ArticleCreate SSL Certified Meterpreter Payload using MPM
Through this article you can learn how an attacker would able to generate a SSL certificate for any exe or bat file payloads so that he might be able to establish a connection with host through...
View ArticleNetcat Tutorials for Beginner
From Wikipedia In the field of hacking most utilized and powerful tool use by attack is popularly known as “Netcat” which is a computer networking function for analyzing from and writing to network...
View ArticleExploit Windows PC using EternalBlue SMB Remote Windows Kernel Pool Corruption
This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size is...
View ArticleHow to set up SQLI Lab in in Kali
Hello everyone, with the joy of having new kali version somewhere few of us are having hard time in setting Dhakkan (AUDI-1) sqli series lab in our kali machine. So today we’ll be learning how to setup...
View ArticleHack Legal Notice Caption of Remote PC
Registry key play an important role in operating system attacker makes use of legal notice registry key to send threaten message on targeted system so that once the system is boot up the user can read...
View ArticleBeginner Guide of SQL Injection (Part 1)
SQL injection is a technique where malicious user can inject SQL Commands into an SQL statement via web page. An attacker could bypass authentication, access, modify and delete data within a database....
View ArticleManual SQL Injection Exploitation Step by Step
This article is based on our previous article where you have learned different techniques to perform SQL injection manually using dhakkan. Today we are again performing SQL injection manually on a live...
View ArticleHow to Bypass SQL Injection Filter Manually
In previous article you have learned the basic concepts of SQL injection but in some scenarios you will find that your basic knowledge and tricks will fail. The reason behind that is the protection...
View ArticleHack the Super Mario (CTF Challenge)
Hello friends!! Might you people have played THE SUPER MARIO game once in your childhood and no wonder if a thought have been strike in your mind to hack the game. So whatever you had thought today we...
View ArticleBypass Admin access through guest Account in windows 10
Open command prompt and check windows user account status using “whoami” command. Account name is “joe” and account status is ‘DefaultAccount’ which is a non-administrator account type. Try changing...
View ArticleForm Based SQL Injection Manually
In our previous article we had perform Form Based SQL injection using sqlmap but today we are going to perform Form Based SQL injection in DHAKKAN manually. There are so many example related to login...
View ArticleUnderstanding the CSRF Vulnerability (A Beginner Guide)
Today we will see CSRF attack in different scenario like transferring fund and password changing but before we see how cross site request forgery works we need to understand of few concepts. Tabbed...
View ArticleBypass UAC Protection of Remote Windows 10 PC (Via FodHelper Registry Key)
Hello friends! Today we are going to share new article related to how to bypass window 10 UAC once you have hacked the victim’s system. In metasploit a new module has been added to achieve admin access...
View ArticleUnderstanding Encoding (Beginner’s guide)
From Wikipedia This article will describe the different type of process involves in encoding of data. The term encoded data means wrapped data and the process of encoding is used to transform the data...
View ArticleCSRF Exploitation using XSS
Hello friends! In our previous article we saw how an attacker can shoot web application against CSRF vulnerability with help of burp suite. Today again we are going to test CSRF attack with help of XSS...
View ArticleDumping Database using Outfile
In our previous article you have learned the basic concepts of SQL injection but in some scenarios you will find that your basic knowledge and tricks will fail. Today we are going to perform...
View ArticleHow to Spider Web Applications using Burpsuite
Hello friends! Today we are doing web penetration testing using burp suite spider which very rapidly crawl entire web application and dump the formation of targeted web site. Burp Spider is a tool for...
View ArticleDatabase Penetration Testing using Sqlmap (Part 1)
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticleBeginner Guide to File Inclusion Attack (LFI/RFI)
You can insert the content of one PHP file into another PHP file before the server executes it, with the include () function. The function can be used to create functions, headers, footers or element...
View Article