Setup DNS Penetration Testing Lab on Windows Server 2012
From Wikipedia Domain Name System is used for name translation into IP address or you can say that it is used for name resolution. This name is only for the benefit of the human. It is translated into...
View ArticleHow to Perform Remote Tunneling
Hello friends! Previously we had discussed on Dynamic tunneling and Local tunneling and today we are going to discuss Remote tunneling. Remote tunneling is functional when a client machine wants to...
View ArticleHack the d0not5top VM (CTF Challenge)
This time we are going to solve a fun Vulnerable Lab d0not5top 1.2. To do so we are going to download the VM Machine from here. The credit for developing this VM machine is goes to 3mrgnc3 who has hide...
View ArticleWeb Application Penetration Testing with curl
curl is a computer software project providing a library and command-line tool for transferring data using various protocols. CURL is simply awesome because of the following reasons… CURL is an easy to...
View ArticleAnalysing TCP Headers using Wireshark
From Wikipedia TCP is used mostly by various applications available by internet, including the World Wide Web (WWW), E-mail, File Transfer Protocol, Secure Shell, peer file, and streaming media...
View ArticleHack the DonkeyDocker (CTF Challenge)
Today we are going to solve a fun Vulnerable Lab DonkeyDocker, download this VM Machine from here. The credit for developing this VM machine is goes to Dennis Herrmann who has hide 3 flag inside this...
View ArticleBypass UAC in Windows 10 using bypass_comhijack Exploit
In this article we are going to bypass User Access Control (UAC) in targeted system. It is the post exploitation; hence attacker must exploit target system at first then escalate UAC Protection Bypass...
View ArticleHack the Moria: 1.1 (CTF Challenge)
Today I found a Vulnerable Lab based on the world of Lords of The Rings. So get on your Gandalf mode to solve this fun Vulnerable Lab Moria 1.2., we are going to download the VM Machine from here. The...
View ArticleSSH Pivoting using Meterpreter
If you are aware of SSH tunneling then you can easily understand SSH pivoting, if not then don’t worry read SSH tunneling from here. Pivoting is technique to get inside an unreachable network with...
View ArticleHack the Analougepond VM (CTF Challenge)
Hello friends! Today we are going to take another CTF channeling known as Analougepond which Based on our previous article “SSH pivoting”, if you are aware of ssh pivoting then you can easily breach...
View ArticleUnderstanding Nmap Scan with Wireshark
In this article you will learn how to capture network packet using Wireshark when attacker is scanning target using NMAP port scanning method. Here you will notice that how Wireshark captured different...
View ArticleConfigure Penetration Testing Lab Setup in Ubuntu (Beginner Guide)
Hello friends! Today you will learn how to configure your own web server using ubuntu inside virtual machine and install LAMP services for web server configurartion. Let’s Begin!! We are using VM...
View ArticleConfigure Web Application Penetration Testing Lab
In our previous article you had learnt how to configure a web server using ubuntu system with the help of LAMP services for designing your own pentest lab. Today you will how to configure the famous 4...
View ArticleWordPress Penetration Testing Lab Setup in Ubuntu
Today we are demonstrating how to install and configure wordpress for penetration testing inside the web server. To configure wordpress, you must install any web host software such as xampp/wamp or...
View ArticleHack the 64base VM (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as 64base. The credit for making this vm machine goes to “3mrgnc3” and it is another capture the flag where author has hidden flag...
View ArticleUnderstanding Log Analysis of Web Server
From Wikipedia Logs Log files are a standard tool for computer systems developers and administrators. They record the (W5) “what happened when by whom, where and why happened” of the system. This...
View Article4 Ways to DNS Enumeration
Today we are going to perform DNS enumeration with Kali Linux platform only. It has in-built tool for DNS enumeration. For this tutorial you must be aware of DNS server and its records, if you are not...
View ArticleHack the 6days VM (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as 6days. The credit for making this vm machine goes to “CanYouPwn.Me” and it is another boot2root challenge where we have to...
View ArticleBeginner Guide NetBIOS and SMB Penetration Testing on Windows
From Wikipedia NETBIOS (Network Basic Input/output System) NETBIOS is a service which allows communication between applications such as printer or other computer in Ethernet or token ring network via...
View ArticleHow to secure Ubuntu Server using Google Authenticator
Hello friends, today we are going to implement two-factor authentication on ubuntu. Two-factor authentication adds an extra layer of security. We are going to use google authenticator to implement...
View Article