Lab Setup for VOIP Penetration Testing
Hello friends! Today you will learn how to setup VOIP in virtual machine using tribox 2.8.0.4 iso image for making phone calls and sending text messages in local network. From Wikipedia Voice over...
View ArticlePost Exploitation in VMware Files with Meterprter
Hello friends!! Today you will how to exploit any operation system running inside the virtual machine. Requrement Attacker: kali linux Target: VM image windows server 2012 First attacker needs to...
View ArticleMS-SQL Penetration Testing lab Setup
Hello friends!! Today you will learn how to install and configure MS SQL server in windows 10 operating system. Requirement: Download setup file ENU\x64\SQLEXPR_x64_ENU.exe Download setup file...
View ArticleHack the Zico2 VM (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as Zico2. The credit for making this vm machine goes to “Rafael” and it is another boot2root challenge, where we have to root the...
View ArticleMSSQL Peneration Testing using Nmap
Hello friends! Today we are going to perform Microsoft SQL penetration testing using NMAP scripts in order to retrieve basic information such as database name, usernames, tables name and etc from...
View Article4 Ways to Capture NTLM Hashes in Network
Hello friends! Today we are describing how to capture NTLM Hash in a local network. In this article we had captured NTLM hash 4 times through various methods. Before we proceed towards attacking...
View ArticleHack the Lazysysadmin VM (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as Lazysysadmin. The credit for making this vm machine goes to “Togie Mcdogie” and it is another boot2root challenge where we have...
View ArticleHack the Bulldog VM (Boot2Root Challenge)
Hello friends! Today we are going to take another CTF challenge known as Bulldog. The credit for making this vm machine goes to “Nick Frichette” and it is another Boot2root challenge. Our goal is to...
View ArticleHack the BTRSys: v2.1 VM (Boot2Root Challenge)
BTRSys is boot2root challenge developed by ‘ismailonderkaya’ in the series of BRTSys. This is an amazing lab for practice which has covered every technique. Difficulty level: Intermediate WalkThrough...
View ArticleHack the BTRSys1 VM (Boot2Root Challenge)
BTRSys v1 is another lab by ‘ismailonderkaya’ in the series BTRSys. This lab helps you sharpen your skills as a pentester. It is a must lab for a beginner. Difficulty level: Beginner WalkThrough Let’s...
View ArticleHack the RickdiculouslyEasy VM (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as RickdiculouslyEasy. The credit for making this vm machine goes to “Luke” and it is another capture the flag challenge. Our goal...
View ArticleHack the H.A.S.T.E. VM Challenge
Hello friends! Today we are going to take another CTF challenge known as ‘H.A.S.T.E.’. The credit for making this vm machine goes to “f1re_w1re” and it is a unique challenge as we just have to get a...
View ArticleComprehensive Guide to Sniffing
ARP Protocol The Address Resolution Protocol (ARP) is a communications protocol used for discovering the link layer address associated with a given Internet layer address, a critical function in the...
View ArticleMSSQL Penetration Testing with Metasploit
Hello friends today we are performing MSSQL penetration testing using metasploit framework in order to retrieve basic information such as database name, usernames, tables name and etc from inside SQL...
View ArticleHack the dina VM (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as dina. The credit for making this vm machine goes to “Touhid Shaikh” and it is another boot2root challenge where we have to root...
View ArticleWifi Post Exploitation on Remote PC
Hello readers! Today you will be learning about different ways to get basic service sets information of remote user’s Wi-Fi as well as current network connection information, and how to extract saved...
View ArticleExploiting Windows Machine with DDE Exploit
DDE stands for “dynamic Data Exchange”, this is a method used by windows to facilitate one program being able to subscribe to an item made using another program. This exploit uses that functionality to...
View ArticleExploiting Remote machine with Pastejacking
Pastejacking is a technique that takes over the clipboard of a machine, for instance, when we copy text from a website, that text can be riddled with malicious code that will execute when you paste...
View Article7 Ways to Privilege Escalation of Windows 7 PC
When you exploit the victim pc there would be certain limits which resist performing some action even after you are having the shell of victim’s pc. To get complete access of your victim pc; you need...
View ArticleMsfvenom Tutorials for Beginners
Hello friends!! Today we will learn to create payloads from a popular tool known as metasploit, we will explore various option available within the tool to create payloads with different extensions and...
View Article