Multiple ways to Connect Remote PC using SMB Port
In this article, we will learn how to connect with victim’s machine via SMB port 445, once you have collected username and password to your victim’s PC. To know how collect username and passwords to...
View ArticleWindow Privilege Escalation via Automated Script
We all know that, after compromising the victim’s machine we have a low-privileges shell that we want to escalate into a higher-privileged shell and this process is known as Privilege Escalation. Today...
View ArticleWindows Kernel Exploit Privilege Escalation
Hello Friends!! In our previous article we had discussed “Vectors of Windows Privilege Escalation using automated script” and today we are demonstrating the Windows privilege escalation via Kernel...
View ArticleMultiple Ways to Bypass UAC using Metasploit
Hello friends!! Today we are shading light on User Account Control shortly known as UAC. We will also look how it can potentially protect you from malicious software and ignoring UAC prompt can trouble...
View ArticleMultiple Ways to Secure SSH Port
Secure Shell (SSH) is defined as a network protocol to operate network services securely over an unsecured network. The standard TCP port for SSH is 22. The best application of SSH is to remotely login...
View ArticleMultiple Ways to Detect HTTP Options
Hi Friends, today we will walkthrough various HTTP Protocol methods and the tools used to extract those available HTTP methods in a web server. As we are already aware that the HTTP protocol comprises...
View ArticleMultiple Ways to Exploiting PUT Method
Hi Friends, today’s article is related to exploiting the HTTP PUT method vulnerability through various techniques. First we will determine if the HTTP PUT method is enabled on the target victim...
View ArticleHacking with Empire – PowerShell Post-Exploitation Agent
Hello everyone and welcome to this beginner’s guide to Empire. According to their official website: “Empire is a pure PowerShell post-exploitation agent” built on cryptologically-secure communications...
View ArticleComprehensive Guide to Dirb Tool
In this article, we are focusing on transient directory using Kali Linux tool DIRB and trying to find hidden files and directories within a web server. A path traversal attack is also known as...
View ArticleMagic Unicorn – PowerShell Downgrade Attack and Exploitation tool
Magic Unicorn is a simple tool for using a PowerShell downgrade attack and injects shellcode straight into memory. Based on Matthew Graeber’s powershell attacks and the powershell bypass technique...
View ArticleComprehensive Guide to Gobuster Tool
Hello Friend!! Today we are going demontrate URLs and DNS brute force attack for extracting Directtories and files from inside URLs and subdomains from DNS by using “Gobuster-tool”. Table of Content...
View ArticleMeterpreter File System Commands Cheatsheet
Hey Friends! Did you know that meterpreter is known as Hacker’s Swiss Army Knife!! Well! Know you do. Meterpreter, a highly developed payload that can be extended dynamically, is known to be Hacker’s...
View ArticleLinux Privilege Escalation via Automated Script
We all know that, after compromising the victim’s machine we have a low-privileges shell that we want to escalate into a higher-privileged shell and this process is known as Privilege Escalation. Today...
View ArticleComprehensive Guide on SearchSploit
Hello friends!! Several times you might have read our articles on CTF challenges and other, where we have used searchsploit to find out an exploit if available in its Database. Today in this article we...
View ArticleComprehensive Guide on MSFPC
Hello Friends!! As you all are aware of MSFvenom-A tool in Kali Linux for generating payload, is also available as MSFvenom Payload Creator (MSFPC) for generating various “basic” Meterpreter payloads...
View ArticleXerosploit- A Man-In-The-Middle Attack Framework
Networking is an important platform for an Ethical Hacker to check on, many of the threat can come from the internal network like network sniffing, Arp Spoofing, MITM e.t.c, This article is on...
View ArticleHack the Box: Bounty Walkthrough
Today we are going to solve another CTF challenge “Bounty”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticleComprehensive Guide on Hydra – A Brute Forcing Tool
Hello friends!! Today we are going to discuss – How much impactful hydra is in cracking login credential of various protocols to make unauthorized access to a system remotely. In this article we have...
View ArticleComprehensive Guide on Medusa – A Brute Forcing Tool
Hello friends!! Today we are going to discuss – How much impactful Medusa is in cracking login credential of various protocols to make unauthorized access to a system remotely. In this article we have...
View ArticleWeb Proxy Penetration Lab Setup Testing using Squid
In this article we are going to setup Squid to use it as a Proxy Server on Ubuntu/Debian machines and will try to penetrate it. Table of content Introduction to Proxy Setting Squid Proxy Installation...
View Article