Socks Proxy Penetration Lab Setup using Microsocks
Hello friends!! In our previous article we have discussed “Web Proxy Penetration Lab Setup Testing using Squid” and today’s article we are going to setup SOCKS Proxy to use it as a Proxy Server on...
View ArticleComprehensive Guide on Cewl Tool
Hello Friends!! In this article we are focusing on Generating Wordlist using Kali Linux tool Cewl and learn more about its available options. Table of Content Introduction to Cewl Default Method Save...
View ArticleComprehensive Guide on Dirbuster Tool
In this article, we are focusing on transient directory using Kali Linux tool Dibuster and trying to find hidden files and directories within a web server. Table of Content What is DirBuster Default...
View ArticleComprehensive Guide on Cupp– A wordlist Generating Tool
Hello Friends!! Today we are going explore the function of Cupp which is an authoritative tool that creates a wordlist especially particular for a person that can be use while making brute force attack...
View ArticleComprehensive Guide on Pydictor – A wordlist Generating Tool
In this article we will explore another dictionary building tool “Pydictor”. These tools are always fun to work with, this is another robust tool perfect for generating custom dictionaries. The thing...
View ArticleComprehensive Guide on Dymerge
Hello friends! This article is comprehensive guide on the Dymerge tool. This is a handy little tool that helps you manage all the dictionaries that you’ve created reading through our blog and using all...
View ArticleComprehensive Guide on Ncrack – A Brute Forcing Tool
In this article we will be exploring the topic of network authentication using Ncrack. Security professionals depends on Ncrack while auditing their clients. The tools is very simple, yet robust in...
View ArticleMultiple Ways to Exploit Tomcat Manager
Hello Friends, today through this article I would like to share my experience “how to exploit Tomcat Manger Application” if you have default login credential (tomcat: tomcat). While playing CTF, many...
View ArticleMultiple Ways To Exploiting HTTP Authentication
In this article, we will learn about how to configure the password protected Apache Web Server to restrict from online visitors without validation so that we can hide some essential and critical...
View ArticleDefend against Brute Force Attack with Fail2ban
Daily we hear some news related to cybercrime just, like, some malicious users or bots has successfully defaced some publicly accessible website or some services. As we always try to explain through...
View ArticleA Little Guide to SMB Enumeration
Enumeration is very essential phase of Penetration testing, because when a pentester established active connection with victim, then he try to retrieve as much as possible information of victim’s...
View ArticleExploiting Jenkins Groovy Script Console in Multiple Ways
Hello Friends!! There were so many possibilities to exploit Jenikins however we were interested in Script Console because Jenkins has lovely Groovy script console that permits anyone to run arbitrary...
View ArticlePenetration Testing on Group Policy Preferences
Hello Friends!! You might be aware of Group Policy Preferences in Windows Server 2008 that allows system administrators to set up specific configurations. It can be used to create username and...
View ArticleSMTP Log Poisioning through LFI to Remote Code Exceution
Hello friends!! Today we will be discussing on SMTP log poisoning. But before getting in details, kindly read our previous articles for “SMTP Lab Set-Up” and “Beginner Guide to File Inclusion Attack...
View ArticleSMB Penetration Testing (Port 445)
In this article, we will learn how to gain control over our victim’s PC through SMB Port. There are various ways to do it and let take time and learn all those, because different circumstances call for...
View ArticleWindows Applocker Policy – A Beginner’s Guide
Hello Friends!! This article is based on “Microsoft Windows – Applocker Policy” and this topic for System Administrator, defines the AppLocker rules for your application control policies and how to...
View ArticleKoadic – COM Command & Control Framework
Hello friends!! In this article we are introducing another most interesting tool “KOADIC – COM Command & Control” tool which is quite similar to Metasploit and Powershell Empire. So let’s began...
View ArticleConfigure Sqlmap for WEB-GUI in Kali Linux
Hello everyone and welcome to this tutorial of setting up SQLMAP for web-gui. Web-GUI simply refers to the interface that a browser provides you over the http/https service. SQLMAP is a popular tool...
View ArticleGet Reverse-shell via Windows one-liner
This article will help those who play with CTF challenges, because today we will discuss “Windows One- Liner” to use malicious commands such as power shell or rundll32 to get reverse shell of the...
View ArticleBypass Application Whitelisting using msiexec.exe (Multiple Methods)
In our previous article, we had discussed on “Windows Applocker Policy – A Beginner’s Guide” as they defines the AppLocker rules for your application control policies and how to work with them. But...
View Article