Jenkins Pentest Lab Setup
Hey! You all know that we have performed so many CTF challenges and we got to know about Jenkins there. So let’s know about Jenkins better. For this, we are here with the new challenges which you will...
View ArticleEvilginx2- Advanced Phishing Attack Framework
This is the successor of Evilginx 1, and it stays in-line with the MITM lineage. This tool is designed for a Phishing attack to capture login credentials and a session cookie. Table of Content...
View ArticlePenetration Testing on Splunk
In this article, we are going to exploit SPLUNK using the reverse shell. One can find this beneficial in exploiting and do penetration testing of SPLUNK environment of their respective IT...
View ArticleBeginner’s Guide to Nexpose
In this article, we’ll learn about Nexpose, which is used to scan a vulnerability network. There are various vulnerability scanners but the part that keeps it special is its smooth user interface and...
View ArticleShellphish: A Phishing Tool
Shellphish is an interesting tool that we came across that illustrates just how easy and powerful phishing tools have become today. The tool leverages some of the templates generated by another tool...
View ArticleRetina: A Network Scanning Tool
In this article, we will learn how to use retina, “a vulnerability scanner” to our best of advantage. There are various network vulnerability scanners, but Retina is the industry’s most powerful and...
View ArticleEvilOSX-RAT for MacOS/OSX
In this article, we will learn to use EvilOSX tool which is a Remote Administrator tool (RAT ) for initializing foothold on MacOS/OSX like platform. It can dramatically increase access in a matter of...
View ArticleExifTool : A Meta-Data Extractor
In this article, we’ll discover various methods to read, write and manipulate the meta-data information recorded in a variety of file types. In order to achieve this, we’ll be using a tool known as...
View ArticleComprehensive Guide to Steghide Tool
In this article, we’ll learn about Steghide. There are various steganography tools available but the part that differentiates it is that it uses a variety of algorithms to encrypt the data. Moreover,...
View ArticleDradis: Reporting and Collaboration Tool
Hello friends, today in this article we are going to familiarize you with one of the most vital tools of kali that everybody needs in today’s era. Eliminating bugs or finding any issue, is used to...
View ArticleWordPress: Reverse Shell
This post is related to WordPress security testing to identify what will be possible procedure to exploit WordPress by compromising admin console. We have already setup WordPress in our local machine...
View ArticleApache Tomcat Penetration Testing Lab Setup
In this article, we will learn the process of installing an Apache Tomcat on any Linux Machine. We will also learn how to gain control over our victim’s PC through exploiting Apache Tomcat....
View ArticleDocker Installation & Configuration
Docker services are extensively used in IT operations, so it is very important that you start learning from docker basics. In this article, we will cover the installation and setup of the docker, along...
View ArticleMulti Ways to Setup Cloud Pentest Lab using OwnCloud
This article is all about setting up a Private Cloud on your local machine on ubuntu, docker and VM. But before it is installed and configured, you should know what the cloud is and why it is a very...
View ArticleMulti Ways to Crack Windows 10 Password
In this article, you will learn the multiple ways to recover/reset/crack the password when you don’t have access to the machine or you forgot the login password of window 10. Security is important for...
View ArticleMultiple Methods to Bypass Restricted Shell
We all know the Security Analyst-Hacker relationship is like “Tom & Jerry” where one person takes measures to step-up the security layer and another person tries to circumvent it. The same...
View ArticleWeb Application Pentest Lab Setup on AWS
Isn’t it going to be nice if you can reach your pen-testing lab from all over the world? As we all know, this is a digital age that makes life easier than our expectations, thus anyone can access their...
View ArticleMultiple Ways to Install Kali
In this article, we will learn how to open the magic box of ethical hacking. Can you guess the name of that box? Ok, I tell you the name is KALI the magic box of ethical hacking. Through this article,...
View ArticleHiding Shell using PrependMigrate -Metasploit
In this article, you will get to know about the strength of mfsvenom along with PrependMigrate. You will also learn how to migrate the created payload into processes currently running on the targeted...
View ArticleSSH Penetration Testing (Port 22)
Probing through every open port is practically the first step hackers take in order to prepare their attack. And in order to work, one is required to keep their port open but at the same time, they are...
View Article