Forensics Investigation of Ping Command
Introduction: When we say “ping,” we often are just limiting its definition to checking whether a host is alive or not. In my opinion, while this purpose is correct, its technical details are often...
View ArticleMultiple Ways to Persistence on Windows 10 with Metasploit
In this article, you will learn the multiple ways to maintain access or create a persistent backdoor with the help of the Metasploit Framework on the host machine which you have compromised. Table of...
View ArticleBeginners Guide to TShark (Part 1)
In this article, we will learn about TShark which is a well-known network protocol analyzer. It lets us capture the data packets, from the live network. It also allows us, to read or analyze the...
View ArticleSteal Windows Password using FakeLogonScreen
In this article, we are going to focus on a tool that caught my attention. This is a tool that creates a fake Windows Logon Screen and then forces the user to enter the correct credentials and then...
View ArticleBeginners Guide to TShark (Part 2)
In the previous article, we learned about the basic functionalities of this wonderful tool called TShark. If you haven’t read it until now. Click here. TL; DR In this part, we will the Statistical...
View ArticleMultiple Ways to Exploit Windows Systems using Macros
In this article, we will be exploring a total of 6 tools that can craft, encrypt and exploit a Windows Machine using malicious Macros. Table of Content Introduction What are Macros? Why Macros are...
View ArticleBeginners Guide to TShark (Part 3)
This is the third instalment in the Beginners Guide to TShark Series. Please find the first and second instalments below. Beginners Guide to TShark (Part 1) Beginners Guide to TShark (Part 2) TL; DR In...
View ArticleComprehensive Guide to tcpdump (Part 1)
In this article, we are going to learn about tcpdump. It is a powerful command-line tool for network packet analysis. Tcpdump helps us troubleshoot the network issues as well as help us analyze the...
View ArticleComprehensive Guide to tcpdump (Part 2)
In the previous article of tcpdump, we learned about some basic functionalities of this amazing tool called tcpdump. If you haven’t check until now, click here. Hence, in this part, we will cover some...
View ArticleComprehensive Guide to tcpdump (Part 3)
This is the third article in the Comprehensive Guide to tcpdump Series. Please find the first and second articles of the series below. Comprehensive Guide to tcpdump (Part 1). Comprehensive Guide to...
View ArticleSSH Penetration Testing (Port 22)
Probing through every open port is practically the first step hackers take in order to prepare their attack. And in order to work, one is required to keep their port open but at the same time, they are...
View ArticleComprehensive Guide on CryptCat
In this article, we will provide you with some basic functionality of CryptCat and how to get a session from it using this tool. Table of Content Introduction Chat Verbose mode Protect with Password...
View ArticlePenetration Testing on VoIP Asterisk Server
Today we will be learning about VoIP Penetration Testing this includes, how to enumeration, information gathering, User extension and password enumeration, sip registration hijacking and spoofing....
View ArticlePenetration Testing on VoIP Asterisk Server (Part 2)
In the previous article we learned about Enumeration, Information Gathering, Call Spoofing. We introduced a little about the Asterisk Server. This time we will focus more on the Asterisk Manager...
View ArticleDocker for Pentester: Pentesting Framework
As we all know, now that we live in the world of Virtualization, most of the organizations are completely reliable on virtual services to fulfil their hardware and software requirements, such as cloud...
View ArticlePenetration Testing on PostgreSQL (5432)
In this post, we will demonstrate how to set-up our own Vulnerable PostgreSQL for penetration testing on Ubuntu 20.04 and How to conduct PostgreSQL penetration testing. Table of Content Pre-requisites...
View ArticleFirewall Lab Setup: Untangle
What is a Firewall? a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes...
View ArticlePenetration Testing on CouchDB (5984)
What is CouchDB CouchDB is a Free and open-source fault-tolerant NoSQL database developed by Apache software foundation. It uses JSON, to store data, javascript as its query languages and It includes...
View ArticleDocker for Pentester: Image Vulnerability Assessment
We are moving from virtualization to containerization and we are all familiar with the container services such as docking or quay.io. You can pick a dock image for a particular application by selecting...
View ArticleAndroid Penetration Testing: Lab Setup
Does setting a Password or biometric security really protect your phone? Or are these things just only protect your mobile data from the attackers. From this article, we’ll learn how to set up a secure...
View Article