Tutorials

Bruteforce Password Cracking with Medusa – Kali Linux

In Greek mythology, Medusa was a monster, a Gorgon, generally described as a winged human female with living venomous snakes in place of hair. Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. Download Link – http://www.foofus.net/jmk/tools/medusa-2.0.tar.gz The author considers following items […]

Tutorials

CMS & Exploit Kit Detection with WhatCMS

In Internet, more than 70% websites are using ready-made open source CMS like WordPress/Joomla/Drupal etc because a CMS always makes your website easier to use, less expensive to maintain. As we all knows, CMS is a software that stores your web content, enables easy editing for web administrators/editors and allows multiple web administrators to log […]

Tutorials

Crimemail CTF Writeup – Solution

This Crimemail CTF is brought you by InSecurity, a student society from INSA Lyon (France). The Flag format should be look like INSA{…} Collins Hackle is a notorious bad guy who is behind in this CTF. Challenge – Your challenge is to bypass the Login page and capture the flag. Hint: His password’s md5 is […]

Tutorials

Th3Inspector – Open Source Information Gathering Tool

Within the vast sea of the Internet, targets are easy to find. Most all networks advertise the Internet service provider (ISP) they depend on as well as their design, configuration, hardware types, and potentially vulnerable holes. Keep in mind that most of the normal discovery techniques for information gathering are noninvasive and usually are no more illegal then rattling […]