Tutorials

Generate & Compare Hash with Windows PowerShell

A hash is always a useful when you need to verify the integrity of any file. To check the integrity of your system, you can create a baseline of file hashes, and periodically check for changes against the baseline. Powershell makes checking the integrity of multiple files very easy by combining Get-ChildItem (or dir/ls)with Get-Filehash. […]

Tutorials

5 Most Commonly Used Nmap Commands

Nmap supports many scanning technologies, such as: UDP, TCP connect(), TCP SYN (half-open scan), ftp proxy (bounce attack), reverse flag, ICMP, FIN, ACK scan, Xmas Tree, SYN Scan and null scan. Nmap also provides some advanced features, such as: detecting operating system types through TCP/IP stack features, secret scanning, dynamic delay and retransmission calculations, parallel […]

Tutorials

Dump All Wi-Fi Passwords with Windows PowerShell

Wireless technology has become increasingly popular as it allows you to easily access the Internet from all sorts of locations around the world without requiring a network cable. But a wireless network isn’t always secure if you don’t understand its dangers, and especially if precautions are not taken. As with any tool as versatile as […]

Tutorials

Exploitation of Opendreambox – Remote Code Execution

The OpenDreambox project aims to bring an open and extensible image to the Dreambox receivers and to provided viable alternatives to other images that are kept closed-source by their authors. In this OpenDreambox Project, there is a webadmin module which is vulnerable to Remote Code Execution vulnerability through which you can perform command injection via […]

Tutorials

Simple Backup Script with Cronjob

If you are using somehow a managed or unmanaged VPS server then this article will definitely helps you to create a backup of your webserver on schedule basis with the help of cronjob. In this article, we’re going to show you how to use tar for Backup Files and Directories in Linux along with automatic scheduling […]

Tutorials

Getting Reverse Shell with PHP, Python, Perl and Bash

As part of a security audit, evaluation, and “pentesting“, a command execution vulnerability may be discovered (RCE – Remote Command Execution). The listener quickly needs to have a full interactive shell depending on the complexity/difficulty of exploiting the discovered RCE. Obtaining a reverse-shell depends heavily on the distribution/OS deployed on the target machine. For all […]

Tutorials

Top 10 cURL Commands Which You Need To Know

cURL is the magical utility that allows developers to download a URL’s content, explore response headers, get stock quotes, confirm our GZip encoding is working, and much more. One more great usage of cURL for command line is POSTing form data to a server, especially while testing moderate to advanced form processing. And just like […]