Find Open Ports in Kali Linux with Netstat Utility

A port scan sends client requests to a server port addresses on a host for finding an active port. The design and operation of the Internet is based on TCP/IP. A port can have some behavior like…

Read more

SQL Injection – A Complete Understanding Tutorial

SQL injection is an attack to circumvent scripts using SQL queries, as is often the case on websites, and especially for user authentication systems. [#] Introduction – SQL, or Structured Query Language, is…

Read more

SEToolkit – Credential Harvester Attack [Tutorial]

As a penetration tester there will be times that the client requirements will be to perform social engineering attacks against their own employees in order to test if they follow the policies and…

Read more

TCP & SYN Scanning with Metasploit Framework without NMAP

Port Scan is Often done by hackers and penetration testers to identifying and discovering internal services of target host. Port Scanning is an important action for gathering more information of the target host….

Read more

Armitage – In-depth Windows Exploitation (GUI) – 2017

It’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors. To see how easily…

Read more

Capture Handshake Address with Airodump-ng and Aireplay-ng

You can easily capture the handshake address with the help of Airodump through which we’ll monitor all the wireless stations and to deauthenticate the station, we’ll use Aireplay package which both are pre-installed…

Read more

Pentesting Windows 2000/2003 Server with Metasploit Framework – Detailed Tutorial

This is a very detailed step by step tutorial on How to pentest a Remote PC (Windows 2000/2003 server) with Metasploit Framework. We’ve used Kali Linux 2017.1 and Windows 2000 server in a…

Read more

Maintaining Access with Web Backdoors [Weevely]

Once a web server and its services have been compromised, it is important to ensure that secure access can be maintained. This is usually accomplished with the aid of a web shell—a small program…

Read more

Wi-Fi deauthentication attack against 802.11 protocol

A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point. The final attack against wireless networks that we’ll evaluate is the…

Read more

Bypass Hidden SSID in a Wireless Network [Full Proof Method]

ESSID(Extended Service Set Identifier) is the sequence of characters that uniquely identify a wireless local area network. Hiding the ESSID is a poor method of attempting to achieve security through obscurity; unfortunately, the…

Read more

Install and Configure TOR in Kali Linux [2017]

Tor (www.torproject.org) is an open source implementation of the third generation onion routing that provides free access to an anonymous proxy network. Onion routing enables online anonymity by encrypting user traffic and then…

Read more

[Solution] SSL Handshake Alert Error – Burp Suite

Web Application Proxies like Burp Proxy, WebScarab or Tamper Data Addon allow a security tester to intercept the requests/responses between the client HTTP application and the web server. Proxies are the fundamental for…

Read more

Submit your website to Google Search Engine – Two Ways

There is no doubt that the advent of the Internet has sparked a revolution in how we share information as families, businesses, and world citizens. Perhaps the most important technological invention since the…

Read more

Use Meta tags to increase traffic from Targeted Countries

A website’s rankings are not going to magically improve. New websites are not going to instantly have thousands of visitors. This is online reality. But there is something you can do about it. Search Engine Optimization…

Read more

Parameth – a tool for brute discover GET/POST Parameters

Parameth is an open source tool developed by maK- (obviously a l33t name) through which you can easily find GET and POST URLs by a single command. Often when you are busting a directory…

Read more

List all installed programs, version & path [Windows]

WMIC is the console version of Windows Managament Instrumentation which is available from windows 2000 onwards. By Typing “wmic product get name” will shows you a list of all application names which is…

Read more

Find a Website IP with Python2 and Python3 – [5 Examples]

Python is an interpreted, object-oriented, high-level programming language. Python can be ran on almost any OS. While it is not native to Windows machines, it is native to most Linux distributions. The great…

Read more

OSCP – Notes – Part 1

OSCP(Offensive Security Certified Professional) is one of the most popular certification meant for only Penetration Testers. The fees for this certification starts from USD 800 which includes hands-on material + 30 day training…

Read more

Find Real IP behind CloudFlare with CloudSnare Python Script

CloudFlare is one of the most popular CDN provider who offers a complete package of WAF i.e. Web Application Firewall and DDOS Protection (Distributed Denial of Service) for websites. List of Features –…

Read more

Yuki Chan – The Automated Penetration Testing Tool – Kali Linux 2017.2

The Yuki Chan is an Automated Penetration Testing tool through which you can easily audit any website and gather all possible information like website enumeration, ssl security auditing etc. Features – Fully Automated…

Read more

Simple and Target Mac Flooding [Kali Linux 2017.2]

The idea behind a MAC flooding attack is to send a huge amount of ARP replies to a switch, thereby overloading the cam table of the switch. Once the switch overloads, it goes…

Read more

DKMC – Another Wonderful Malicious Payload Evasion Tool (Windows Hacking)

Windows would be one of our common targets, since it is the most used operating system in the corporate environment. Since most of you are familiar with Windows, it would be easy to…

Read more