Krack Attack – Core Protocol Level Attack in WPA2 Wi-Fi Network

WPA2 Protocol is one of the most using protocol for Wireless networks now a days but due to latest research, WPA2 can easily be cracked and the handshake traffic can be manipulated to…

Read more

Parameth – a tool for brute discover GET/POST Parameters

Parameth is an open source tool developed by maK- (obviously a l33t name) through which you can easily find GET and POST URLs by a single command. Often when you are busting a directory…

Read more

List all installed programs, version & path [Windows]

WMIC is the console version of Windows Managament Instrumentation which is available from windows 2000 onwards. By Typing “wmic product get name” will shows you a list of all application names which is…

Read more

Find a Website IP with Python2 and Python3 – [5 Examples]

Python is an interpreted, object-oriented, high-level programming language. Python can be ran on almost any OS. While it is not native to Windows machines, it is native to most Linux distributions. The great…

Read more

OSCP – Notes – Part 1

OSCP(Offensive Security Certified Professional) is one of the most popular certification meant for only Penetration Testers. The fees for this certification starts from USD 800 which includes hands-on material + 30 day training…

Read more

Find Real IP behind CloudFlare with CloudSnare Python Script

CloudFlare is one of the most popular CDN provider who offers a complete package of WAF i.e. Web Application Firewall and DDOS Protection (Distributed Denial of Service) for websites. List of Features –…

Read more

North Korea vs USA – a Cyber War has been started

North Korea which is a democratic country located in East Asia whose capital is Pyongyang is continuously testing his hydrogen and nuclear bombs. As war of words heats up, even US President i.e….

Read more

Yuki Chan – The Automated Penetration Testing Tool – Kali Linux 2017.2

The Yuki Chan is an Automated Penetration Testing tool through which you can easily audit any website and gather all possible information like website enumeration, ssl security auditing etc. Features – Fully Automated…

Read more

Top 18 PHP Code Analysis Resources – 2017 Compilation List

As you all knows PHP is one of the most popular server side language and is widely used open source general purpose scripting language that is specially suited for web development and can…

Read more

Simple and Target Mac Flooding [Kali Linux 2017.2]

The idea behind a MAC flooding attack is to send a huge amount of ARP replies to a switch, thereby overloading the cam table of the switch. Once the switch overloads, it goes…

Read more

DKMC – Another Wonderful Malicious Payload Evasion Tool (Windows Hacking)

Windows would be one of our common targets, since it is the most used operating system in the corporate environment. Since most of you are familiar with Windows, it would be easy to…

Read more

Automated MITM Attack with MitmAP Python Script

Wireless networks were first introduced in 1991. The wireless networking is an invention that makes it possible to transfer data packets over standard network protocols: the only difference is that it uses radio…

Read more

Kali Linux 2017.2 Updated and Newly Added Tools List

Kali Linux 2017.2 was released on September 20, 2017. This release is a roll-up of all updates and fixes since our 2017.1 release in April. More than a dozen Open Source tools present on GitHub…

Read more

Kali Linux 2017.2 has been released with new tools

Kali Linux is a Debian-based distribution with a collection of security and forensics tools. The new version of Kali Linux i.e. 2017.2 is already been out with awesome features and is available for…

Read more

MSFvenom Payload Creator (MSFPC) – Installation and Usage

With the help of MSFPC, you can quickly generate the payload based on msfvenom module which is a part of Metasploit Framework. So MSFvenom Payload Creator is a simple wrapper to generate multiple…

Read more

CCLEANER Hacked ! – Affected 20 Million Users Worldwide

CCleaner is one of the most popular tool for cleaning for your PC. It makes it easy to speed up a slow computer and keep your activity private — automatically and in the…

Read more

Meterpreter Commands in Detail 2017 – Metasploit Framework

After a successful exploit a Meterpreter shell allows you to perform many different functions along with a full remote shell. Meterpreter is great for manipulating a system once you get a remote connection,…

Read more

MYSQL Command Line Tutorial – Kali Linux

As you all knows, Kali Linux is one of the most popular penetration testing operating system having more than 400+ hacking tools pre-installed in it. Kali is the latest and greatest version of…

Read more

About Wireshark – A Packet Sniffer and its Components

The purpose of this article is to introduce the most popular packet sniffer i.e. WIRESHARK.  The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As…

Read more

Vevo Hacked by OurMine – 3.12TB data leaked

OurMine Group (Saudi Arabian Hacking Group) is now back and has claimed the responsibility for the breach of Vevo which is the most popular online video streaming service. Even Vevo.com is now not…

Read more

Steal Windows Product Key Remotely with Metasploit Framework

As discussed previously, we had successfully exploited a windows machine with Metasploit Framework and created an administrator user in targeted machine. Now in this article, we’ll another exploit which steals the Windows Product…

Read more

Use Keylogger in Metasploit Framework

Sometimes a penetration tester may have remote access to a user’s machine, but he may not have the user’s password. Maybe the user has a very long complex password that would just take…

Read more