Tools

Best 20 Kali Linux Tools for Hacking and Penetration Testing

Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There are a variety of such hack tools available in the market. Some of them are open source while others are commercial. 1. Nmap Nmap or “Network Mapper” is tool used for information […]

Tutorials

[Metasploit] Upgrading Normal Command Shell to Meterpreter Shell

The Metasploit Framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. One of the best feature of Metasploit Framework is that you can easily upgrade your normal command shell payload into Meterpreter payload once the system has been exploited. Meterpreter is a Metasploit […]

Tutorials

How to use Proxychains in Kali Linux OS

There are a lot of hackers and crackers around the world, some are good, and some are evil. Hackers always want to be anonymous while doing their work. Tools can be used in order to hide the hacker’s identity from being exposed such as VPN (Virtual Private Network), Proxy Servers and RDP (Remote Desktop Protocol) […]

Tutorials

Exploitation of UnreaIIRCd 3.2.8.1 by using Metasploit and Perl Script

UnrealIRCd is an open source IRC daemon, originally based on DreamForge, and is available for Unix-like operating systems and Windows. Since the beginning of development on UnrealIRCd circa May 1999, many new features have been added and modified, including advanced security features and bug fixes, and it has become a popular server. [#1] Exploitation using […]

Tutorials

Connect Wi-Fi Network From Terminal – Kali Linux

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. Today we’ll show you a detailed step by step […]

Tutorials

CMS & Exploit Kit Detection with WhatCMS

In Internet, more than 70% websites are using ready-made open source CMS like WordPress/Joomla/Drupal etc because a CMS always makes your website easier to use, less expensive to maintain. As we all knows, CMS is a software that stores your web content, enables easy editing for web administrators/editors and allows multiple web administrators to log […]

Tutorials

DDOS a WiFi Network with MDK3 Tool in Kali Linux

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. MDK3 so called Murder Death Kill 3 is one of the most popular wireless hacking tool and specifically designed for WLAN Environments. The main operation of this tool is to flood the network with fake traffic against the network. This version of MDK3 […]

CTF Challenges

CTF – VulnOS2 – Walkthrough step by step

Today we would like to present VulnOS2 challenge walkthrough. We hope that all what will be done is clear for you. VulnOS2 is a boot to root virtual machine which is hosted on Vulnhub. VulnOS are a series of deliberately vulnerable operating systems packed as virtual images to enhance penetration testing skills Download Link – […]

CTF Challenges

CTF – Bulldog – Walkthrough step by step

We’re back with simple VulnHub CTF Walkthrough i.e. BULLDOG. We had a great time with this VM, and thought it was really fun and different from the others we’ve worked on so far. Download Link – https://www.vulnhub.com/entry/bulldog-1,211/ Releasing Date – 28th August 2017 Size – 761MB Format – OVA (Virtual Box) Operating System – Linux […]

Tutorials

PHP CGI Argument Injection With Metasploit Framework

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. When PHP is used in a CGI-based setup (such as Apache’s mod_cgid), in some configurations it’s possible to execute arbitrary code with the privileges of the web server. More about this Vulnerability –  When run […]

Tutorials

HTTP PUT Method Exploitation – Live Penetration Testing

In this article, we’ll be exploiting the HTTP PUT method vulnerability on one of the Metasploitable2 webserver through which you can easily upload any malicious file onto the server and can gain the access of the whole webserver in meterpreter shell. In last article, we’ve already learnt that how to Test HTTP Methods with Curl, […]

Tech Articles

Top 10 Penetration Testing Distributions – 2018 Update

For those who are interested in learning how to do Penetration Testing, there are many tools and operating  systems are available, but very few targets to practice against safely – not to mention legally. For many, learning penetration tactics has been through attacking systems on the Internet. While this might provide a wealth of opportunities and […]

Tutorials

Crack WPA2-PSK with Aircrack – Dictionary Attack Method

WPA/WPA2 vastly improves the security of wireless networks; however, the extra protection comes at the price of added complexity to the protocol. Although WPA was developed with security in mind, it does have its own flaws that we can take advantage of. At a high level, WPA attacks can be broken down into two categories: attacks against authentication and […]