Tutorials

Armitage – In-depth Windows Exploitation (GUI) – 2017

It’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors. To see how easily tools like Metasploit Framework can remotely exploit Windows vulnerability, we’ll use the GUI version of Metasploit Framework which is so called as […]

Tutorials

Pentesting Windows 2000/2003 Server with Metasploit Framework – Detailed Tutorial

This is a very detailed step by step tutorial on How to pentest a Remote PC (Windows 2000/2003 server) with Metasploit Framework. We’ve used Kali Linux 2017.1 and Windows 2000 server in a virtual environment (VMware Workstation). The ease of pen testing is scary and readers, sysadmins are advised to update their Windows 2000/2003 server […]

Books

5 Books Considered the “Best Nmap Books Ever Written”

Nmap (Network Mapper) is a security scanner, originally written by Gordon Lyon used to discover hosts and services on a computer network, thus building a “map” of the network. Typical uses of Nmap: Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it. Identifying […]

Tech Articles

Nmap gets a new look and feel with NMapGUI

NMapGUI is an advanced graphical user interface for NMap network analysis tool. It allows to extend and ease the typical usage of NMap by providen a visual and fast interface with the application. Features of NMapGUI –  Cross-platform (You can use it on Linux, Windows, MacOs, etc.) Multiple command execution at the same time. Standard […]

Tech Articles

Penetration Testing Quick Cheatsheet v1.0 – 2017

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Here we’re listing out the quick cheatsheet and commands of all pen test phases. 1) Reconnaissance: Normally no active tests are performed on targets. At this phase google is […]