Custom Reverse Shell Backdoor for WIN/LIN/MAC
Python in penetration testing and you may use or tune the code for a real world case. Plus you will be aware of the effectiveness of...
Hacking a Web Server with Armitage
Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits. It is a...
Using ProxyStrike to Detect SQL Injection
I've touched on exploiting SQL Injection in previous blog posts. I gave some tips on how to manually test inputs for sql injection, but...
Exploiting a Remote System using a Rootkit
Tools Used: Backtrack R5 Windows XP Home SP1 (Due to lack of exploit updates on my system for win 7) Beast v2.07 Trojan Horse ...
Install Angry IP Scanner on Kali Linux
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It is a...
Creation of Portable Hacking Machine using Raspberry Pi
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the...
Going Ghost by IP Spoofing in Kali Linux with torsocks
torsocks allows you to use most applications in a safe way with TOR. It ensures that DNS requests are handled safely and explicitly...
Information Gathering with Maltego in Kali Linux
Maltego is an open source intelligence and forensics application. This is a GUI tool so looks different. Maltego is an information...
Changing File Permissions on a Computer
Alright, So I have taught you how to remote hack a computer, network, firewall, websites, etc.. All that good stuff! Once entering a...
Professional Penetration Testing: Hack Web Servers from Database to SSH
Proactively Identify and Address All OWASP Top 10 Threats The Core Impact Web Application Rapid Penetration Test (RPT) automates and...