You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

hackers

  1. x32x01

    15 Powerful Gadgets For Ethical Hackers | Hardware Tools for Hackers in 2021

    Our in this platform we usually talk about various applications and their uses to check loopholes on systems. But penetration testers not only uses software applications, they also need some hardware to perform the tasks. In this detailed article we are going to cover hardware devices & gadgets...
  2. x32x01

    Evil Twin Attack with DNSMASQ - Wireless WPA2-PSK Cracking

    Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless network. They amplify their signal in a way where the client will automatically connect to them because the beacons are faster...
  3. x32x01

    Exploit Windows with Malicious MS-OFFICE File [Metasploit Framework]

    Metasploit has for years supported encoding payloads into VBA code. (VBA, or Visual Basic for Applications, is the language that Microsoft Office macros are written in.) Macros are great for pentesters, since they don’t rely on a specific version, and they are a supported method of code...
  4. x32x01

    Create a Fake AP with DNSMASQ and HOSTAPD [Kali Linux]

    Do you ever think twice before connecting to a free public wireless hotspot at a coffee shop, airport, or hotel? Did you ever stop to wonder if the public Wi-Fi hotspot you just connected to is a legitimate one, or if it might be an Evil Twin hotspot in disguise? After setting up the fake AP...
  5. x32x01

    Sniffing with Rogue Access Point [DNSMASQ and TCPFLOW]

    Wireless networking is a complex field.With countless standards, protocols, and implementations, it is not uncommon for administrators to encounter configuration issues that require sophisticated troubleshooting and analysis mechanisms. Traditional network sniffing on an Ethernet network is...
  6. x32x01

    Live Packet Sniffing with Python [Search][Post Data]

    A sniffer is a program that monitors data traveling over a network. Unauthorized sniffers are dangerous to network security because they are difficult to detect and can be inserted almost anywhere, which makes them a favorite weapon of hackers. When used by malicious individuals, sniffers can...
  7. x32x01

    CTF - Billu B0x - Walkthrough step by step

    Billu:B0x VM is created by one of the most popular Indian Ethical Hacker named as “Manish Kishan Tanwar” (a.k.a Indishell Hacker) who has created so many web shells in PHP language hosted at Github.com. Download VM Link – https://www.vulnhub.com/entry/billu-b0x,188/ The very first step is to...
  8. x32x01

    Live Detection and Exploitation of WordPress xmlrpc.php File

    Being as popular cms, it is no surprise that WordPress is often always under attack. Some 70% of Techno’s top 100 blogs are using WordPress as a Content Management System. XML-RPC on WordPress is actually an API (Application program interface), remote procedure call which gives developers who...
  9. x32x01

    Palo Alto (PAN-OS) Exploitation CVE-2017-15944 - Live Demonstration

    Last year, a critical remote code execution vulnerability was found in Palo Alto Network Firewalls by Philip Pettersson. Palo Alto Network Firewalls has a component called as PAN-OS whose versions 6.1.18, 7.0.18, 7.1.13, 8.0.5 and earlier versions are core affected with this vulnerability. Palo...
  10. x32x01

    Get Free Public Wi-Fi - Bypass Mac Filtering

    Most of the time, you’re probably okay if you accidentally hit “Connect” on Free Public WiFi, as you’re just trying to connect to a machine that’s unwittingly rebroadcasting its own inability to connect. But most of the public WiFis are not working due to Mac Filtering, which means the MAC...
  11. x32x01

    Sniffing with Xerosploit - An Advanced MITM Framework

    Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. With the help of Xerosploit, you can...
  12. x32x01

    DDOS a WiFi Network with MDK3 Tool in Kali Linux

    MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. MDK3 so called Murder Death Kill 3 is one of the most popular wireless hacking tool and specifically designed for WLAN Environments. The main operation of this tool is to flood the network with fake traffic...
  13. x32x01

    Bypass HacktheBox.eu Invite Registration

    Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests. It contains several challenges that are constantly updated. Some of them simulating real world scenarios and some of them leaning...
  14. x32x01

    Man in the Middle Attack with Websploit Framework

    We assume most of you know what a Man in the Middle (MitM) attack is, but below is a diagram of a Man in the Middle attack. A man-in-the-middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and...
  15. x32x01

    SEToolkit – Credential Harvester Attack [Tutorial]

    As a penetration tester there will be times that the client requirements will be to perform social engineering attacks against their own employees in order to test if they follow the policies and the security controls of the company. After all if an attacker fails to gain access to a system then...
  16. x32x01

    Armitage - In-depth Windows Exploitation (GUI)

    It’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors. To see how easily tools like Metasploit Framework can remotely exploit Windows vulnerability, we’ll use the GUI version of Metasploit Framework...
  17. x32x01

    Yuki Chan - The Automated Penetration Testing Tool - Kali Linux 2021

    The Yuki Chan is an Automated Penetration Testing tool through which you can easily audit any website and gather all possible information like website enumeration, ssl security auditing etc. Features Fully Automated Tool Intel-Gathering with smart search Complete Vulnerability Analysis Full...
  18. x32x01

    DKMC – Another Wonderful Malicious Payload Evasion Tool (Windows Hacking)

    Windows would be one of our common targets, since it is the most used operating system in the corporate environment. Since most of you are familiar with Windows, it would be easy to enumerate it. Our main goal is to generate a malicious payload with the help of DKMC (Don’t kill my cat) which is...
  19. x32x01

    Hack Windows/Linux using ARCANUS Framework – 100% FUD

    ARCANUS is a customized payload generator/handler for penetration testing only. You can easily generate a payload for both OS i.e. Windows and Linux distributions with just a single click. The latest version of ARCANUS FRAMEWORK is 1.5.6. Previously we discussed the same method with CHAOS...
  20. x32x01

    Hack a website with Ngrok, Msfvenom and Metasploit Framework

    In a recent survey, only 15% of business owners saw security as a challenge when more than half had reported being hacked and of that, only 6% of small businesses don’t have anyone handling their online security. More people have access to the internet than ever before. This has prompted many...
Top