hacking

  1. x32x01

    Encrypted Reverse Shell for Pentester

    Reverse shell that is generally used in the wild are prone to sniffing attacks as the communication that happens between the attacker and the victim machine is clear text-based communication. This creates an issue as if the Security Administrators that are responsible for the protection of the...
  2. x32x01

    Wireshark For Pentester: A Beginner’s Guide

    Wireshark is an open-source application and it is the world’s foremost and widely-used network protocol analyzer that lets you see what’s happening on your network at a microscopic level. Just Because it can drill down and read the contents of each packet, it’s used to troubleshoot network...
  3. x32x01

    Wireshark for Pentester: Password Sniffing

    Many people wonder if Wireshark can capture passwords. The answer is undoubtedly yes! Wireshark can capture not only passwords, but any type of data passing through a network - usernames, email addresses, personal information, pictures, videos, or anything else. Wireshark can sniff the passwords...
  4. x32x01

    A Beginner’s Guide to Buffer Overflow

    In this guide, we are going to learn about what is a buffer overflow and how it occurs? Buffer Overflow occurs by overwriting memory fragments of a process or program. Overwriting values of certain pointers and registers of the process causes segmentation faults which cause several errors...
  5. x32x01

    Wireless Penetration Testing: Fern

    Fern is a python based Wi-Fi cracker tool used for security auditing purposes. The program is able to crack and recover WEP/WPA/WPS keys and also run other network-based attacks on wireless or ethernet based networks. The tool is available both as open source and a premium model of the free...
  6. x32x01

    Wireless Penetration Testing: Bettercap

    Introduction According to its official repository here, bettercap is a powerful, easily extensible and portable framework written in Go that aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need...
  7. x32x01

    Metasploit for Pentester: Inject Payload into Executable

    Being lurking and undetectable is the priority after anonymity. In this article, we are going to learn how to create an innocuous-looking backdoor and bind it with a legitimate executable file to gain the victims’ trust. Table of Content Pre-requisites for Lab set up Executable file search on...
  8. x32x01

    What is MAC SPOOFING ?

  9. x32x01

    Metasploit for Pentester: Database & Workspace

    In this series of articles, we are focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Today we are going to learn about the workspace and database commands of the Metasploit Framework. Table of Content Introduction Creating a Workspace...
  10. x32x01

    Windows Privilege Escalation: Scheduled Task/Job (T1573.005)

    An attacker may exploit the Windows Task Scheduler to schedule malicious programmes for initial or recurrent execution. For persistence purposes, an attacker may utilise Windows Task Scheduler to launch applications at system startup or on a scheduled basis. Additionally, the Windows Task...
  11. x32x01

    Programming Languages To Learn To Be An Expert Hacker!

    A programmer ought to know many programming dialects and abilities. Diverse applications and site which you utilize are customized in a particular code. Before turning into a hacker you need to have an incredible programming skills. You need to comprehend that you have to learn programming...
  12. x32x01

    Hacktronian Termux - Pentesing Tools That All Hacker Needs

    Hey Guys 🙋‍♂️, Are you tired of installing termux tools by git-clone? are you tired of finding tool links every time you wanna use them? good, because In this post, we are going to Install the Hacktronian-Tool in Termux that will allow you to install most of the important tools of termux by...
  13. x32x01

    Top 50 Hacking And Penetration Testing Tools [Compiled List 2021]

    From last few years, there will not be such a dividing line between security professionals and network engineers. Hacking tools are not the only thing necessary to successfully complete a PenTest, methodologies are also essential for ensuring that the assessor identifies all vulnerabilities...
  14. x32x01

    12 Best Operating Systems Used By Hackers

  15. x32x01

    Best TV Shows On Hacking & Technology

  16. x32x01

    Top 10 Tips To Protect From Online Hacking

  17. x32x01

    15 Powerful Gadgets For Ethical Hackers | Hardware Tools for Hackers in 2021

    Our in this platform we usually talk about various applications and their uses to check loopholes on systems. But penetration testers not only uses software applications, they also need some hardware to perform the tasks. In this detailed article we are going to cover hardware devices & gadgets...
  18. x32x01

    Evil Twin Attack with DNSMASQ - Wireless WPA2-PSK Cracking

    Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless network. They amplify their signal in a way where the client will automatically connect to them because the beacons are faster...
  19. x32x01

    ShellShock and BeEF Framework - Exploitation Tutorial

    In a previous tutorial, we successfully exploited the ShellShock Vulnerability with Metasploit Framework and Burp Suite. And in this article we’ll gonna exploit the same vulnerability with BeEF Framework which is one of the most popular Browser Exploitation Framework but it is not actively...
  20. x32x01

    File Upload Exploitation and Its Prevention - Detailed Guide 2021

    Well as you all knows that, file upload control is always at major risk for developers because there are N number of ways to bypass this control and an attacker can easily upload any malicious file to the server. Once the malicious file got uploaded to server, an attacker can easily gain the...
Top