Category: Ethical Hacking

Permanently adding attack vectors in Burp Suite

Burp Suite is one of the popular tools for performing security assessment/testing for web applications. It can be used to run both manual...

SQL Injection

SQL Injection Tutorial Hey guys! Today I’m gonna be explaining SQL Injection and how to preform an SQL Injection attack on a website....

Shell Injection & Command Injection

Shell Injection & Command Injection Shell injection, also known as command injection (the terms are used interchangeably here), while not...

Cross Site Scripting (XSS)

This tutorial is intended for Educational purposes only. 1. Introduction 2. Finding vulnerable websites 3. Testing for Vulnerabilities 4....

Acid Server CTF

This VM, provided by VulnHub Hello there , here I am again solving an old boot2root vulnerable Vm from VulnHub. Before going further let me...

HACKING WORDPRESS 4.7.0-1 / EXPLOITING THE EXPLOITABLE

The guys from sucuri have recently published a blog post with details of a WordPress vulnerability which allows an unauthenticated attacker...

Mobile Pwning: Using Metasploit on iOS

Have you ever wanted to run an exploit but found yourself away from your desk? Wouldn’t it be awesome if you could launch a full version...

Web Application attack surface

The attack‍ surface‍ is the area of our web application‍ test in which we have to put all of our efforts. The more we know about the...

Detect Operating System by Using Ping Command

Ping is a network administration software utility, which used to identify the availability of a host on a Network. Ping working by sending...

From Local File Inclusion to Command Execution

As you probably know , LFI attack’s allow the attackers to view local files on a server but is not limited to that. With LFI we can also...

Mapping a SMB share in Windows

What is NetBIOS? NetBIOS stands for Network Basic Input Output System. In basic terms, it’s responsible for managing the internal share...

Post Exploitation Techniques

In this tutorials you’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don’t...

USV-2016 CTF

This VM, provided by VulnHub Flags: There are 7 flags that should be discovered in form of: Country_name Flag: [md5 hash]. In CTF platform...

Droopy v0.2 CTF

This VM, provided by VulnHub There’s 2 hints I would offer you: 1.) Grab a copy of the rockyou wordlist. 2.) It’s fun to read other...

Protecting Apache Server From Denial-of-Service (Dos) Attack

Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to...

Penetration Testing Methodology for Web Applications

Establishing a penetration testing methodology is becoming increasingly important when considering data security in web applications. The...

PowerShell Toolkit: PowerSploit

PowerSploit is a collection of PowerShell scripts which can prove to be very useful during some exploitation and mostly post-exploitation...

Antenna Theory for Wardriving and Penetration Testing

Introduction Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on...

OWASP ZAP Reconnaissance – Without Permission!

How To Assess a Third Party Web Site or Cloud Service with the OWASP ZAP Attack Proxy When You Don’t Have Permission to Pentest As a...

Setting Up a Pentest Lab with pfSense in VirtualBox

  Introduction Penetration testing requirements often force penetration testers to do both external as well as internal assessments. This...

Fingerprinting: Identifying Applications

When performing a Web Application Security Assessment, an important step is Fingerprinting which allows for further exploitation by an...

Format String Bug Exploration

ABSTRACT The Format String vulnerability significantly introduced in year 2000 when remote hackers gain root access on host running FTP...

ELF File Format

Executable and Linking Format (ELF) is the object format used in UNIX-like operating systems. This post introduces the ELF file format in...

Case Study: Evading Automated Sandbox – Python PoC

Introduction With the increasing of Sandbox technology usage, every penetration tester should be prepared to face it one day. While a...

The Pitfalls of Client-Side Authentication: Solutions to Net-Force JavaScript CTF challenges

Client-side authentication is when authentication checks are performed completely at users’ side. The idea is that the authentication...

n00bz CTF Challenge #2: Practical Website Hacking

In the second edition of our n00bs CTF Labs, we’ve created 13 small challenges to test your web app hacking skills. The challenges are...

Lessons from Deficient Java Applet-based Authentication

Java Applets are bytecodes that are delivered via the browser, and executed using the Java Virtual Machine (JVM) at the client-side. Java...

Maligno: An Open Source Pentesting Tool

Today I want show you a new tool that could help in your penetration testing activity. Maligno is an open source penetration-testing tool...

15 Best Free Packet Crafting Tools

Packet crafting is the process of manually creating or editing the existing data packets on a network to test network devices. Hackers and...

When You Can’t ARPSpoof

There are times during a penetration test when you are having difficulty gaining the credentials you want from a host that has already been...