Posts

Showing posts from March, 2022
Image
from Pocket https://ift.tt/pd8eDCj via IFTTT
Image
from Pocket https://ift.tt/rWVS9nQ via IFTTT

Multiple Ways to Embed a Payload in an Original APK File

Image
Hey Folks, as we know beginners try to find the best ways that they can embed the payload into the original APK, But it takes their long time to do research on it. from Pocket https://ift.tt/eaFBUS0 via IFTTT
Image
from Pocket https://ift.tt/ECsjNkw via IFTTT

How to change hostname in Kali Linux?

Image
Kali Linux is becoming popular and more and more users are using it to try out different things. When installing kali, you get to choose a hostname, but in case you accepted the default hostname (kali) and later want to change it, here’s a How to guide to change hostname in Kali Linux. from Pocket https://ift.tt/j7gyAdL via IFTTT
Image
from Pocket https://ift.tt/DlN2fuH via IFTTT

Giving the computer an IP address

Image
There are two ways that a computer can obtain those details. Either automatically, or via manual configuration. In a home network, the router usually decides how the LAN should work. The router will forward traffic between the clients on the LAN and also between the LAN and the Internet. from Pocket https://ift.tt/UT8c6S3 via IFTTT

How to set a static IP address on Windows 10

Image
On Windows 10, setting a static IP address to a computer is an essential configuration you may need to configure in many scenarios. For instance, if you plan to share files, a printer on a local network, or configure port forwarding. from Pocket https://ift.tt/6E2WLND via IFTTT

Windows: Configure Static Host Name to IP Address Mappings

Image
Using the hosts file, ip addresses can be mapped to hostnames. This is useful to access systems that do not have a DNS entry and for test and development purposes. The hosts file exists in the SYSTEM32\DRIVERS\ETC directory under the Windows root directory (i.e., \WINDOWS or \WINNT). from Pocket https://ift.tt/bVNkAuo via IFTTT

Port Forwarding & Tunnelling Cheatsheet

Image
In this article, we are going to learn about the concepts and techniques of Port forwarding and Tunnelling. This article stands as an absolute cheatsheet on the two concepts. from Pocket https://ift.tt/JBu2qX6 via IFTTT

Locator : Geolocator, IP Tracker, Device Info by URL (Serveo & Ngrok)

Image
Locator is a tool used for Geolocator, Ip Tracker, Device Info by URL (Serveo and Ngrok). It uses tinyurl to obfuscate the Serveo link. from Pocket https://ift.tt/Qb9kzdV via IFTTT

The Real way to get geo-location of any device with Kali Linux

Image
In this post, learn how to locate any device through Kali Linux using tools. Here, i am using nGrok, sneeker, and IP locator tools . However, before diving into the practical let’s take a look at some theoretical aspects. from Pocket https://ift.tt/pKAcBhu via IFTTT

Metasploitable/SSH/Exploits

Image
is a virtual machine with baked-in vulnerabilities, designed to teach . This set of articles discusses the RED TEAM's tools and routes of attack. from Pocket https://ift.tt/EQz3ImG via IFTTT

Brute force against SSH and FTP services

Image
Bruteforce is among the oldest hacking techniques, it is also one of the simplest automated attacks requiring minimum knowledge and intervention by the attacker. The attack consists in multiple login attempts using a database of possible usernames and passwords until matching. from Pocket https://ift.tt/YO9hieu via IFTTT

Hacking Tools for Penetration Testing – Fsociety in Kali Linux

Image
Fsociety is a free and open-source tool available on GitHub which is used as an information-gathering tool. Fsociety is used to scanning websites for information gathering and finding vulnerabilities in websites and web apps. from Pocket https://ift.tt/m53YCR6 via IFTTT

How to attack Windows 10 machine with metasploit on Kali Linux [updated 2021]

Image
The Metasploit Framework is the most commonly-used framework for hackers worldwide. It allows hackers to set up listeners that create a conducive environment (referred to as a Meterpreter) to manipulate compromised machines.  from Pocket https://ift.tt/u2LJlqw via IFTTT

How to DDOS an IP using HOIC

Image
Disclaimer : This post is only for the educational purpose. How to DDOS an IP using HOIC: A distributed denial of service (DDOS) attack involves a group of compromised systems usually infected with Trojans used to perform a DoS attack on a target system or network. from Pocket https://ift.tt/TQbkDp3 via IFTTT

SSH Brute Force Attack Tool using PuTTY / Plink (ssh-putty-brute.ps1)

Image
This blog post introduces our newest addition to our pentesting arsenal, the ssh-putty-brute.ps1. This tool can turn the well-known PuTTY SSH client (putty.exe or plink.exe) into a reliable SSH login brute force tool which in addition also evades any Antivirus or endpoint protection solution. from Pocket https://ift.tt/hIuM7At via IFTTT

SFTP File Transfer Protocol - get SFTP client & server

Image
SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the SSH protocol. It supports the full security and authentication functionality of SSH. SFTP has pretty much replaced legacy FTP as a file transfer protocol, and is quickly replacing FTP/S. from Pocket https://ift.tt/vp45zDQ via IFTTT

How to Troubleshoot "SSH Connection Refused" : 5 Easy Fixes!

Image
OpenSSH is an open-source version of the Secure Shell (SSH) protocol that can be used to login remotely to a server and to control remote Linux-based systems. OpenSSH provides secure encrypted communication between two untrusted hosts over an insecure network. from Pocket https://ift.tt/olYwXFc via IFTTT

Configuring OpenSSH on Windows

Image
In the passwd file, you will notice that the home directory of the user is set as /home/username, with username being the name of the account. In the default install, the /home directory is set to the default profile directory for all users. from Pocket https://ift.tt/kFWzon4 via IFTTT

Server-side Attacks With Kali linux : Best Collections of Hacking Tools : Part-2

Image
Vega is a security testing tool used to crawl a website and analyze page content to find links as well as form parameters. To launch Vega, go to Web Applications | Web Vulnerability Scanners and select Vega. Vega will flash an introduction banner and display a GUI. from Pocket https://ift.tt/PQyjcXn via IFTTT

How to Hack a Web Server

Image
Customers usually turn to the internet to get information and buy products and services. Towards that end, most organizations have websites.Most websites store valuable information such as credit card numbers, email address and passwords, etc. This has made them targets to attackers. from Pocket https://ift.tt/twveyRO via IFTTT

Multiple Ways To Exploiting HTTP Authentication

Image
In this article, we will learn about how to configure the password-protected Apache Web Server to restrict from online visitors without validation so that we can hide some essential and critical information to the unauthenticated users and how to penetrate it’s the weak configuration to break its from Pocket https://ift.tt/pgfE9yK via IFTTT

SSH Pentesting Guide

Image
If you’d like to suggest an amendment or contribute to this article send us an email through to [email protected] We’ll also do our best to propagate additions and suggestions from social media! from Pocket https://ift.tt/azvjACT via IFTTT

SSH Pentesting Guide

Image
If you’d like to suggest an amendment or contribute to this article send us an email through to [email protected] We’ll also do our best to propagate additions and suggestions from social media! from Pocket https://ift.tt/azvjACT via IFTTT

Hacking the SSH server, again

Image
In the previous howto, we have seen how to research about a vulnerability in the FTP service running on our target system and exploit it to gain a shell on that system. In this howto, we will see hacking the SSH service running on port 22. It can be seen that the target is running OPenSSH 4. from Pocket https://ift.tt/3MJQLZV via IFTTT