Post Exploitation in Windows using dir Command

January 16, 2018

In this article you will learn how to use Windows Command Line Command “dir” and extract files, get information about Number of files of a particular extension and much more using Metasploit framework.  dir Command: It displays a list of a directory’s files and subdirectories. Syntax dir [<Drive>:] [<Path>] [<FileName>] [/p] [/q] [/a [[:] <Attributes>]] [/s] [/b] [/p]: Displays one screen of the listing at a time. [/q]: Displays file…

Read More >>

Forensic Data Carving using Foremost

January 13, 2018

Foremost is a program that is used to carve data from disk image files, it is an extremely useful tool and very easy to use. For the purpose of this article we have used an Ubuntu disk image file and the process has been repeated twice. The purpose of doing so was to see if Foremost can carve data out of incomplete disk images as well. We have used Kali…

Read More >>

How to Configure Suricata IDS in Ubuntu

January 12, 2018

Suricata is developed by the Open Information Security Foundation. Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors. Features IDS / IPS Suricata implements a complete signature language to match on known threats, policy violations and malicious behaviour. Suricata will also…

Read More >>

Detect SQL Injection Attack using Snort IDS

January 11, 2018

Hello friends!! Today we are going to discuss how to “Detect SQL injection attack” using Snort but before moving ahead kindly read our previous both articles related to Snort Installation (Manually or using apt-respiratory)and its rule configuration to enable it as IDS for your network. Basically In this tutorial we are using snort to capture the network traffic which would analysis the SQL Injection quotes when injected in any web page to obtain information…

Read More >>

Check Meltdown Vulnerability in CPU

January 9, 2018

Hello Friends!! You must be heard of the latest vulnerbility “Meltdown” which has been discovered almost in every CPU having intel processessor, from this link you can check list of vulnerable CPU discription. Today we are going to disccuss how to “Check Metltadown vulnerability in any CPU” by using a script. From Wikipedia Meltdown is a hardware vulnerability affecting Intel x86 microprocessors and some ARM-based microprocessors. It allows a rogue process to read any physical, kernel…

Read More >>

Network Packet Forensic using Wireshark

January 6, 2018

Today we are going to discuss “Network Packet Forensic”  by covering some important track such as how Data is transferring between two nodes, what is “OSI 7 layer model” and Wireshark stores which layers information when capture the traffic between two networks. As we know for transferring the data from one system to other we need a network connection which can be wired or wireless connection. But in actually transmission…

Read More >>

Network Packet Forensic using Wireshark

January 6, 2018

Today we are going to discuss “Network Packet Forensic”  by covering some important track such as how Data is transferring between two nodes, what is “OSI 7 layer model” and Wireshark stores which layers information when capture the traffic between two networks. As we know for transferring the data from one system to other we need a network connection which can be wired or wireless connection. But in actually transmission…

Read More >>

Forensics Tools in Kali

January 6, 2018

Kali linux is often thought of in many instances, it’s one of the most popular tools available to security professionals. It contains all the robust package of programs that can be used for conducting a host of security based operations. One of the many parts in its division of tools is the forensics tab, this tab holds a collection of tools that are made with the explicit purpose of performing…

Read More >>

Hack the Basic Penetration VM (Boot2Root Challenge)

January 5, 2018

Hello friends! Today we are going to take another CTF challenge known as Basic Penetration. The credit for making this vm machine goes to “ Josiah Pierce” and it is another boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Let’s Breach!!! Let us start form getting to know the IP of VM (Here, I have it at 192.168.1.13 but you will have to find…

Read More >>

Hack the Basic Penetration VM (Boot2Root Challenge)

January 5, 2018

Hello friends! Today we are going to take another CTF challenge known as Basic Penetration. The credit for making this vm machine goes to “ Josiah Pierce” and it is another boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Let’s Breach!!! Let us start form getting to know the IP of VM (Here, I have it at 192.168.1.13 but you will have to find…

Read More >>