Msfvenom Tutorials for Beginners

November 17, 2017

Hello friends!! Today we will learn to create payloads from a popular tool known as metasploit, we will explore various option available within the tool to create payloads with different extensions and techniques. Msfvenom Msfvenom is a command line instance of Metasploit that is used to generate and output all of the various types of shell code that are available in Metasploit. Requirements: Kali Linux Windows Machine Android Phone Linux Machine…

Read More >>

7 Ways to Privilege Escalation of Windows 7 PC

November 15, 2017

When you exploit the victim pc there would be certain limits which resist performing some action even after you are having the shell of victim’s pc. To get complete access of your victim pc; you need to bypass privilege escalation where a user receives privileges they are not authorize to. These privileges can be used to delete files, view private information, or install unwanted programs such as viruses. Metasploit has various…

Read More >>

Hack the Covfefe VM (CTF Challenge)

November 15, 2017

Hello friends! Today we are going to take another CTF challenge known as covfefe. The credit for making this vm machine goes to “Tim Kent” and it is another capture the flag challenge in which our goal is to find 3 flags to complete the challenge. You can download this VM here. Let’s Breach!!! Let us start form getting to know the IP of VM (Here, I have it at 192.168.1.120 but you…

Read More >>

Exploiting Remote machine with Pastejacking

November 14, 2017

Pastejacking is a technique that takes over the clipboard of a machine, for instance, when we copy text from a website, that text can be riddled with malicious code that will execute when you paste that text. This is a very good way to achieve a Meterpreter session because of its simplicity. All that needs to be done is; copy some harmless words from the browser and paste them on…

Read More >>

Hack the Born2Root VM (CTF Challenge)

November 13, 2017

Hello friends! Today we are going to take another CTF challenge known as Born2Root. The credit for making this vm machine goes to “Hadi Mene” and it is another boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Let’s Breach!!! Let us start form getting to know the IP of VM (Here, I have it at 192.168.1.137 but you will have to find your…

Read More >>

Exploiting Windows Machine with DDE Exploit

November 13, 2017

DDE stands for “dynamic Data Exchange”, this is a method used by windows to facilitate one program being able to subscribe to an item made using another program. This exploit uses that functionality to exploit the victim endpoint. Once the victim clicks on the word file, a HTA payload is retrieved via HTTP and session is achieved. Here is a step-by-step depiction of how it happens: The code for the…

Read More >>

Wifi Post Exploitation on Remote PC

November 11, 2017

Hello readers! Today you will be learning about different ways to get basic service sets information of remote user’s Wi-Fi as well as current network connection information, and how to extract saved Wireless LAN profiles of remote pc after that you will be disconnecting target user’s Wi-Fi too. First Hack the Victim PC Using Metasploit (tutorial how to hack remote pc) after that get admin access through Bypassuac (click here)…

Read More >>

Hack the dina VM (CTF Challenge)

November 5, 2017

Hello friends! Today we are going to take another CTF challenge known as dina. The credit for making this vm machine goes to “Touhid Shaikh” and it is another boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Let’s Breach!!! Let us start form getting to know the IP of VM (Here, I have it at 192.168.1.104 but you will have to find your…

Read More >>

Beginner Guide to Classic Cryptography

November 3, 2017

Cryptography:  It is a technique of scrambling message using mathematical logic to keep the information secure. It preserve the scrambled message from being hacked when transport over unsecure network. Since it convert the readable message in unreadable text. Plaintext: It is the content of data which is in readable form that need to share over insecure network. Encrypting key: It is random string of bits created particularly to scramble the plaintext…

Read More >>

WiFi Exploitation with WifiPhisher

October 31, 2017

Hello friends! Today we are going demonstrate WIFI- Phishing attack by using very great tool “WIFIphisher”, please read its description for more details. Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malwares. It is primarily a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way…

Read More >>