Comprehensive Guide on fcrackzip Tool

August 22, 2019

In this article, we are going to discuss fcrackzip which is a third-party tool for cracking zip files passwords. It is the best tool as it tries to search zipfile for encrypted files and tries to guess their password. Here, we have discussed each option available in fcrackzip so that we can use this tool to its best of potential. There are many cases where an individual type an incorrect…

Read More >>

dpwwn:2 Vulnhub Walkthrough

August 18, 2019

Today we will take another CTF challenge dpwwn2 from the series dpwwn. The credit for making this VM machine goes to “Debashish Pal” and it is a boot2root challenge where we have to root the machine and capture the flag dpwwn-02-FLAG.txt to complete the challenge. You can download this VM here. Security Level: Intermediate Penetrating Methodology: Scanning Enumeration Dirb WPScan Searchsploit Exploitation Privilege Escalation Exploiting SUID rights Walkthrough: Scanning: Let’s start off…

Read More >>

Linux For Pentester: socat Privilege Escalation

August 17, 2019

Welcome back, to grab knowledge of another command from “Linux for pentester” series. As we know there are many tools that can help the user to transfer data. Similarly, we are going to take advantage of another command i.e. “socat” which is a utility for data transfer between two addresses. So, now we will take this benefit of “socat” in our mission of privilege Escalation. NOTE: “The main objective of…

Read More >>

The Library:2 Vulnhub Walkthrough

August 15, 2019

Today we are going to take another challenge Library2 which is a 2nd lab of the series Library. The credit for making this VM machine goes to “Avraham Cohen” and it is a boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Security Level: Beginner Penetrating Methodology: Scanning Netdiscover NMAP Enumeration Web Directory Search Burpsuite  Exploitation Sqlmap FTP Shell Upload Netcat…

Read More >>

Guide to Red Team Operations

August 5, 2019

Introduction to Red Team Red Teaming comes under the level of assessment in the information security domain. Red Teamers have to identify the risk to the network infrastructure of an organisation as a measure of pre-evaluation so that the execution of engagement can be carried properly. In order to determine such risks, it is the primary responsibility of Red Team operators to recognise potential threats or vulnerability. Various tools, whether…

Read More >>

Symfonos:3 Vulnhub Walkthrough

August 1, 2019

Hello, guys today we are going to take a new challenge Symfonos:3, which is a third lab of the series Symfonos. The credit for making this VM machine goes to “Zayotic” and it’s another boot2root challenge where we have to root the server and capture the flag to complete the challenge. You can download this VM here. Security Level: Intermediate Penetrating Methodology: Scanning Netdiscover Nmap Enumeration Web Directory Search  Exploitation…

Read More >>

The Library:1 Vulnhub Walkthrough

July 30, 2019

Today we are going to take a new challenge Library1 which is a first lab of the series Library. The credit for making this VM machine goes to “Avraham Cohen” and it is a boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Security Level: Beginner Penetrating Methodology: Scanning Netdiscover NMAP Enumeration Web Directory Search Burpsuite  Exploitation Sqlmap FTP Shell Upload…

Read More >>

hackme: 1: Vulnhub Walkthrough

July 29, 2019

Hack me is another CTF challenge and credit goes to x4bx54 for designing this VM. Here you need to identify bug to get reverse shell connection of the machine and try to access root shell. This VM can be downloaded from given below link and its level is set to easy for beginners. https://www.vulnhub.com/entry/hackme-1,330/ Penetration Testing Methodology Scanning Netdiscover Nmap Enumeration Using burp suite Exploitation Using sqlmap Using dirb Privilege Escalation…

Read More >>

DomDom: 1 Vulnhub Walkthrough

July 27, 2019

DomDom is another CTF challenge based on PHP mis-functionality and credit goes to Avraham Cohen for designing this VM. Here you need to identify bug to get reverse shell connection of the machine and try to access root shell. This VM can be downloaded from given below link and its level is set to easy for beginners. Let’s start off with the scanning process. This target VM took the IP…

Read More >>

Zeus:1 Vulnhub Walkthrough

July 26, 2019

Today we are going to take another CTF challenge Zeus:1 . The credit for making this VM machine goes to “Vesile Revnic” and it is a boot2root challenge where we have to root the server and capture the flags to complete the challenge. You can download this VM here  Security Level: Intermediate Penetrating Methodology: Scanning Enumeration Exploitation Hydra SSH Jailkit Privilege Escalation Exploiting Suid rights Walkthrough: Scanning: Let’s start off with the…

Read More >>