PRINT
PRINT
SEND MAIL
SEND MAIL

Month: June 2016

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

METASPLOIT TUTORIALS

Metasploitable 2 vulnerability assessment

A vulnerability assessment is a crucial part in every penetration test and is the process of identifying and assessing vulnerabilities on a target system. In this part of the tutorial we will be assessing the vulnerabilities available on the network side of the Metasploitable 2 virtual machine. We will be assessing the web applications on the Metasploitable 2 machine in a later tutorial. In the previous Metasploit enumeration and fingerprinting tutorial we’ve learned that the Metasploitable 2 machine contains a lot of vulnerabilities. We…

BUG FIXES

Fix Error message “/sbin/plymouthd: not found” is shown on booting (ubuntu xenial)

Manual fix: download manualy 1. plymouth from here 2. plymouth-label from here 3. plymouth-theme-ubuntu-logo from here Install all packages starting with plymouth via dpkg -i package-name.deb This has fixed the promplem for me!

TUTORIALS

Dos attack through tor network – safe and effective ddos tool 2016

Denial of service attacks is still effective and powerful attack against a web server.Even though we have plenty of tools available, most of them are not safe and can track any attacker but, “Torshammer” an awesome piece of python script can solve that problem. This script use the tor anonymity service to mask the user thus its comparatively safe. Dos attacks can be of various types based on the protocol or target. Here we are using a slow poisoning method that can target apache…

TUTORIALS

How to hack a router remotely – millions of routers still vulnerable 2016

A router is a gateway that connects a device to the internet with certain protocols. Hacking a router can be really serious, the attacker can take control over the whole network setup. Even in this 2016 millions routers are vulnerable to remote authentication. This is actually not a vulnerability but, a feature that can turn into hacker’s pathway to your network if its unsecured. In many router’s port 80 is forwarded by default to the public and setup for remote authentication. Typing the IP…