PRINT
PRINT
SEND MAIL
SEND MAIL

Month: June 2016

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

METASPLOIT TUTORIALS

Metasploitable 2 vulnerability assessment

A vulnerability assessment is a crucial part in every penetration test and is the process of identifying and assessing vulnerabilities on a target system. In this part of the tutorial we will be assessing the vulnerabilities available on the network side of the Metasploitable 2 virtual machine. We will be assessing the web applications on the Metasploitable 2 machine in a later tutorial. In the previous Metasploit enumeration and fingerprinting tutorial we’ve learned that the Metasploitable 2 machine contains a lot of vulnerabilities. We…

BUG FIXES

Fix Error message “/sbin/plymouthd: not found” is shown on booting (ubuntu xenial)

Manual fix: download manualy 1. plymouth from here 2. plymouth-label from here 3. plymouth-theme-ubuntu-logo from here Install all packages starting with plymouth via dpkg -i package-name.deb This has fixed the promplem for me!

TUTORIALS

Dos attack through tor network – safe and effective ddos tool 2016

Denial of service attacks is still effective and powerful attack against a web server.Even though we have plenty of tools available, most of them are not safe and can track any attacker but, “Torshammer” an awesome piece of python script can solve that problem. This script use the tor anonymity service to mask the user thus its comparatively safe. Dos attacks can be of various types based on the protocol or target. Here we are using a slow poisoning method that can target apache…

TUTORIALS

How to hack a router remotely – millions of routers still vulnerable 2016

A router is a gateway that connects a device to the internet with certain protocols. Hacking a router can be really serious, the attacker can take control over the whole network setup. Even in this 2016 millions routers are vulnerable to remote authentication. This is actually not a vulnerability but, a feature that can turn into hacker’s pathway to your network if its unsecured. In many router’s port 80 is forwarded by default to the public and setup for remote authentication. Typing the IP…