Category: penetration testing


Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Windows Hacking

Black Window 10 Enterprise

Black Window 10 Enterprise is the first windows based penetration testing distribution with linux integraded ! The system comes activated with a digital license for windows enterprise ! It supports windows apps and linux apps, gui and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of cerberus linux! It has managed to implement cerberus os within windows.Offers the stability of a windows system and it offers the hacking part with a…

penetration testingTUTORIALS

Comprehensive Guide to Dirb Tool

In this article, we are focusing on transient directory using Kali Linux tool DIRB and trying to find hidden files and directories within a web server. A path traversal attack is also known as “directory traversal” aims to access files and directories that are stored outside the web root folder. By manipulating variables with reference files with “dot-dot-slash (…/)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including…

Kali Linuxpenetration testingTUTORIALS

Hacking with Empire – PowerShell Post-Exploitation Agent

Hello everyone and welcome to this beginner’s guide to Empire. According to their official website: “Empire is a pure PowerShell post-exploitation agent” built on cryptologically-secure communications and a flexible architecture. Empire – PowerShell post-exploitation agent Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.” In this tutorial we will be covering everything you need to know about this…

Kali Linuxpenetration testingTUTORIALS

Multiple Ways to Exploiting PUT Method

Hi Friends, today’s article is related to exploiting the HTTP PUT method vulnerability through various techniques. First we will determine if the HTTP PUT method is enabled on the target victim machine, post which we will utilize several different methods to upload a Meterpreter reverse shell on the target and compromise the same. Target: Metasploitable 2 Attacker: Kali Linux machine PUT method was originally intended as one of the HTTP method used for file management operations. If the HTTP PUT method is enabled on…

ANDRAXHacking ToolsMetasploit FrameworkNEW TOOLSpenetration testingPenetration Testing Platform

ANDRAX – The First And Unique Penetration Testing Platform For Android Smartphones

ANDRAX The first and unique Penetration Testing platform for Android smartphonesWhat is ANDRAXANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution!Why is Android so powerful?Simple, everyone has a smartphone and spends all the time with it! We have the possibility to camouflage easily in the middle of everyone, the processor architecture of most Android smartphones is ARM a…

Kali Linuxpenetration testingTUTORIALS

Multiple Ways to Detect HTTP Options

Hi Friends, today we will walkthrough various HTTP Protocol methods and the tools used to extract those available HTTP methods in a web server. As we are already aware that the HTTP protocol comprises of number of methods that can be utilized to not only gather the information from the web server, but can also perform specific actions on the web server. These techniques and methods are helpful for the web application developers in the deployment and testing stage of the web applications. GET…

DarkSpiritzNEW TOOLSPenetration Test Frameworkpenetration testingPenetration Testing FrameworkPentest ToolTesting Framework

DarkSpiritz – A Penetration Testing Framework For UNIX Systems

What is DarkSpiritz?Created by the SecTel Team it was a project of one of the owners to update and clean-up an older pentesting framework he had created to something updated and modern. DarkSpiritz is a re-vamp of the very popular framework known as "Roxysploit". You may be familiar with this framework and if you are then it will help you with DarkSpiritz. DarkSpiritz also works like another pentesting framework known as Metasploit. If you know how to use metasploit setting up and working with…

penetration testingTUTORIALS

Multiple Ways to Secure SSH Port

Secure Shell (SSH) is defined as a network protocol to operate network services securely over an unsecured network. The standard TCP port for SSH is 22. The best application of SSH is to remotely login into computer systems by users. This article will be explaining about the network securities which help the network administrator to secure the service of SSH on any server through multiple ways.  Methods Used: Port Forwarding Disable Password Based Login And Using PGP Key (Public Key) Disable Root Login and…

Deauthentication AttackMacMDK3Network-AttackerNEW TOOLSpenetration testing

Network-Attacker – WiFi Stress Testing Beacon Flooding & Deauthentication Attack

network-attacker V0.1 is a Wifi Stress Testing Bash Script Program Based on Mdk3 [Beacon Flooding & Deauthentication Attack] Created To Help Beginners And even Professionals For a eacon Flooding Or Deauthentication Attack On NetworksInstallationsudo apt-get install gitsudo git clone network-attackersudo chmod +x install.shsudo chmod +x On :Backbox linuxUbuntuDebianKali linuxParrot osContactProgrammed By belahsan ouerghi Contact.Download Network-Attacker

penetration testingTUTORIALS

Multiple Ways to Bypass UAC using Metasploit

Hello friends!! Today we are shading light on User Account Control shortly known as UAC. We will also look how it can potentially protect you from malicious software and ignoring UAC prompt can trouble your system. Table of content Introduction to UAC What is UAC? Working of UAC 5 ways to Bypass UAC Windows Escalate UAC Protection Bypass Windows Escalate UAC Protection Bypass (In Memory Injection) Windows UAC Protection Bypass (Via FodHelper Registry Key) Windows Escalate UAC Protection Bypass (Via Eventvwr Registry Key) Windows…