PRINT
PRINT
SEND MAIL
SEND MAIL

Category: TUTORIALS

TUTORIALS

Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Hacking Toolspenetration testingTUTORIALS

Comprehensive Guide on Dymerge

Hello friends! This article is comprehensive guide on the Dymerge tool. This is a handy little tool that helps you manage all the dictionaries that you’ve created reading through our blog and using all the amazing tools we’ve written about. Table of Content What is Dymerge Installing and Launching Dymerge Standard Merge Fast Mode Removing Duplicates Reverse Listing Alphabetic and Numeric Sorting Defining Output Including Characters Compressing Output Introduction to Dymerge Dymerge is a tool that gives you the ability to manage dictionaries. By…

CTF ChallengesTUTORIALS

Hack the Box: Hawk Walkthrough

Today we are going to solve another CTF challenge “Hawk”. Hawk is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Easy Task: To find user.txt and root.txt Note: Since these labs are online available therefore they have static IP. The IP of Hawk is 10.10.10.102 Penetration Methodology: Port scanning and IP discovery Anonymous FTP Login…

CTF ChallengesTUTORIALS

Typhoon: Vulnhub Walkthrough

Typhoon VM contains several vulnerabilities and configuration errors. Typhoon can be used to test vulnerabilities in network services, configuration errors, vulnerable web applications, password cracking attacks, privilege escalation attacks, post exploitation steps, information gathering and DNS attacks. Prisma trainings involve practical use of Typhoon. Flag: root-flag Since there are multiple ways in which we can exploit this machine. Therefore we have used two methods to capture the flag as follows: Method 1- Using a LOCAL PRIVILEGE ESCALATION SHELL after logging into SSH. Let’s Begin…

penetration testingTUTORIALS

Comprehensive Guide on Pydictor – A wordlist Generating Tool

In this article we will explore another dictionary building tool “Pydictor”. These tools are always fun to work with, this is another robust tool perfect for generating custom dictionaries. The thing that stands out most about this tool is the customization options it offers, from the most common to the advance. Table of Content What is Pydictor Installation Numeric Dictionary Lower Case Alphabet Dictionary Upper Case Alphabet Dictionary Numeral Coupled With Upper Case Alphabet Upper Case Coupled With Lower Case Alphabet Numeral Coupled With…

penetration testingTUTORIALS

Comprehensive Guide on Cupp– A wordlist Generating Tool

Hello Friends!! Today we are going explore the function of Cupp which is an authoritative tool that creates a wordlist especially particular for a person that can be use while making brute force attack for guessing login credential. Table of Content Introduction to Cupp How Cupp Works Getting Started Generating Custom Dictionary Adding to Custom Dictionary Downloading Dictionaries from Cupp Repository  Downloading Default Usernames and Passwords Quiet Mode Introduction to Cupp Cupp stand for Common User Passwords Profiler and this tool can be used…

CTF ChallengesTUTORIALS

Mercy: Vulnhub Walkthrough

MERCY is a machine dedicated to Offensive Security for the PWK course. MERCY is a name-play, and has nothing to do with the contents of the vulnerable machine. You can download the Mercy vulnerable lab from here. The challenge is to get root on the Targeted Virtual Machine and read the proof.txt within that directory. Flag: Proof.txt Tables of Contents: IP discovery and Port Scanning. Browsing the IP on port 8080. Decoding Base64 String. Using Enum4linux tool for enumerating information of the Target Machine.…

TUTORIALS

How to install Cerberus Linux SubSystem

How to install Cerberus Linux SubSystem   Steps Start Windows PowerShell in the Administrator Command Prompt by typing: Copy: powershell To install .NET Framework 3.5 from installation media located on a network share, use the following command: Copy: Install-WindowsFeature Net-Framework-Core -source \\network\share\sxs Where \\network\share\sxs is the location of the source files. For more information about the Install-WindowsFeature cmdlet, see Install-WindowsFeature. To verify installation, run the following command: The Install State column should show Installed for the .NET Framework 3.5 (includes .NET 2.0 and 3.0)…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…