PRINT
PRINT
SEND MAIL
SEND MAIL

Category: TUTORIALS

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

penetration testingTUTORIALS

Multiple Ways to Exploiting Windows PC using PowerShell Empire

This is our second post in the article series ‘PowerShell Empire’. In this article, we will cover all the exploits that lead to windows exploitation with the empire. To our first post on empire series, which gives a basic guide to navigate your way through empire, click here –>  Table of content: Exploiting through HTA Exploiting through MSBuild.exe Exploiting through regsvr32 XSL exploit Exploiting through a visual basic script BAT exploit Multi_launcher exploit Exploiting through HTA This attack helps us to exploit windows through…

penetration testingTUTORIALS

Jenkins Pentest Lab Setup

Hey!You all know that we have performed so many CTF challenges and we got to know about Jenkins there.So lets know about Jenkins better. For this we are here with the new challenges which you will face while performing CTF challenges.To do it in a easier way we are here with a new article.So let’s do it. Table of Content Introduction of Jenkins Lab setup Install java Import the GPG keys Add the Jenkins repository Install Jenkins Setup Jenkins Jenkins penetration testing Exploiting Groovy…

penetration testingTUTORIALS

Exploiting Windows PC using Malicious Contact VCF file

A huge shoutout to cyber security researcher John Page for bringing this vulnerability into the internet’s eye on 15th January 2019. This was a 0 day exploit and of course works with the latest windows 10 too. It is categorized under “Insufficient UI warning remote code execution” vulnerability. Introduction: Basically what John discovered was that if we replaced the website in a VCF file with the local path of a CPL file, it tends to install that file instead of opening it on browser.…

penetration testingTUTORIALS

Exploiting Windows using Contact File HTML Injection/RCE

After the 0 day exploit on malicious VCF file in windows, cyber security researcher John Page deserves another round of applause for bringing this vulnerability onto exploit-db’s eye on 23rd January 2019. This vulnerability further exploits the RCE vulnerability present in VCF with HTML injections. To read the previous article follow the link here. Introduction: The idea here is to include a malicious VBScript file into the email section of the VCF file so as to locally execute a script instead of opening the…

Hacking Toolspenetration testingTUTORIALS

GreatSct – An Application Whitelist Bypass Tool

While writing Applocker bypass series, we found a new tool which was especially designed for bypassing whitelisting application.  So I Decided to write this article where we are introducing another most interesting tool “Great SCT –A Metasploit payload generator” tool which is similar to Unicorn or msfvenom because it depends on the metasploit framework to provide reverse connection of the victim’s machine. So let’s began with its tutorial and check its functionality. Table of Content GreatSCT Installation & Usages Generate malicious hta file Generate…

penetration testingTUTORIALS

Bypass Application Whitelisting using rundll32.exe (Multiple Methods)

The purpose to write this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass.  As we know for security reason the system admin add group policies to restrict app execution for a local user. In our previous article, we had discussed on “Windows Applocker Policy – A Beginner’s Guide” as they define the AppLocker rules for your application control policies and how to work with them. But today you will learn how to bypass Applocker policies with RunDLL files.…

penetration testingTUTORIALS

Bypass Application Whitelisting using regsrv32.exe (Multiple Methods)

The purpose to write this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass.  As we know for security reason the system admin add group policies to restrict app execution for a local user. In our previous article, we had discussed on “Windows Applocker Policy – A Beginner’s Guide” as they define the AppLocker rules for your application control policies and how to work with them. But today you will learn how to bypass Applocker policies with regsvr32.exe. Tables…

penetration testingTUTORIALS

Bypass Application Whitelisting using wmic.exe (Multiple Methods)

The purpose of this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass. As we know for security reasons, the system admin adds group policies to restrict application execution for local users. In our previous article, we had discussed on “Windows Applocker Policy – A Beginner’s Guide” as they defines the AppLocker rules for your application control policies and how to work with them. But today you will learn how to bypass Applocker policies using wmic.exe. Table of Content…

penetration testingTUTORIALS

Bypass Application Whitelisting using msbuild.exe (Multiple Methods)

The purpose of this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass.  As we know for security reason, the system admin add group policies to restrict app execution for local user. In our previous article, we had discussed on “Windows Applocker Policy – A Beginner’s Guide” as they defines the AppLocker rules for your application control policies and how to work with them. But today you will learn how to bypass Applocker policies with MSbuild.exe. Table of Content…