Comprehensive Guide to SSH Tunnelling
Basically tunnelling is process which allows data sharing or communication between two different networks privately. Tunnelling is normally perform through encapsulating the private network data and...
View ArticleMultiple ways to Connect Remote PC using SMB Port
In this article, we will learn how to connect with victim’s machine via SMB port 445, once you have collected username and password to your victim’s PC. To know how collect username and passwords to...
View ArticleMultiple Ways to Detect HTTP Options
Hi Friends, today we will walkthrough various HTTP Protocol methods and the tools used to extract those available HTTP methods in a web server. As we are already aware that the HTTP protocol comprises...
View ArticleMultiple Ways to Exploiting PUT Method
Hi Friends, today’s article is related to exploiting the HTTP PUT method vulnerability through various techniques. First we will determine if the HTTP PUT method is enabled on the target victim...
View ArticleMagic Unicorn – PowerShell Downgrade Attack and Exploitation tool
Magic Unicorn is a simple tool for using a PowerShell downgrade attack and injects shellcode straight into memory. Based on Matthew Graeber’s powershell attacks and the powershell bypass technique...
View ArticleDefend against Brute Force Attack with Fail2ban
Daily we hear some news related to cybercrime just, like, some malicious users or bots has successfully defaced some publicly accessible website or some services. As we always try to explain through...
View ArticleGenerating Reverse Shell using Msfvenom (One Liner Payload)
Hello friends!! Today you will learn how to spawn a TTY reverse shell through netcat by using single line payload which is also known as stagers exploit that comes in Metasploit. Basically, there are...
View ArticlePort Scanning using Metasploit with IPTables
Scanning port is a technique used by penetration tester for identifying the state of computer network services associated with the particular port number. For example, port 80 is available for HTTP...
View ArticleBypass SSH Restriction by Port Relay
Today we are going to access the ssh port which is blocked by the firewall and is forwarded to another port through Port relay tool. Netcat relay is quite a useful tool to connect with any remote...
View ArticlePost Exploitation Using WMIC (System Command)
This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gains a meterpreter session on a Remote PC, then he/she can enumerate a huge...
View Article