Questo libro è scritto per chiunque voglia avere sottomano tutti i comandi e i tool più utili di Kali Linux. 7 Guide comando per comando inclusa l'installazione e la personalizzazione. Utile anche per chi voglia cimentarsi in questa materia. Kali Linux è una distribuzione basata su Debian GNU/Linux, pensata per l'informatica forense e la sicurezza … Continue reading [IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker
Tag: Penetration Testing
[Video] Capture the flag – Vulnhub DerpNStink Walktrough – Hack Challenge
A really funny Hack Challenge. DerpNStink From vulnhub. #Wordpress hacked - #reverse shell #metasploit #msfvenom #SSH
[VIDEO ITA] Vulnhub JIS-CTF – An other Capture the Flag Challenge – Very Easy
[Ebook]Hacking with Kali
Hacking with Kali - Download Link Chapter 1. Introduction Information in This Chapter Book Overview and Key Learning Points Book Audience Diagrams, Figures, and Screen Captures Welcome Penetration Testing Lifecycle Terms Kali History References Chapter 2. Download and Install Kali Linux Information in This Chapter Chapter Overview and Key Learning Points Kali Linux System … Continue reading [Ebook]Hacking with Kali
How to add external modules to metasploit-framework
Sometimes, some exploits are released as modules for metasploit-frameworks on online databases such as exploit-db but are not added to the metasploit database. So, how to add them manually? Simple, it is necessary that the form is written in ruby, and therefore has extension ".rb". Open console metasploit: sudo service postgresql start msfconsole IIIIII dTb.dTb … Continue reading How to add external modules to metasploit-framework
Reverse shell cheat sheet
Reverse Shell Cheat Sheet If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a … Continue reading Reverse shell cheat sheet
[Video]CTF Vulnhub Basic Pentesting Proftpd 1.3.3c backdoor – WordPress hacking – Metasploit Shell
Capture the flag challenge - Basic Pentesting vulnerable machine.
Remote File Inclusion – Attack and Defense
Remote File Inclusion, or RFI, in the field of computer security, indicates a vulnerability affecting web services with little control over the variables received by a user, in particular the PHP GET and POST variables (but not only in php). The vulnerability occurs when a page to be included is passed through an uncontrolled variable. … Continue reading Remote File Inclusion – Attack and Defense
[Download] PTH-Toolkit – Passing the hash Tools collection
pth-toolkit GitHub Download - CLICK HERE A modified version of the passing-the-hash tool collection https://code.google.com/p/passing-the-hash/ designed to be portable and work straight out of the box even on the most 'bare bones' systems The master branch is compiled for amd64, the final goal will be to cross compile these tools to every possible architecture Currently … Continue reading [Download] PTH-Toolkit – Passing the hash Tools collection
[Video] Metasploitable 2 – Part 4 – Attack Apache Tomcat Coyote and Java RMI with metasploit
How to hack Apache Tomcat coyote and java RMI registry with metasploit.