libro kali linux

[IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker

Questo libro è scritto per chiunque voglia avere sottomano tutti i comandi e i tool più utili di Kali Linux. 7 Guide comando per comando inclusa l'installazione e la personalizzazione. Utile anche per chi voglia cimentarsi in questa materia. Kali Linux è una distribuzione basata su Debian GNU/Linux, pensata per l'informatica forense e la sicurezza … Continue reading [IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker

[Ebook]Hacking with Kali

Hacking with Kali - Download Link   Chapter 1. Introduction Information in This Chapter Book Overview and Key Learning Points Book Audience Diagrams, Figures, and Screen Captures Welcome Penetration Testing Lifecycle Terms Kali History References Chapter 2. Download and Install Kali Linux Information in This Chapter Chapter Overview and Key Learning Points Kali Linux System … Continue reading [Ebook]Hacking with Kali

How to add external modules to metasploit-framework

Sometimes, some exploits are released as modules for metasploit-frameworks on online databases such as exploit-db but are not added to the metasploit database. So, how to add them manually? Simple, it is necessary that the form is written in ruby, and therefore has extension ".rb". Open console metasploit: sudo service postgresql start msfconsole IIIIII dTb.dTb … Continue reading How to add external modules to metasploit-framework

Reverse shell cheat sheet

Reverse Shell Cheat Sheet If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a … Continue reading Reverse shell cheat sheet

Remote File Inclusion – Attack and Defense

Remote File Inclusion, or RFI, in the field of computer security, indicates a vulnerability affecting web services with little control over the variables received by a user, in particular the PHP GET and POST variables (but not only in php). The vulnerability occurs when a page to be included is passed through an uncontrolled variable. … Continue reading Remote File Inclusion – Attack and Defense

[Download] PTH-Toolkit – Passing the hash Tools collection

pth-toolkit GitHub Download - CLICK HERE A modified version of the passing-the-hash tool collection https://code.google.com/p/passing-the-hash/ designed to be portable and work straight out of the box even on the most 'bare bones' systems The master branch is compiled for amd64, the final goal will be to cross compile these tools to every possible architecture Currently … Continue reading [Download] PTH-Toolkit – Passing the hash Tools collection