Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book Description Kali Linux is a comprehensive penetration testing … Continue reading [Ebook] Kali Linux 2018: Assuring Security by Penetration Testing
Tag: pentesting
[IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker
Questo libro è scritto per chiunque voglia avere sottomano tutti i comandi e i tool più utili di Kali Linux. 7 Guide comando per comando inclusa l'installazione e la personalizzazione. Utile anche per chi voglia cimentarsi in questa materia. Kali Linux è una distribuzione basata su Debian GNU/Linux, pensata per l'informatica forense e la sicurezza … Continue reading [IT] Come Diventare Hacker: Kali Linux, Comandi e Tools per l’hacker
[Video] Capture the flag – Vulnhub DerpNStink Walktrough – Hack Challenge
A really funny Hack Challenge. DerpNStink From vulnhub. #Wordpress hacked - #reverse shell #metasploit #msfvenom #SSH
[VIDEO ITA] Vulnhub JIS-CTF – An other Capture the Flag Challenge – Very Easy
[Video IT] Vulnhub Trollcave CTF – Session Hijacking, CSRF, RCE
How to hack this machine using session hijacking, Cross Site Request Forgery e Remote Code execution. Italian Video. English Version will coming soon. Take a look at the easy method: PART 1
How to add external modules to metasploit-framework
Sometimes, some exploits are released as modules for metasploit-frameworks on online databases such as exploit-db but are not added to the metasploit database. So, how to add them manually? Simple, it is necessary that the form is written in ruby, and therefore has extension ".rb". Open console metasploit: sudo service postgresql start msfconsole IIIIII dTb.dTb … Continue reading How to add external modules to metasploit-framework
[Video] Metasploitable 2 – Part 4 – Attack Apache Tomcat Coyote and Java RMI with metasploit
How to hack Apache Tomcat coyote and java RMI registry with metasploit.
[Video] Metasploitable 2 – Part 2 – VSFTPD Backdoor and Rlogin
Metasploitable 2 lessons. Vsftpd 2.3.4 backdoor and Rlogin misconfiguration.
[Video] Metasploit – CGI remote command execution – BASH SHELLSHOCK
Hack remote machine using metasploit. CGI - RCE - Shellshock.
[CTF] JordanInfosec – JIS-CTF: VulnUpload
Jordaninfosec-CTF01 is a very simple vulnerable machine, it does not require many notions of penetration testing, but it is a good way to start the study of penetration testing and to learn the research methodology in addition to the CTF (Capture the Flag) mechanism. In this guide we will go through each step step by … Continue reading [CTF] JordanInfosec – JIS-CTF: VulnUpload