5 Ways to Create Dictionary for Bruteforcing

We live in digital era, and in the world of technology everything is password protected. There are many ways to crack the password such as social engineering, try and error method, etc. but the three only two most successful methods of password cracking i.e. Dictionary attack and Brute force. Both of them has there perks… Continue reading →
The post 5 Ways to Create Dictionary for Bruteforcing appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/5-ways-create-dictionary-bruteforcing/

Scan Website Vulnerability using Uniscan (Beginner Guide)

Through this article we are trying to elaborate the word Enumeration using Kali Linux tool UNISCAN. Uniscan is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner as well as work as enumerating tool in order to gather information like open ports and protocol related to target and investigate it… Continue reading →
The post Scan Website Vulnerability using Uniscan (Beginner Guide) appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/scan-website-vulnerability-using-uniscan-beginner-guide/

5 Ways to Directory Bruteforcing on Web Server

In this article we have focus towards directory brute force attack using Kali Linux tool and try to find hidden files and directories inside web server for penetration testing. A path traversal attack also known as directory traversal aims to access files and directories that are stored outside the web root folder. By manipulating variables… Continue reading →
The post 5 Ways to Directory Bruteforcing on Web Server appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/5-ways-directory-bruteforcing-web-server/

Exploit Remote PC using Microsoft Office Word Malicious Hta Execution

For Kali Linux users we had perform this attack through metasploit without using any python script which generates .rtf file for attack, thus the user only need to update their kali Linux and load metasploit framework to start this attack. This is a zero –day exploit that has excellent rating against Ms-office vulnerability which can… Continue reading →
The post Exploit Remote PC using Microsoft Office Word Malicious Hta Execution appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/exploit-remote-pc-using-microsoft-office-word-malicious-hta-execution/

Hack the Defense VM (CTF Challenge)

Defence VM is made by Silex Secure team. This VM is designed to honor and pay respects to the military of Nigeria and the soldiers who stood up against the terrorist attack. It is of intermediate level and is very handy in order to brush up your skills as a penetration tester. You can download… Continue reading →
The post Hack the Defense VM (CTF Challenge) appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/hack-defense-vm-ctf-challenge/

LazyKali kali-linux tutorial

LazyKali is an awesome script written in bash shell. It can automate the whole update and install new tools in your hack repository. As the name suggests, you can get all the updates on Kali Linux and your repositories in one place by running this script.LazyKali adds quite a few tools to Kali Linux.Bleeding Edge ReposAngryIP ScannerTerminatorXchatUnicornscanNautilus Open TerminalSimple-DuckySubterfugeGhost-PhisherYamasPwnStarEttercap0.7.6XssfSmbexecFlashJavaEasy-CredsJava… and more!Lazy-Kali will also update Kali, Start Metaploit Services, Start Stop And Update Open-VasThis is the first version, script is self updating so more will be added in a short time.* Warning: Disable firewall or Internet Security application if your Kali Linux is installed in a virtual machine.To install the script on Kali Linux, run./lazykali.shon root terminal window. If you get a message Permission Denied, then first type:chmod +x lazykali.shand./lazykali.shif the script is not installed it may prompt you to install. Type Y to install the script.Once the script is installed, it will check the version. If the version is old, allow it to update by typing Y. Once execute, you will get a command line interface. Check the below screenshot of the tool.If Kali Linux is not updated, then type 1 to update Kali Linux. Once it is updated, type 6 to check available tools that LazyKali offers you.Type 3 to install Hackpack. It will prompt you to install Hackpack. Type Y to install Hackpack.Now click on Applications on the top left corner of Kali Desktop and you will find Hackpack tab.One advantage of LaziKali is that you can modify the code and add some extra tools to this script to save time and effort.Download Link: https://github.com/bradfreda/Lazykali

Link: http://netsectr.blogspot.com/2017/05/lazykali-kali-linux-tutorial.html

How to use Public IP on Kali Linux

Today through this article you will learn how an attacker can use anonymous VPN service to occupy public IP which will surly expand the area of your target list and you will be able to attack outside your network also. Let’s Start! In your kali Linux Open the terminal and type following command to start… Continue reading →
The post How to use Public IP on Kali Linux appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/use-public-ip-kali-linux/

Snorter: A automatic Snort, Barnyard2, and PulledPork Installer!

All of us know about Snort, the open-source, free and lightweight network intrusion detection system (NIDS) software for Linux & Windows to detect emerging threats. Also, all of us know that if you want to install Snort, Barnyard2 & PulledPork on a lot of machines, it get’s a lot more time consuming and well monotonous. … Continue reading “Snorter: A automatic Snort, Barnyard2, and PulledPork Installer!"
The post Snorter: A automatic Snort, Barnyard2, and PulledPork Installer! appeared first on PenTestIT.

Link: http://feedproxy.google.com/~r/PenTestIT/~3/3gwGBc1BFsI/

Exploit Remote Windows PC with Eternalblue & Doublepulsar Exploit in Metasploit

Through this article we are sharing recent zero day exploit which requires metasploit framework to shoot any other windows based system. This exploit is combination of two tools “Eternal Blue” which is use as backdooring in windows and “Doublepulsar” which is used for injecting dll file with the help of payload. So we will manually… Continue reading →
The post Exploit Remote Windows PC with Eternalblue & Doublepulsar Exploit in Metasploit appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/exploit-remote-windows-pc-eternalblue-doublepulsar-exploit-metasploit/