Most of us have heard of msfvenom or or at least metasploit backdoors, they’re great but they get detected by anti-virus programs, we also know we can use a tool called Veil-Evasion to generate backdoors that bypass most anti-virus programs, …
Ninja KeyLogger and Analysis Console Synopsis: This KeyLogger was written as a passive penetration testing tool as a ‘plug and forget payload’. It is used essentially to spy on compromised machines as a part of Post Exploitation attacks. It can also …
Two days ago the newest version of Kali 2018.1 was released, as usual this brought a bunch of update, upgrades, patches and bug fixes. One of the major components that got updated in this release is the kernel, Kali 2018.1 …
One of the most common questions that I get in my courses if not the most common questions is “I imported virtual box image, started the machine and got a blank black screen”, this is basically just a black screen …
Hello, today I’m gonna share my knowledge about how to gather information of a website before you attack it or discover any vulnerabilities. Commonly, hackers they call this phase as Reconnaissance. Which means you are going to collect useful information …
We all used a captive portal at some stage, these are open networks that you can connect to without a password, but then it would ask you to sign in to access the internet, captive portals are usually used in …