Creating Persistent Backdoor By Metasploit in Kali Linux

MODULE 13:- Metasploit Framework 6 Metasploit Modules – You should know MSFvenom replacement of MSFpayload and msfencode – Full guide 6 Techniques to analyze the vulnerability scan report in Metasploit How to use Metasploit for vulnerability scanning How to use metasploit pro in Kali Linux Creating Persistent Backdoor By Metasploit in Kali Linux Creating Trojan Read more about Creating Persistent Backdoor By Metasploit in Kali Linux[…]

Creating a Backdoor encoded by msfpayload

Backdoor A backdoor is a program, therefore, A security researcher can generate, upload, and execute a backdoor program. Backdoors do not work with any functional program for example Trojan horse, but they are hidden inside such type program. Many of Trojan horse have hidden backdoor inside it. In this tutorial you will be able to Read more about Creating a Backdoor encoded by msfpayload[…]

Windows 7 Trick to shutdown PC (applies to every window BTW!!)

Remember the 1st time Remember the 1st time you see a real cool thing your friend does with your computer that can be seen by others as a virus, and you want to learn it too because your friend seems soo smart at that time you wanna be like him. let’s make you better then Read more about Windows 7 Trick to shutdown PC (applies to every window BTW!!)[…]

Top 10 Tools Used For Maintaining Access of Exploited System

MODULE 8:- System Hacking How to get administrator privileges on windows 10 Best keylogger Windows 10 pc – Full tutorial Keystroke logging with keystroke recorder and its types Top 10 Tools Used For Maintaining Access of Exploited System Maintaining access of exploited system A security analyzer or an IT expert may be knowledgeable in the phrasing Read more about Top 10 Tools Used For Maintaining Access of Exploited System[…]

Honeypot

MODULE 12:- Network Security Honeypot Firewall: A Network Security Tool The Evil that is hacking We gotta prevent it at any cost. To prevent it, we gotta take into account the hubris of the hackers and mow their asses down. That’s where the device HoneyBOT come in. But 1st, the basics that even i didn’t Read more about Honeypot[…]

Firewall: A Network Security Tool

MODULE 12:- Network Security Honeypot Firewall: A Network Security Tool Firewall  What is Firewall? Well, its not as pretty as you see above. To a layman in computer techniques a firewall is a software that protects your PC from the poisons of the internet. I thought so too, but the more I thought about it Read more about Firewall: A Network Security Tool[…]

4 methods of Network Scanning for Live Host by Kali Linux

Network Scanning by nmap ping sweep for Live Host

MODULE 5:- Scanning Network and Vulnerability Introduction of port Scanning – Penetration testing TCP IP header flags list Examples of Network Scanning for Live Host by Kali Linux important nmap commands in Kali Linux with Example Techniques of Nmap port scanner – Scanning Nmap Timing Templates – You should know Nmap options for Firewall IDS evasion Read more about Network Scanning by nmap ping sweep for Live Host[…]

Magical Code Injection Rainbow (MCIR) feature

The Magical Code Injection Rainbow (MCIR) in Metasploitable2

The Magical Code Injection Rainbow (MCIR) a Web-based training projects Dan Crowley, a data security aficionado and independent resheacher with Trustwave, has composed and brought forth five exceptionally amazing training suites. His Web-based training projects are easy to explore and come with different testing levels. His most recent creation is a pound up of his web Read more about The Magical Code Injection Rainbow (MCIR) in Metasploitable2[…]

Setup Attacker platform 0

Setting Up a Virtual Machine For Kali Linux on VirtualBox

To keep everything in a virtualized lab, It is a great idea to create a Virtual Machine can run Kali Linux. The steps below describe to setup Virtual machine to run Kali Linux as a Live Boot. Open VirtualBox and Click in the New button Give name for new virtual machine. Set the type to: Read more about Setting Up a Virtual Machine For Kali Linux on VirtualBox[…]

Installation Virtual Box on Window 0

Installing VirtualBox on Microsoft Windows 7 & 8

Open the following link in web browser and make sure you typed exact similar as given. Link: https://www.virtualbox.org/wiki/Downloads select correct version according your Operating System and architecture. After the competing download, run excutable file of virtualBox. A welcome dialog box will be open, Click the Next button to continue process. Note: In this tutorial I am going Read more about Installing VirtualBox on Microsoft Windows 7 & 8[…]