Skip to main content

Posts

setting up persistent connection using meterpreter

setting up persistent connection using meterpreter expert metasploit penetration testing course episode 26 for all course please follow this link expert metasploit penetration testing course

FUZZBUNCH DEMO : leaked CIA tool

Just to show how powerful this tool is

Best Vulnerability Scanners Tools

Best Vulnerability Scanners Tools    The scanners which assess the vulnerability of a network or a computer to security attacks are known as Vulnerability Scanners. The tools might function differently, however all of them aim to provide an analysis on how vulnerable the system or a network is. Here is a list of the best ones:   Nessus Nessus is the world’s most popular vulnerable scanner topping the list in the years 2000, 2003 and in the year 2006 survey on security tools. It’s a free to use vulnerability scanner for personal use in the non enterprise environment. OpenVAS This scanner is tipped by many to be the most advanced vulnerability scanner in the world and is a powerful and comprehensive tool for scanning as well as providing solutions for vulnerability management. It is free software and is maintained daily. Nipper It is a parser for network infrastructure and its full form is Network Infrastructure Parser. This open sour...

shadow Brokers leaked files

Exploits EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other...

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks

New Attack Called “XSSJacking” Discovered That Combined of Clickjacking, Pastejacking and Self-XSS Attacks A New Attack method called “XSSJacking” a type of Web application Clickjacking, Pastejacking and Self-XSS  Web application based Attack Discovered by the Security Researcher Dylan Ayrey. While Clickjacking vulnerability existing in particular page, this attack will trigger Self-XSS. “Self – XSS is a social engineering attack used to gain control of victims’ web accounts.In a self – XSS attack, the victim of the attack accidentally runs malicious code in his/her own web browser, thus exposing it to the attacker “ Clickjacking Attack performs when an attacker to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. How “XSSJacking” Works...

hackers heroes of the computer revolution

hackers heroes of the computer revolution view book

How To access Deep Anonymous web and know its Secretive and Mysterious activities

How To access Deep Anonymous web and know its Secretive and Mysterious activities What is Deep Web The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The opposite term to the deep web is the surface web. The deep web includes many very common uses such as web mail, online banking but also paid for services with a paywall such as video on demand, and many more. This part of the Internet is known as the Deep Web, and it is about 500 times the size of the Web that we know. The Deep Web vs. The Dark Web Deep Web is  the portion of the Internet that is hidden from conventional search engines, as by encryption; the aggregate of unindexed websites The  Dark Web   on the other hand, is defined as “the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser: ...