Exploit Remote PC with SSL Certified Meterpreter Payload using MPM
Through this article you can learn how an attacker would able to generate a SSL certificate for any exe or bat file payloads so that he might be able to establish a connection with host through...
View ArticleNetcat Tutorials for Beginner
In the field of hacking most utilized and powerful tool use by attack is popularly known as “Netcat” which is a computer networking function for analyzing from and writing to network connections using...
View ArticleExploit Windows PC using EternalBlue SMB Remote Windows Kernel Pool Corruption
This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size is...
View ArticleHow to set up SQLI Lab in in Kali
Hello everyone, with the joy of having new kali version somewhere few of us are having hard time in setting Dhakkan (AUDI-1) sql series lab in our kali machine.So today we’ll be learning how to setup...
View ArticleHack Legal Notice Caption of Remote PC
Registry key play an important role in operating system attacker makes use of legal notice registry key to send threaten message on targeted system so that once the system is boot up the user can read...
View ArticleBeginner Guide of SQL Injection (Part 1)
SQL injection is a technique where malicious user can inject SQL Commands into an SQL statement via web page.An attacker could bypass authentication, access, modify and delete data within a database....
View ArticleManual SQL Injection Exploitation Step by Step
This article is based on our previousarticle where you have learned different techniques to perform SQL injection manually using dhakkan. Today we are again performing SQL injection manually on a live...
View ArticleHow to Bypass Filter in SQL Injection Manually
In previous article you have learned the basic concepts of SQL injection but in some scenarios you will find that your basic knowledge and tricks will fail. The reason behind that is the protection...
View ArticleHack the Super Mario (CTF Challenge)
Hello friends!! Might you people have played THE SUPER MARIO game once in your childhood and no wonder if a thought have been strike in your mind to hack the game. So whatever you had thought today we...
View ArticleBypass Admin access through guest Account in windows 10
Open command prompt and check windows user account status using “whoami” command.Account name is “joe” and account status is ‘DefaultAccount’ which is a non-administrator account type.Try changing...
View ArticleForm Based SQL Injection Manually
In our previous article we had perform Form Based SQL injection using sqlmap but today we are going to perform Form Based SQL injection in DHAKKAN manually. There are so many example related to login...
View ArticleUnderstanding the CSRF Vulnerability (A Beginner Guide)
Today we will see CSRF attack in different scenario like transferring fund and password changing but before we see how cross site request forgery works we need to understand of few concepts.Tabbed...
View ArticleBypass UAC Protection of Remote Windows 10 PC (Via FodHelper Registry Key)
Hello friends! Today we are going to share new article related to how to bypass window 10 UAC once you have hacked the victim’s system. In metasploit a new module has been added to achieve admin access...
View ArticleCSRF Exploitation using XSS
Hello friends! In our previous article we saw how an attacker can shoot web application against CSRF vulnerability with help of burp suite. Today again we are going to test CSRF attack with help of XSS...
View ArticleDumping Database using Outfile
In our previous article you have learned the basic concepts of SQL injection but in some scenarios you will find that your basic knowledge and tricks will fail. Today we are going to perform...
View ArticleHow to Spider Web Applications using Burpsuite
Hello friends! Today we are doing web penetration testing using burp suite spider which very rapidly crawl entire web application and dump the formation of targeted web site.Burp Spider is a tool for...
View ArticleDatabase Penetration Testing using Sqlmap (Part 1)
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticleBeginner Guide to File Inclusion Attack (LFI/RFI)
You can insert the content of one PHP file into another PHP file before the server executes it, with the include () function. The function can be used to create functions, headers, footers or element...
View ArticleBeginners Guide to Cross Site Scripting (XSS)
Java ScriptJavaScript is the programming language of the web. It's one of the most popular and in demand skills in today's job market for good reason. JavaScript enables you to add powerful...
View ArticleUnderstanding DOM Based XSS in DVWA (Bypass All Security)
This article is written to bring awareness among all security researchers and developers so that they may be able to learn the level of damage cause by XSS attack if the web server is suffering from...
View Article