Burpsuite Encoder & Decoder Tutorial
Burpsuite Decoder can be said as a tool which is used for transforming encoded data into its real form, or for transforming raw data into various encoded and hashed forms. This tool is capable of...
View ArticleForensic Imaging through Encase
Scenerio: Mr X is suspected to be involved in selling his company’s confidential data to the competitors, but without any evidence no action could be taken against him. To get into reality and proof Mr...
View ArticleHack the USV: 2017 (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as USV: 2017. The credit for making this vm machine goes to “Suceava University” and it is another capture the flag challenge in...
View ArticlePost Exploitation on Windows PC (System Command)
This article is about Post Exploitation on the Victim’s System using the Windows Command Line. When an Attacker gains a meterpreter session on a Remote PC, then he/she can enumerate a huge amount of...
View ArticleDigital Forensics Investigation using OS Forensics (Part1)
About OSForensicsOSForensics from PassMark Software is a digital computer forensic application which lets you extract and analyse digital data evidence efficiently and with ease. It discovers,...
View ArticleBypass Firewall Restrictions with Metasploit (reverse_tcp_allports)
IntroductionNetwork Address Translation generally involves re-writing the source and/or destination addresses of IP packets as they pass through a router or firewall (from...
View ArticleBeginners Guide to Burpsuite Payloads (Part 2)
Hello Friends!! In our previous article part1 we had discussed how to perform brute force attack on any web application server for making unauthorized login into it using some Payload of Burpsuite. In...
View ArticleWordpress Exploitation using Burpsuite (Burp_wp Plugin)
Burp_wp is an extension of burpsuite used to scan and find vulnerabilities in wordpress plugins and themes using burpsuite proxy. It was created by Kacper Szurek and can be downloaded from here.Let’s...
View ArticleDigital Forensics Investigation through OS Forensics (Part 2)
In Part 1 of this article we have covered Creating case, File Search and Indexing. This article will cover some more features/ functionalities of OSForensics.For Part 1 if this article click...
View ArticleNmap Scans using Hex Value of Flags
In this article we are going to scan the target machine by sending TCP flags through their hexadecimal value and the actual Flag name can be confirm by analysis of Nmap traffic through Wireshark. Let’s...
View ArticlePost Exploitation Using WMIC (System Command)
This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gain a meterpreter session on a Remote PC, then he/she can enumerate a huge...
View ArticleConvert Virtual Machine to Raw Images for Forensics (Qemu-Img)
This is a very handy little application. It’s been developed by the QEMU team. The software is very useful when dealing with virtualization, Qemu-img is available for both windows and Linux. Its...
View ArticleDigital Forensics Investigation through OS Forensics (Part 3)
In Part 2 of this article we have covered Recent Activity, Deleted File Search, Mismatch File Search, Memory Viewer and Prefetch Viewer. This article will cover some more features/ functionalities of...
View ArticleHack the VM Bsides London 2017(boot2root)
Hello friends! Today we are going to take another CTF challenge known as Bsides London 2017. The credit for making this vm machine goes to “Hacker House” and it is another boot2root challenge in which...
View ArticlePayload Processing Rule in Burp suite (Part 1)
Hello friends!! Today we are going to discuss “Payload Processing” option of Burpsuite which is advance functionality comes under Intruder Tab for making brute force attack. Payload ProcessingPayload...
View ArticleHack the C0m80 VM (Boot2root Challenge)
Hello friends! Today we are going to take another CTF challenge known as C0m80. The credit for making this vm machine goes to “3mrgnc3” and it is another boot2root challenge in which our goal is to get...
View ArticleEngagement Tools Tutorial in Burp suite
Hello friends!! Today we are going to discuss Importance of Engagement toolswhich is a Pro-only feature of Burp Suite. It is mainly use in information gathering and hence the analysis of any web...
View ArticlePayload Processing Rule in Burp suite (Part 2)
Hello friends!! Today we are going to discuss “Payload Encoding” option followed by payload processing of Burpsuite which is advance functionality comes under Intruder Tab for making brute force...
View ArticleBeginner Guide to IPtables
Hello friends!! In this article we are going to discuss on Iptables and its uses. Iptablesis a command-line firewall, installed by default on all official Ubuntu distributions. Using Iptables, you can...
View ArticleBind payload using SFX archive with Trojanizer
The Trojanizer tool uses WinRAR (SFX) to compress the two files input by user, and transforms it into an SFX executable (.exe) archive. The SFX archive when executed it will run both files (our payload...
View Article