SSH Password Testing With Hydra on Kali Linux

Introduction Hail Hydra! Okay, so we're not talking about the Marvel villains here, but we are talking about a tool that can definitely do some damage. Hydra is a popular tool for launching brute force attacks on login credentials. Hydra has options for attacking logins on a variety of different protocols, but in this instance,…Read more SSH Password Testing With Hydra on Kali Linux

Filtering Packets In Wireshark on Kali Linux

Introduction Filtering allows you to focus on the exact sets of data that you are interested in reading. As you have seen, Wireshark collects everything by default. That can get in the way of the specific data that you are looking for. Wireshark provides two powerful filtering tools to make targeting the exact data you…Read more Filtering Packets In Wireshark on Kali Linux

Test WordPress Logins With Hydra on Kali Linux

Introduction There are web forms all over the Internet. Even sites that don't usually allow regular users to log in probably have an admin area. It's important when running and deploying a site to make sure that the passwords gating access to sensitive controls and admin panels are as secure as possible. There are different…Read more Test WordPress Logins With Hydra on Kali Linux

Anatomy of a MITM attack PT 2

Introduction In this part of the series, we’re going to use our Kali based attacker’s machine to scan the local network and find our Windows target. We’ll then carry out an ARP Poisoning based MITM attack against it as we explained in part 1. Once we have obtained a MITM position, we can then passively…Read more Anatomy of a MITM attack PT 2

Anatomy of a MITM attack PT 1

Introduction A short while ago, Google and Mozilla announced that they would be starting to show more prominent warnings in Chrome and Firefox when visiting sites over HTTP and not HTTPS, particularly if those sites ask for passwords or credit card details. This is because any data that you send to a server over HTTP…Read more Anatomy of a MITM attack PT 1

Hacking Guide (Basics -> Intermediate)

_________________________-[ Hacking Guide ]-_________________________ A complete and thorough beginners guide to the art of hacking. _____________________________________________________________________ Table of Contents: 0x01| What is hacking? 0x02| HTML / JavaScript Manipulation 0x03| Basic Web Hacking Techniques 0x04| Brief introduction to crypto 0x05| Intermediate level Web Exploitation 0x06| Linux/UNIX Exploitation 0x07| Credits ==> 0x01 ["What is hacking?"]; First off,…Read more Hacking Guide (Basics -> Intermediate)

Web vulnerabilities to gain access to the system

[ Content 1 - Introduction 2 - Local and Remote File Inclusion (LFI/RFI) 2.1 - Introduction 2.2 - Executing commands remotely 2.2.1 - Injecting PHP code into apache logs 2.2.2 - Injecting PHP code into process table 2.2.3 - Injecting PHP code into an image 2.2.4 - Injecting PHP code into session files 2.2.5 -…Read more Web vulnerabilities to gain access to the system