PRINT
PRINT
SEND MAIL
SEND MAIL

Month: June 2016

METASPLOIT TUTORIALS

Metasploitable 2 vulnerability assessment

A vulnerability assessment is a crucial part in every penetration test and is the process of identifying and assessing vulnerabilities on a target system. In this part of the tutorial we will be assessing the vulnerabilities available on the network side of the Metasploitable 2 virtual machine. We will be assessing the web applications on the Metasploitable 2 machine in a later tutorial. In the previous Metasploit enumeration and fingerprinting tutorial we’ve learned that the Metasploitable 2 machine contains a lot of vulnerabilities. We…

BUG FIXES

Fix Error message “/sbin/plymouthd: not found” is shown on booting (ubuntu xenial)

Manual fix: download manualy 1. plymouth from here 2. plymouth-label from here 3. plymouth-theme-ubuntu-logo from here Install all packages starting with plymouth via dpkg -i package-name.deb This has fixed the promplem for me!

TUTORIALS

Dos attack through tor network – safe and effective ddos tool 2016

Denial of service attacks is still effective and powerful attack against a web server.Even though we have plenty of tools available, most of them are not safe and can track any attacker but, “Torshammer” an awesome piece of python script can solve that problem. This script use the tor anonymity service to mask the user thus its comparatively safe. Dos attacks can be of various types based on the protocol or target. Here we are using a slow poisoning method that can target apache…

TUTORIALS

How to hack a router remotely – millions of routers still vulnerable 2016

A router is a gateway that connects a device to the internet with certain protocols. Hacking a router can be really serious, the attacker can take control over the whole network setup. Even in this 2016 millions routers are vulnerable to remote authentication. This is actually not a vulnerability but, a feature that can turn into hacker’s pathway to your network if its unsecured. In many router’s port 80 is forwarded by default to the public and setup for remote authentication. Typing the IP…