PRINT
PRINT
SEND MAIL
SEND MAIL

Category: TUTORIALS

TUTORIALS

Logical Acquisition on an iOS device

What are the operating modes of an IOS device?When it comes to iOS forensics it is really an important issue to understand and distinguish between the diverse operating modes that an iOS device could be working on. There are in fact three modes that are available for an iOS device to be working on. These include Normal Mode, Recovery Mode, and DFU Mode. An examiner shall be aware of such modes to turn a device into it while performing forensics on it. This aspect…

TUTORIALS

Metasploitable 3: Exploiting HTTP PUT

In this hacking tutorial we will be exploiting the HTTP PUT method on one of the Metasploitable 3 webservers to upload files to the webserver. If the HTTP PUT method is enabled on the webserver it can be used to upload a specified resource to the target server, such as a web shell, and execute it. In this tutorial we will look at how to determine if the HTTP PUT method is enabled and we’ll be using several different methods to upload a Meterpreter…

TUTORIALS

Fix openvas metasploit plugin errors (Object#timeout is deprecated, use Timeout.timeout instead.)

Open openvas plugin with favorite text editor like this: leafpad /usr/share/metasploit-framework/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb locate the line 201 and replace : timeout(@read_timeout) { with  Timeout.timeout(@read_timeout) { Done ! close any open  metasploit console/terminal and load metasploit-framework again from a new terminal!

TUTORIALS

How to bypass authentication on Windows Server 2008 R2

In this article we will be looking at how easy it is to bypass authentication and reset the administrator password on a Windows Server 2008 R2 installation. This technique requires us to have physical access to the machine that is running the Windows server or have access to the management interface of the hypervisor when Windows Server 2008 R2 is running virtualized. This is not a great ‘hacking’ technique that can be used to pwn all Windows installations but it is more a sysadmins…

TUTORIALS

How to install Kerberos!

Download  Roza writer to create your usb :   for windows   Linux 64   Linux 32 Open Roza Writer press the button with the folder, locate your Kerberos iso  select your drive and hit write! Errors and Fixes No grub after installation or grub fail to install durring the installation If for some reason the installer failed to install grub , don't panic!! You can fix this with  any linux distribution you have or just download a  ubuntu xenial iso and go on live mode and…

TUTORIALS

The Top 5 Pen Testing Tools You Will Ever Need

There is little doubt right now that the menace panorama is altering every day. It looks like that hardly one menace is found that many unknown ones are nonetheless lurking. One of the perfect methods for companies and companies to defend themselves is thru Penetration (Pen) Testing. This article will present an outline of what Pen Testing is, its advantages, and probably the most generally used instruments used right now. Generally talking, a Penetration Test (also referred to as a “Pen Test”) is a…