Tag: hacking
-
What’s A WAF
To put it simply, a WAF is a Web Application Firewall. It can help to fill in the security gaps which a traditional firewall can’t.
-
Purple-Pages – Extension
Purple-Pages was designed to assist Security Engineers with their day to day activity……
-
Personal Passwords At Work
Although many big companies like Microsoft are trying to eradicate the need for passwords, they are still heavily used to secure our accounts and systems. These accounts and systems can be for personal use or for work……
-
Hacking Windows Remote Management (WinRM)
“Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that allows hardware and operating systems, from different vendors, to interoperate….
-
Windows Shell – Discovery Stage
Sometimes you don’t always need a Meterpreter shell. Depending on the intent, Netcat might be all you need. The benefit being that Windows Defender still doesn’t see Netcat as a threat which could get you a shell…….
-
Cracking Wireless Passwords With AirCrack-NG
Wireless hotspots are all around us. Some are open, and some may require you to enter a password before you can join. This control is to stop unauthorized access to the network………
-
Searching The ExploitDB Offline
The exploitDB is a wonderful place where you can find a massive amount of exploits, shellcodes and papers…….
-
Generating Custom Wordlists For Targeted Attacks
Rockyou.txt will only get you so far. When doing targeted attacks you might need something more specific to that user or site. This is when you want to generate your own wordlists to increase the chances of success……
-
Using Steganography To Hide Data In Plain Sight
Steganography is a way of hiding data in plain sight. With the use of steganography, you can hide data within other data files. Typically you would hide data inside an image, video or audio file. Here’s is how…
-
Creating A Rogue Access Point
Everyone is advertising free WiFi nowadays as a way to lure customers in. What these customers might not known is if the hotspot they are connecting to is genuine. It could be a Rogue AP setup by a malicious party in order to sniff your traffic. They provide you with free internet access and you provide them with all your network traffic. Here is how they do it.
-
How To Hack With Google Dorks
Google dorking or Google Hacking is a hacking technique that uses the advance search functionality in Googles search engine.