Home Tags Kali

Tag: Kali

kali

privilege escalation in metasploitable 2 machine

Privilege Escalation in Metasploitable 2 Machine

After a break of months, I finally urged myself to start writing information security blogs again. Hope, I do my best to deliver a...

Pakistan First OSCE Certified

Etizaz Mohsin is Pakistan first OSCE Certified who successfully achieved Offensive Security Certified Expert Certification (OSCE) along with Offensive Security Certified Professional Certification (OSCE)....

OSCP / PWK Exam Review

Overview Offensive Security Certified Professional Certification is self proclaimed to be the first hands-on offensive information security certification, built and designed to challenge OSCP students...

Linux Essential Root Subdirectories

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains...

After NSA hacking expose, CIA staffers asked where Equation Group went...

Two days after researchers exposed a National Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online...

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application....

Bypass HTTP Basic Authentication with Nmap and Metasploit

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user...

How to configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network...

Top 33 Wireless Attacking Tools by Kali

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1....

North Korea hacks South’s military cyber command

According to news released by BBC, South Korea's military cyber command, set up to guard against hacking, appears to have been breached by North...

DailyMotion Allegedly Hacked, 85 Million User Accounts Stolen

This time one of the World's leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker...

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system...

US Government wants you to hack US Military and Pentagon

Usually you won't see any organization or institution allowing you to hack their internal system for any cause but this time without getting into...

Massive DDOS attack against Dyn DNS knocked out Popular Websites

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host...

Czech police arrest Russian hacker tied to 2012 LinkedIn hack

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company...