l
Headlines

YodaSec Expose

Exposing the corruption worldwide!

God Genesis

https://professionalhackers.in/godgenesis-a-python3-based-c2-server-to-make-life-of-red-teamer-a-bit-easier-the-payload-is-capable-to-bypass-all-the-known-antiviruses-and-endpoints/#mobile-site-navigation

Read More

Hacking

https://professionalhackers.in/category/hacking/

Read More

A Guide to Nessus Tool

Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. Nessus employs the Nessus Attack Scripting Language (NASL), a simple language that describes individual threats and potential attacks. Nessus has a modular architecture consisting of centralized servers that conduct scanning, and remote clients…

Read More

Messiah Walkthrough

We start by scanning the host with nmap -A -T4 -p- 192.168.1.17 -vv We scan port 80 with dirb http://192.168.1.17 /usr/share/dirb/wordlist/big.txt We got 2 important things, first the robot.txt file and an image, the robot.txt file: The text is encoded in 64code and we can decrypt it easy: The second thing is the image: Well…

Read More

Investigator Walkthrough

We scan the host with nmap -A -T4 -p- 192.168.1.6 -vv As it’s an Android environment we can see that the port 5555 is open for adb, we can connect to it very easily: If you don’t have adb installed install it with apt install adb. Now we in we can use “su” to become…

Read More

My Cmsms Walkthrough

We start by scanning the box with nmap -A -T4 -p- 192.168.1.9 -vv Scan with dirb http://192.168.1.9 /usr/share/dirb/wordlist/big Ok we got a CMSS webpage on port 80 and we have /admin/login.php page, CMS version 2.2.13 has no exploits as i searched. We need a username and password, so moving on we have MYSQL on port…

Read More

5 Important Steps to Secure Kali Linux

Kali Linux is one of best distro for hacking and penetration testing used by millions of people around the world. When you first install Kali Linux on your machine, you need to make sure it’s secured in the best way to be able to become anonymous on the web and also to make sure you…

Read More

Scan Your System Security with Lynis

Lynis is an extensible security audit tool for computer systems running Linux and Unix derivatives. It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening. Full Toturial: It performs an in-depth security scan and runs on the system itself. The primary goal is…

Read More

Hack Databases With Sqlmap & Kali Linux

Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is an open-source tool to use Sql injection in better and simpler way. FULL VIDEO TUTORIAL: Let’s go to see how to install this tool in your ubuntu machine and…

Read More
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security