Monthly Archives: December 2017

Develop Windows Exploits (Complete Guide)

In this lengthy article we are going to discuss how to develop windows exploits. If you want to be a successful Ethical Hacker or Penetration tester you should have a fair understanding/knowledge of the assembly language to develop windows exploits (custom exploits). Let us...

Penetration Testing IPSec VPN (Virtual Private Network)

In this article we are going to discuss Penetration Testing IPSec VPN (Virtual Private Network). VPN provide secure (encrypted) communications between remote locations or users within the same network through internet. Basically there are two types of VPNs: IPSec VPN and SSL VPN. IPSec is...

Compromise Remote Access Protocols

Let us discuss about how we can compromise remote access protocols. There was a time when applications that bypass system protocols to provide remote access were famous. Those applications are presently being replaced with online services like GoToMyPC or LogMeIn, they are still quite...

KRACKs Attacks All Things You Need to Know About

In this article we are going to discuss KRACKs attacks. We have witnessed severe weaknesses in WPA2, a protocol that secures all trendy protected Wireless networks. An attacker inside vary of a target can exploit these weaknesses utilizing key reinstallation attacks popularly known as KRACKs....

How Buffer Overflow Attacks Work in Kali Linux

Here is all you need to know about Buffer Overflow Attacks process, how they work? and how to make yourself root user on a computer using a buffer overflow attack in Kali Linux? you may want learn about Fileless attacks also?...

RDPY Security Tool Penetrate into Remote Desktop Protocol

RDPY security tool is a Microsoft RDP Security tool developed in pure Python with RDP (MITM) proxy help. This permits a consumer to document classes and develop honeypot performance. It helps each Microsoft RDP (Distant Desktop Protocol) protocol consumer and server aspect. RDPY security tool...

WAFNinja Kali Linux tool to Bypass WAF

I have added a video tutorial about WAFNinja Kali Linux tool to understand this python tool which can bypass WAF. Basically WAFNinja is a CLI (Command Line Interface) python software that helps penetration testers to bypass Internet Software Firewall by automating steps essential for...

WPSeku Kali Linux (WordPress Security Scanner) Guide

WPSeku Kali Linux (Wordpress Security Scanner) is a blackbox WordPress vulnerability scanner that can be utilized to scan distant WordPress installations to seek out safety points. Also read this updated article on MSF methodologies Abilities of WPSeku WordPress Security Scanner(adsbygoogle =...

(Guide) Export WordPress Users Information to a CSV File

This is a simple and basic guide to export wordpress users information to a CSV file. The default WordPress export tool doesn't embrace user accounts. It lets you create user accounts through the import, provided that these users have content material. This excludes user roles with no...

WordPress Complete Security Guide in one Article

Yes we are going to discuss now Wordpress Complete Security Guide in one Article. WordPress safety is a subject of big significance for each web site proprietor or a blogger. Every week, Google blacklists round 20,000 web sites for malware and round 50,000 for...