Monthly Archives: January 2018

Bypassing antivirus programs using SHELLTER

Shellter is another antivirus evasion tool like veil-evasion framework, which infects the PE dynamically, can be used to inject the shell code into any 32-bit native Windows application. This framework enable us to either customize the payload or utilize the Metasploit framework in a...

Penetration Testing using JexBoss (Practical Guide)

Today we are going to learn about penetration testing using JexBoss. This tool used for penetration testing and exploiting vulnerabilities/weaknesses in JBoss Application Server and other Java Application Servers (for example, WebLogic, GlassFish, Tomcat, Axis2, and so on). This tool is not available in...

Penetration Testing Network Routers using RouterSploit

In this article we're going to discuss penetration testing network routers using RouterSploit in a beginner's way. Basically RouterSploit is a router exploitation framework or we can say penetration testing framework for routers, designed especially for embedded devices.This framework can perform three main modules:...

Penetration Testing Embedded Devices

Let's discuss about penetration testing embedded devices. First we need to know about embedded devices and their types then we'll cover penetration testing embedded devices and I would recommend you to follow this practical guide for penetration testing into IPSec VPNs if you are...

How to create Evil Access Point? Kali NetHunter Guide

Today we are going to learn about how to create evil access point in Kali NetHunter. MANA toolkit is used to create evil access point launched by SensePost, which can be used to perform Wi-Fi, Access Point (AP), and MITM attacks. Whenever a victim...

Cost of Collisions Calculator App Released by NETS for Employers

Here is everything you need to know about Cost of Collisions Calculator App released by NETS. This app is specifically for employers, which NETS developed through cooperative settlement with the National Highway Traffic Safety Administration, to measure their firm's cost of crashes. Cost of Collisions Calculator...

Compromise SSH (Secure Shell) using Kali Linux

In this article we are going to discuss how to penetrate or compromise SSH (Secure Shell) using Kali Linux. Basically secure shell (SSH) protocol is a network protocol mainly used to establish an encrypted communication channel across an open network between a server and...