My Hack Stuff https://myhackstuff.com Exploring Things on Internet Sat, 03 Feb 2018 09:47:04 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.4 https://myhackstuff.com/wp-content/uploads/2018/02/cropped-log-32x32.jpg My Hack Stuff https://myhackstuff.com 32 32 How to Perform Browser Autopwn using Metasploit https://myhackstuff.com/browser-autopwn-metasploit/ https://myhackstuff.com/browser-autopwn-metasploit/#respond Sat, 03 Feb 2018 09:47:04 +0000 https://myhackstuff.com/?p=902 Let us discuss about performing browser autopwn that how this module works. This auxiliary module used for performing client-side attacks. Now we need to explore how this module works. Following are steps of browser autopwn. Attacker/Penetration Tester executes the browser_autopwn auxiliary module. Web server is started (on the attacker’s system), which hosts a payload which is accessible …

The post How to Perform Browser Autopwn using Metasploit appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/browser-autopwn-metasploit/feed/ 0
Bypassing antivirus programs using SHELLTER https://myhackstuff.com/shellter-bypassing-antivirus-programs/ https://myhackstuff.com/shellter-bypassing-antivirus-programs/#respond Fri, 26 Jan 2018 18:16:30 +0000 https://myhackstuff.com/?p=897 Shellter is another antivirus evasion tool like veil-evasion framework, which infects the PE dynamically, can be used to inject the shell code into any 32-bit native Windows application. This framework enable us to either customize the payload or utilize the Metasploit framework in a sophisticated way. Most antivirus programs will not be able to identify …

The post Bypassing antivirus programs using SHELLTER appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/shellter-bypassing-antivirus-programs/feed/ 0
Penetration Testing using JexBoss (Practical Guide) https://myhackstuff.com/penetration-testing-using-jexboss/ https://myhackstuff.com/penetration-testing-using-jexboss/#respond Thu, 18 Jan 2018 17:59:03 +0000 https://myhackstuff.com/?p=890 Today we are going to learn about penetration testing using JexBoss. This tool used for penetration testing and exploiting vulnerabilities/weaknesses in JBoss Application Server and other Java Application Servers (for example, WebLogic, GlassFish, Tomcat, Axis2, and so on). This tool is not available in Kali Linux you need to download it manually from GitHub. Practical …

The post Penetration Testing using JexBoss (Practical Guide) appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/penetration-testing-using-jexboss/feed/ 0
Penetration Testing Network Routers using RouterSploit https://myhackstuff.com/penetration-testing-network-routers-routersploit/ https://myhackstuff.com/penetration-testing-network-routers-routersploit/#respond Tue, 16 Jan 2018 15:55:38 +0000 https://myhackstuff.com/?p=881 In this article we’re going to discuss penetration testing network routers using RouterSploit in a beginner’s way. Basically RouterSploit is a router exploitation framework or we can say penetration testing framework for routers, designed especially for embedded devices. This framework can perform three main modules: exploiting module: contains list of all the publicly available exploits. …

The post Penetration Testing Network Routers using RouterSploit appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/penetration-testing-network-routers-routersploit/feed/ 0
Penetration Testing Embedded Devices https://myhackstuff.com/penetration-testing-embedded-devices/ https://myhackstuff.com/penetration-testing-embedded-devices/#respond Sun, 14 Jan 2018 15:03:30 +0000 https://myhackstuff.com/?p=869 Let’s discuss about penetration testing embedded devices. First we need to know about embedded devices and their types then we’ll cover penetration testing embedded devices and I would recommend you to follow this practical guide for penetration testing into IPSec VPNs if you are interested. Basically an embedded device is used for a special-purpose computing system, we …

The post Penetration Testing Embedded Devices appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/penetration-testing-embedded-devices/feed/ 0
How to create Evil Access Point? Kali NetHunter Guide https://myhackstuff.com/create-evil-access-point-kali-nethunter/ https://myhackstuff.com/create-evil-access-point-kali-nethunter/#respond Fri, 12 Jan 2018 21:06:47 +0000 https://myhackstuff.com/?p=861 Today we are going to learn about how to create evil access point in Kali NetHunter. MANA toolkit is used to create evil access point launched by SensePost, which can be used to perform Wi-Fi, Access Point (AP), and MITM attacks. Whenever a victim connects to our access point, this toolkit enable us to perform …

The post How to create Evil Access Point? Kali NetHunter Guide appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/create-evil-access-point-kali-nethunter/feed/ 0
Cost of Collisions Calculator App Released by NETS for Employers https://myhackstuff.com/cost-collisions-calculator-app-released-nets/ https://myhackstuff.com/cost-collisions-calculator-app-released-nets/#respond Mon, 08 Jan 2018 22:57:02 +0000 https://myhackstuff.com/?p=858 Here is everything you need to know about Cost of Collisions Calculator App released by NETS. This app is specifically for employers, which NETS developed through cooperative settlement with the National Highway Traffic Safety Administration, to measure their firm’s cost of crashes. Cost of Collisions Calculator App – Overview Network of Employers for Traffic Safety (NETS) …

The post Cost of Collisions Calculator App Released by NETS for Employers appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/cost-collisions-calculator-app-released-nets/feed/ 0
Compromise SSH (Secure Shell) using Kali Linux https://myhackstuff.com/compromise-ssh-secure-shell/ https://myhackstuff.com/compromise-ssh-secure-shell/#respond Wed, 03 Jan 2018 06:44:06 +0000 https://myhackstuff.com/?p=852 In this article we are going to discuss how to penetrate or compromise SSH (Secure Shell) using Kali Linux. Basically secure shell (SSH) protocol is a network protocol mainly used to establish an encrypted communication channel across an open network between a server and a client. Commonly, a public-private key pair allows users to log …

The post Compromise SSH (Secure Shell) using Kali Linux appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/compromise-ssh-secure-shell/feed/ 0
Develop Windows Exploits (Complete Guide) https://myhackstuff.com/develop-windows-exploits/ https://myhackstuff.com/develop-windows-exploits/#respond Fri, 29 Dec 2017 19:36:18 +0000 https://myhackstuff.com/?p=830 In this lengthy article we are going to discuss how to develop windows exploits. If you want to be a successful Ethical Hacker or Penetration tester you should have a fair understanding/knowledge of the assembly language to develop windows exploits (custom exploits). Let us cover some basics that are required to develop Windows exploits by …

The post Develop Windows Exploits (Complete Guide) appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/develop-windows-exploits/feed/ 0
Penetration Testing IPSec VPN (Virtual Private Network) https://myhackstuff.com/penetration-testing-ipsec-vpn/ https://myhackstuff.com/penetration-testing-ipsec-vpn/#respond Tue, 26 Dec 2017 18:46:41 +0000 https://myhackstuff.com/?p=821 In this article we are going to discuss Penetration Testing IPSec VPN (Virtual Private Network). VPN provide secure (encrypted) communications between remote locations or users within the same network through internet. Basically there are two types of VPNs: IPSec VPN and SSL VPN. IPSec is widely used protocol to establish secure connections between networks and connect …

The post Penetration Testing IPSec VPN (Virtual Private Network) appeared first on My Hack Stuff.

]]>
https://myhackstuff.com/penetration-testing-ipsec-vpn/feed/ 0