Friday, October 13, 2017

Hack Windows 7 PC using USB Device and SET Toolkit (Infectious Media Generator Attack)

Infectious Media Generator is a relatively simple attack vector. SET will create a Metasploit-based payload, setup a listener for you and generate a folder that needs to be burned or written to a DVD/USB drive. Once inserted, if AutoRun is enabled, the code will automatically execute and take control of the machine.

Hack Remote PC using Payload in BackTrack 5

Open Your Backtrack terminal and Type cd  /pentest/exploits/set
Now Open Social Engineering Toolkit (SET) ./set

How to Hack Email using Web Jacking Method

The web jacking attack method will create a website clone and present the victim with a link stating that the website has moved. This is a new feature to version 0.7. When you hover over the link, the URL will be presented with the real URL, not the attacker’s machine. So for example if you’re cloning gmail.com, the URL when hovered over it would be gmail.com. When the user clicks the moved link, Gmail opens and then is quickly replaced with your malicious webserver. Remember you can change the timing of the webjacking attack in the config/set_config flags.
Requirement Backtrack 5

How to Hack Windows XP in LAN using Backtrack 5

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.
Requirements
  • Backtrack  5
  • Windows XP Machine (Target)

Bypassing Antivirus using Multi Pyinjector Shell Code Injection in SET Toolkit

Open your backtrack terminal & Type cd /pentest/exploits/set.
Now Open Social Engineering Toolkit (SET). /set

Hack Remote PC using HTA Attack in SET Toolkit

The HTA Attack method will allow you to clone a site and perform powershell injection through HTA files which can be used for Windows-based powershell exploitation through the browser.

Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit

First open your kali Linux application tab in Exploitation Tools and then chose SET Toolkit

Denial of Service Attack on Network PC using SET Toolkit

First open your kali Linux application tab in Exploitation Tools and then chose SET Toolkit

Create SSL Certified Meterpreter Payload Using MPM

Through this article you can learn how an attacker would able to generate a SSL certificate for any exe or bat file payloads so that he might be able to establish a connection with host through meterpreter session.

5 Ways to Crawl a Website

A Web crawler, sometimes called a spider, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing .A Web crawler starts with a list of URLs to visit, called the seeds. As the crawler visits these URLs, it identifies all the hyperlinks in the page and adds them to the list of URLs to visit.  If the crawler is performing archiving of websites it copies and saves the information as it goes. The archive is known as the repository and is designed to store and manage the collection of web pages. A repository is similar to any other system that stores data, like a modern day database.Let’s Begin!!

Bypass Admin Access Through Guest Account in Windows 10

Open command prompt and check windows user account status using “whoami” command.
Account name is “joe” and account status is ‘DefaultAccount’ which is a non-administrator account type.
Try changing administrator using the ’net user’ command.

How To Crack A WPA2-PSK Password With Windows


It's very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lots of tutorials to How to hack a WiFi password using backtrack. However, backtrack OS is not the most handy OS for normal users.

Thursday, January 19, 2017

10 Essential Open Source Security Tools

There are thousands of open source security tools with both defensive and offensive security capabilities.The following are 10 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the essential rating due to the fact that they are effective, well supported and easy to start getting value from.

Tuesday, January 3, 2017

Essential Hacking Tools For Every Hacker

Here is a list of all the essential hacking tools that every hacker should possess.Here in this post I will give details of different Hacking/Security tools and utilities along with the download links.

Best of Social Engineering Toolkit Attack

Denial of Service Attack on Network PC using SET Toolkit Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit Hack R...