How to exfiltrate data using data exfiltration toolkit – DET ?

In this tutorial we will use Data Exfiltration Toolkit (DET) on a hacked pc to gather data. A compromised system can be infected with DET and send data over various protocols to a control server. All you have to do is setup a listening server on the attacker machine and deploy DET client on target […]

meterpreter rubber ducky attiny85

How to get meterpreter shell with a Rubber ducky – attiny85

In the previous blog i have introduced what is a rubber ducky and how to use attiny85 as a rubber ducky. If you haven’t read that, you can check it out here. This is an arduino based chip with a low space available. We cant load a huge payload in to the flash memory. Here […]

Rubber ducky, attiny85, mr robot hack, bad usb

1$ Rubber Ducky – Hack any PC within seconds MR.Robot style using Attiny85

We all have seen the hacking scenario in movies where the hacker plugs a USB and the whole system gets pwned. That scene is now possible. Hack5 have released their specially customized USB hardware called rubber ducky or bad USB for this plug and hack method. It can be loaded with codes to run pretty […]

Backdoor factory shellcode

Backdoor factory – How to inject shell-code into windows application

Backdoor factory (BDF) is a pre-installed application in Kali Linux, its used to inject shell-code to any windows application. BDF can inject custom shell-code to an existing binary by adding malicious code in between the genuine source code. First it scans the entire binary and checks compatible payloads then it searches the entire code and […]

How to find website admin panel using cpscan

How to find website admin panel using cpscan

Most of the websites have their own custom control panel/admin panel other than the server cpanel. They are simply programmed in php, html and java like languages. These admin panel can control the website completely other than the server settings. Once you have access to this then you can upload new images, edit pages and […]

windows privilege escalation using bypassuac_vbs metasploit

windows privilege escalation using “bypassuac vbs” metasploit

Hacking any windows system is an easy process with metasploit. We can use many techniques to compromise windows by either exploiting a remote code execution or malicious file attack. Code is often embedded with genuine applications or executed remotely on an application with limited privileges. When we use getsystem command it will return an error “access […]

Dos attack through tor network – safe and effective ddos tool 2016

Denial of service attacks is still effective and powerful attack against a web server.Even though we have plenty of tools available, most of them are not safe and can track any attacker but, “Torshammer” an awesome piece of python script can solve that problem. This script use the tor anonymity service to mask the user […]

hack-a-router-remotely

How to hack a router remotely – millions of routers still vulnerable 2016

A router is a gateway that connects a device to the internet with certain protocols. Hacking a router can be really serious, the attacker can take control over the whole network setup. Even in this 2016 millions routers are vulnerable to remote authentication. This is actually not a vulnerability but, a feature that can turn […]

hack-wpa-wpa-2-khromozome

How to hack a wifi router by cracking WPA/WPA2 using kali linux 2.0 -2016

There are many ways to hack a wifi router, some people use to bruteforce password directly some use WPS pin cracking with reaver etc. Most of the times WPS pin cracking succeed because the router is in its default pin and easy to crack. Here we are going to hack a WPS disabled router. We have […]