meterpreter rubber ducky attiny85

How to get meterpreter shell with a Rubber ducky – attiny85

In the previous blog i have introduced what is a rubber ducky and how to use attiny85 as a rubber ducky. If you haven’t read that, you can check it out here. This is an arduino based chip with a low space available. We cant load a huge payload in to the flash memory. Here […]

Backdoor factory shellcode

Backdoor factory – How to inject shell-code into windows application

Backdoor factory (BDF) is a pre-installed application in Kali Linux, its used to inject shell-code to any windows application. BDF can inject custom shell-code to an existing binary by adding malicious code in between the genuine source code. First it scans the entire binary and checks compatible payloads then it searches the entire code and […]

windows privilege escalation using bypassuac_vbs metasploit

windows privilege escalation using “bypassuac vbs” metasploit

Hacking any windows system is an easy process with metasploit. We can use many techniques to compromise windows by either exploiting a remote code execution or malicious file attack. Code is often embedded with genuine applications or executed remotely on an application with limited privileges. When we use getsystem command it will return an error “access […]

hack-windows-10-metasploit-khromozome

How to hack windows 10 using kali linux remotely with metasploit – 2018

Microsoft claims that windows 10 has fixed all security vulnerabilities. We cant hack a windows PC with a remote exploit like ” ms08_067_netapi ” anymore. Windows have fixed that vulnerability. so sad. wait a minute, Then how can we hack a windows pc is that even possible now? The answer is yes, windows machines are still […]

hack-android-2016-metasploit

How to hack an android phone – metasploit

Android is the most popular mobile platform and its users are increasing day by day, and security threat too. Android phones are vulnerable and can be easily backdoored. Metasploit is the best tool in kali linux which can generate and handle a payload. Metasploit have more than 1000 exploits which is more than enough. Now […]