Menu

Blog

Trusted source of Cyber-Security and Ethical Hacking
How to Create a Linux Botnet Step by Step with BYOBExploitation
How to Create a Linux Botnet Step by Step with BYOB

BYOB is a project made with Python offering security researchers and developers a structure to build and operate a simple botnet to deepen their understanding [...]

BYOBBotnetPythonLinuxMalwareTrojab
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 3Exploitation
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 3

In our previous article we have seen how to change variables or either execute functions which should not be done through a stack buffer overflow and few more [...]

BufferOverflowProgramMemoryBinaryCrash
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 2Exploitation
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 2

In our previous article we talked about the basics such as the operating principle of RAM as well as some other points essential to understanding the RAM [...]

BufferOverflowProgramMemoryBinaryCrash
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 1Exploitation
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 1

This article is the first in a series dedicated to binary exploitation which is also more commonly known as "pwn". A buffer overflow, or buffer overrun, is an [...]

BufferOverflowProgramMemoryBinaryCrash
How to Route All Traffic Through Tor Network on Arch LinuxNetworking
How to Route All Traffic Through Tor Network on Arch Linux

If you use an anonymity tool, such as a VPN, ideally, your DNS requests should not go to your ISP, but the DNS hosted by your VPN. A DNS leak occurs when a [...]

TORPolipoArchDNSLeakTrafficPrivacy
How to Install Metasploit 5 and Armitage on Arch LinuxMetasploit
How to Install Metasploit 5 and Armitage on Arch Linux

Metasploit is far more than just a collection of exploits, it's an infrastructure that you can build upon and utilize for your custom needs. This allows you to [...]

MetasploitArmitageTeamserverPostgreSQLRubyGithubArch
How to Install Arch Linux with LVM and LUKS Disk EncryptionLinux
How to Install Arch Linux with LVM and LUKS Disk Encryption

Arch Linux is an independently developed, x86-64 general-purpose GNU/Linux distribution that strives to provide the latest stable versions of most software by [...]

ArchLinuxLVMLUKSEncryptionDistro
Remote Network Penetration via NetBios using Linux and SambaNetworking
Remote Network Penetration via NetBios using Linux and Samba

A recent study carried out in December 2019 by French researchers shows that more than 60% of Windows systems using the NetBios service use a standard [...]

NetBiosLinuxWindowsSambaWorkGroupSMB
Discover Hidden Subdomains of a given Domain using DnsmapInformation Gathering
Discover Hidden Subdomains of a given Domain using Dnsmap

In this new tutorial we'll see how to find the subdomains of a given domain name using Dnsmap. Dnsmap is mainly meant to be used by pen-testers during the [...]

DnsmapScanningDNSNetworkdomainSubdomainBruteforce
Getting Started with Bettercap 2 on Ubuntu and Other Derived DistrosSniffing/Spoofing
Getting Started with Bettercap 2 on Ubuntu and Other Derived Distros

In this new article we will see together how to get started with the Bettercap 2, the Swiss Army knife for WiFi, Bluetooth Low Energy devices, Wireless HID and [...]

ARPBettercapDNSNetworkPoisoningProxySpoofing
Exploit Shellshock Vulnerability CVE 2014-6271 using MetasploitMetasploit
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit

A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large [...]

BashMetasploitOpenSSHShellshockVulnerability
Getting Started with Sqlmap for Pentest and Ethical HackingExploitation
Getting Started with Sqlmap for Pentest and Ethical Hacking

Using SQLmap can be tricky when you are not familiar with it. This SQLmap tutorial aims to present the most important functionalities of this popular SQL [...]

DumpHashInjectionSQLISqlmapPython