Category : "Security"

Tutorials on Network Security

Auto login root user at system start in Kali linux

Kali linux uses the root user, since root privileges are needed to run various security tools like nmap and wireshark etc. However its uneasy to type the root/toor combination everytime Kali boots. So to make things simple just make the user root login automatically at system start. And here are the simple steps to do it. Open and edit the file ...

Start apache and mysql at boot on Kali Linux

Apache and mysql are installed by default in Kali Linux. They can be accessed through the Kali Linux menu in Applications. To start apache web server click the menu entry at "Applications > Kali Linux > System Services > HTTP > apache2 start". Similary to start mysql click MySQL > mysql start. However starting services manually everytime is a waste ...

Install angry ip scanner on kali linux

Angry ip scanner is a popular gui based network/ip range scanning tool that is available for both windows and linux. It is multi threaded and scans the ip range very fast. It is written in java. For linux it provides deb packages that can be easily install on Kali, which is debian based. Download the deb file from http://angryip.org/w/Download Get the correct deb based ...

How to run metasploit and armitage on Kali Linux

Metasploit Metasploit, the great exploitation tool is included in Kali linux along with its powerful frontend armitage. Both are easy to run by clicking from the Kali Linux menu. Will show you the steps in this post, if you are new to it. Metasploit has a command line interface called msfconsole, and a web interface too. To run msfconsole or armitage first ...

Hack windows xp with metasploit | tutorial

Hack windows xp with MS08-067 exploit Using metasploit its possible to hack windows xp machines just by using the ip address of the victim machine. It does not involve installing any backdoor or trojan server on the victim machine. Metasploit does this by exploiting a vulnerability in windows samba service called ms08-67. This exploit works on windows xp upto version xp ...

Install tor and vidalia on kali linux

Kali linux is the next version of backtrack in a completely new form. Tor is not installed by default in kali linux. However can be installed easily right from its own repositories. [email protected]:~# apt-get install tor vidalia Run the above command and tor along with vidalia should be installed. Start the tor service with the following command [email protected]:~# service tor start Starting tor ...

What are web shells – Tutorial

Web Shells Web shells are small programs or scripts that can be uploaded to a vulnerable server and then opened from the browser to provide a web based interface to run system commands. They are basically backdoors that run from the browser. For a given web server, the web shell script must be in the same language that the web server ...

Scan website for vulnerabilities with uniscan – tutorial

Uniscan is a vulnerability scanner that can scan websites and web applications for various security issues like LFI, RFI, sql injection, xss etc. Its written in perl. Its open source and can be downloaded from sourceforge project page at http://sourceforge.net/projects/uniscan/. It is included in backtrack and can be found at the following directory /pentest/web/uniscan In the Backtrack menu its located at Vulnerability Assessment ...

Search exploit-db exploits in backtrack

In penetration testing or hacking, it is a common task to search for exploits and vulnerabilities for a give platform/application. The search is done on google, or various exploit database websites. One of them is exploit-db.com. Backtrack includes lots of exploits from exploit-db in a searchable database that can be used offline. In backtrack 5 its located in the following directory /pentest/exploits/exploitdb In ...

Use sqlmap with tor proxy

When trying to exploit some website using sqlmap, its a good idea to be anonymous. Sqlmap has excellent support for using common proxies or tor. First start tor and ensure that it is running the socks5 daemon on port 9050. Then use the socks5 proxy with sqlmap as follows # ./sqlmap.py --tor --tor-type=SOCKS5 -u "http://www.hackable.org/view_section.php?id=10" The above command uses tor with type SOCKS5. ...

Pages:«123456»


Connect with us