Category : "Security"

Tutorials on Network Security

Php reverse shell with netcat

Once you are able to gain access to a remote website or server such that you can upload any arbitrary file to it, the next thing you want to try out is get a shell on the system. If the system is running php then a php file can be uploaded to it which will give us a reverse shell. ...

Php reverse shell with metasploit

After hacking a web application or server to such an extent that you can upload files to it, the next thing to try is get a proper shell on the system. The most common approach is to create reverse shells. In this approach first a listener program is run on the hacker's machine and then a program/payload/script is run on ...

Information gathering with Nmap scripts

Nmap scripting engine Nmap now has an scripting engine, that allows users to write their own custom scripts that can perform various scanning tasks in an automated fashion. This provides a powerful way to code a multi-step complex scanner using the inbuilt features of nmap. There are already many scripts available along with nmap that have been developed and submitted by ...

Make a trojan/backdoor for windows xp/7 using metasploit

Metasploit can be used to make simple yet powerful trojans for windows that can allow a hacker complete access and control over the target system. In this article we shall see how to use metasploit to make a trojan and hack a windows system using it. You shall need a system running metasploit and another system running windows where you can ...

Network scanning with Nmap – basic command examples

NMAP - Network Mapper Nmap is the most popular (and most featureful) port scanning tool out there. And although it appears like a small port scanning utility, it has a lot of hidden potential to serve as a powerful hacking tool. This is precisely what we shall try to work out in this particular article. In a previous article we saw how ...

Tcpdump tutorial – Sniffing and analysing packets from the commandline

Tcpdump Tcpdump is a commandline network analyzer tool or more technically a packet sniffer. It can be thought of as the commandline version of wireshark (only to a certain extent, since wireshark is much more powerful and capable). As a commandline tool tcpdump is quite powerful for network analysis as filter expressions can be passed in and tcpdump would pick up only ...

Udp telnet with netcat

The standard telnet utilities that ship with linux or windows allow to telnet to services running on TCP ports. They do not support udp ports. However the utility netcat can be used for working with udp ports in a very similar manner to default telnet utility. The telnet utility works like this $ telnet localhost 7000 where localhost is the hostname and 7000 ...

Tcp syn port scanning with metasploit

Metasploit Metasploit has a large collection of modules like exploits, auxiliary etc. The module auxiliary/scanner/portscan/syn can be used for tcp syn port scanning. For tcp syn scanning metasploit must be run as root since tcp syn scanning requires raw socket, which require root privileges on a linux system. For example on ubuntu it should be run as "sudo msfconsole" so that ...

How to hack the bsnl router

BSNL now a days is providing a adsl router made by SemIndia Systems and the model names are similar to DNA-A201 or DNA-A211-1. In this article we are going to hack into this router to learn more about it. You might not know that this small and innocent looking modem is actually a "Linux CPU". Lets get into it. First do ...

Netcat tutorial – command examples on linux

Netcat Netcat is a terminal application that is similar to the telnet program but has lot more features. Its a "power version" of the traditional telnet program. Apart from basic telnet functionas it can do various other things like creating socket servers to listen for incoming connections on ports, transfer files from the terminal etc. So it is a small tool ...

Pages:«123456»


Connect with us