Category Archives: Security

Tutorials on Network Security

Use sqlmap with tor proxy

By | April 23, 2013

When trying to exploit some website using sqlmap, its a good idea to be anonymous. Sqlmap has excellent support for using common proxies or tor. First start tor and ensure that it is running the socks5 daemon on port 9050. Then use the socks5 proxy with sqlmap as follows # ./ –tor –tor-type=SOCKS5 -u ""… Read More »

Google hacking tutorial

By | April 19, 2013

Using search engines as a hacking tool Google hacking involves using special search terms in the google search engine to narrow down the search results to something very specific. Hackers use it to find vulnerable or exploitable websites, servers and confidental/sensitive data that got exposed to the internet due to poor security. Google search supports… Read More »

Install and run sqlmap on windows

By | April 18, 2013

Sqlmap is the most popular tool for automated exploitation of sql injection vulnerability and database takeover. Its written in python is cross platform. If you are using Backtrack then sqlmap comes pre packaged in it. In this post I am going to show you the simple process to setup and run sqlmap on windows. Download… Read More »

Email harvesting with metasploit | tutorial

By | April 28, 2013

Out of the many useful auxiliary modules that metasploit has, one is called search_email_collector which searches google, bing and yahoo for email addresses associated to a particular domain. This is useful in automated information gathering during a penetration test program. The location inside msfconsole is auxiliary/gather/search_email_collector So lets try it out. Launch msfconsole. I am… Read More »

Ping sweep the network with nmap

By | April 16, 2013

Ping Sweep Ping sweep is the process of pinging an entire range of network ip addresses to find out which ones are online or alive. Nmap is an excellent tool to do this quickly and effectively. Here is the command $ nmap -sP Starting Nmap 6.00 ( ) at 2013-04-16 18:16 IST Nmap… Read More »