Category Archives: Security

Tutorials on Network Security

Google hacking tutorial

By | April 19, 2013

Using search engines as a hacking tool Google hacking involves using special search terms in the google search engine to narrow down the search results to something very specific. Hackers use it to find vulnerable or exploitable websites, servers and confidental/sensitive data that got exposed to the internet due to poor security. Google search supports… Read More »

Email harvesting with metasploit | tutorial

By | April 18, 2013

Out of the many useful auxiliary modules that metasploit has, one is called search_email_collector which searches google, bing and yahoo for email addresses associated to a particular domain. This is useful in automated information gathering during a penetration test program. The location inside msfconsole is auxiliary/gather/search_email_collector So lets try it out. Launch msfconsole. I am… Read More »

Hack windows machines with social engineering toolkit | java signed applet method

By | April 17, 2013

In a previous post we saw how to exploit remote windows machines using and doing some social engineering on the user. In this post we shall try a similar hack using the social engineering toolkit. Social engineering toolkit (SET) is an exploitation framework for social engineering attacks like phishing etc. Launch SET. In back track… Read More »

Hack remote windows machines with metasploit | Java signed applet method

By | April 17, 2013

Signed Java Applet exploit In this demonstration of metasploit we shall see how to hack almost any kind of windows machine using the signed java applet technique. This is a social engineering attack that would require the victim to open a url and allow the java applet to run in the browser. This exploit works… Read More »

Ping sweep the network with nmap

By | April 16, 2013

Ping Sweep Ping sweep is the process of pinging an entire range of network ip addresses to find out which ones are online or alive. Nmap is an excellent tool to do this quickly and effectively. Here is the command $ nmap -sP Starting Nmap 6.00 ( ) at 2013-04-16 18:16 IST Nmap… Read More »

Hack gmail password with social engineering toolkit (SET)

By | April 15, 2013

Social Engineering Toolkit Social engineering toolkit is the most powerful tool for performing social engineering attacks. It is the metasploit of social engineering in a way. It provides a very easy user interface to perform attacks like phishing, browser exploitation etc. In this tutorial we are going to see how it can be used to… Read More »