The standard telnet utilities that are present in linux or windows can connect to services running on TCP ports. They do not support udp ports. However the utility netcat can be used to connect and work with udp ports in the same way as the telnet command. The telnet command can connect to a host… Read More »
BSNL now a days is providing a adsl router made by SemIndia Systems and the model names are similar to DNA-A201 or DNA-A211-1. In this article we are going to hack into this router to learn more about it. You might not know that this small and innocent looking modem is actually a “Linux CPU”…. Read More »
Netcat is a commandline utility like telnet but with much more features. Learn to use netcat with these simple commands examples.
Nmap Nmap (Network Mapper) is the most popular port scanner and network discovery tool used. It can be used to scan a network for live hosts and scan hosts for open ports. Besides port scanning there are many more things that Nmap can do like OS identification, running user scripts etc. It is widely used… Read More »
Tsocks There are many network applications that do not have the option to specify a proxy or do not support the use of proxies. In such cases tsocks is a useful tool to wrap all network communication done by a program via a socks proxy. Project website Install on ubuntu $ sudo apt-get install tsocks… Read More »
TOR is an anonymity solution that can be used as a proxy over the internet. Project website Install on Ubuntu $ sudo apt-get install tor vidalia During the installation a configuration screen will come up, asking to select those users who would be using tor. Select the appropriate users on that page and continue. After… Read More »
Nikto Nikto is a vulnerability scanner that scans webservers for thousands of vulnerabilities and other known issues. It is very easy to use and does everything itself, without much instructions. It is included by default in pen testing distros like Kali linux. On other oses/platforms you need to install it manually. Can be downloaded from… Read More »
In a previous article we saw how to use sqlmap to exploit vulnerable urls of the form http://www.site.com/section.php?id=59 where the id parameter for example is vulnerable to sql injection. Now we shall try to do the same thing with forms, especially login forms. Forms often submit data via post, so the sytanx for launching the… Read More »
Sqlmap is the most popular tool for carrying out automated sql injections against vulnerable systems. In this tutorial we are going to learn to use it.
Ngrep ngrep or network grep is a command line program that can be used to analyze and search network packets for a given regex pattern or string. ngrep uses the pcap library to capture network packets and gnu regex library to perform regex searches. ngrep is like tcpdump + grep. In this article we shall… Read More »