Netcat is a command line utility that can perform lots of tasks like telnet. In this tutorial we shall use it to get a reverse shell using a php backdoor.
After hacking a web application or server to such an extent that you can upload files to it, the next thing to try is get a proper shell on the system. The most common approach is to create reverse shells. In this approach first a listener program is run on the hacker’s machine and then… Read More »
The nmap scripting engine allows users to write scripts in Lua to automate the process of scanning. This tutorial shows how to use the existing scripts that come with nmap for information gathering.
Metasploit can be used to make simple yet powerful trojans for windows that can allow a hacker complete access and control over the target system. In this article we shall see how to use metasploit to make a trojan and hack a windows system using it. You shall need a system running metasploit and another… Read More »
NMAP – Network Mapper Nmap is the most popular (and most featureful) port scanning tool out there. And although it appears like a small port scanning utility, it has a lot of hidden potential to serve as a powerful hacking tool. This is precisely what we shall try to work out in this particular article…. Read More »
Tcpdump Tcpdump is a commandline network analyzer tool or more technically a packet sniffer. It can be thought of as the commandline version of wireshark (only to a certain extent, since wireshark is much more powerful and capable). As a commandline tool tcpdump is quite powerful for network analysis as filter expressions can be passed… Read More »
The standard telnet utilities that ship with linux or windows allow to telnet to services running on TCP ports. They do not support udp ports. However the utility netcat can be used for working with udp ports in a very similar manner to default telnet utility. The telnet utility works like this $ telnet localhost… Read More »
Metasploit Metasploit has a large collection of modules like exploits, auxiliary etc. The module auxiliary/scanner/portscan/syn can be used for tcp syn port scanning. For tcp syn scanning metasploit must be run as root since tcp syn scanning requires raw socket, which require root privileges on a linux system. For example on ubuntu it should be… Read More »
BSNL now a days is providing a adsl router made by SemIndia Systems and the model names are similar to DNA-A201 or DNA-A211-1. In this article we are going to hack into this router to learn more about it. You might not know that this small and innocent looking modem is actually a “Linux CPU”…. Read More »
Netcat is a commandline utility like telnet but with much more features. Learn to use netcat with these simple commands examples.