METASPLOIT PART 3 PAYLOADS

This a short and simple understanding what the payload types do and used for. Metasploit payloads are pre -written exploits to use on targets system/site/server etc …. There 546 payloads in Metasploit for u to have fun with in this part we talk about the different types Types of payloads Inline inline payloads are single …

Metasploit part 2 Module’s

welcome back to are Metasploit section of hacking a rise so in this one im gaving a shot example of the module’s so lets start so there are six types of modules in metasploit exploit payloads auxiliary encoders post nops EXPLOIT Well it is what it is this module has pre-installed scripts to help you …

Metasploit basics part one

Hi today we going to start with Metasploit commands WHAT IS METASPLOIT ?? Metasploit framework is a tool designed for pentesting. there may ways to use Metasploit recon,exploits,scanning and post exploit. It comes preinstalled on many pentesting os Kali,patriot,cyborg hawk to name a few. Interfaces of Metasploit: (1) msfconsole to open the command line to …

XSS DORKING

HERE’S A LIST OF XSS DORKS FOR GOOGLE XSS Dorks Code: inurl:”.php?cmd=” inurl:”.php?z=” inurl:”.php?q=” inurl:”.php?search=” inurl:”.php?query=” inurl:”.php?searchst­ring=” inurl:”.php?keyword=­” inurl:”.php?file=” inurl:”.php?years=” inurl:”.php?txt=” inurl:”.php?tag=” inurl:”.php?max=” inurl:”.php?from=” inurl:”.php?author=” inurl:”.php?pass=” inurl:”.php?feedback­=” inurl:”.php?mail=” inurl:”.php?cat=” inurl:”.php?vote=” inurl:search.php?q= inurl:com_feedpostol­d/feedpost.php?url= inurl:scrapbook.php?­id= inurl:headersearch.p­hp?sid= inurl:/poll/­default.asp?catid= inurl:/­search_results.php?se­arch= xp : http://host/php/index.php?lang=%5BXSS%5D POP: http://host/php/index.php?lang=XSS BL4CKH4T G4N3$H GROUP

Hacking with JSQL on Kali Linux

All right my little noob’s so due to my google dorks post i mite as well show u how to use them in an attack so since my man nife did sqlmap u can check it out here –> Sql-map basics I am going two show you how two use JSQL on kali so frist …

Google dorks

this a list few google dorks view_items.php?id= home.php?cat= item_book.php?CAT= www/index.php?page= schule/termine.php?view= goods_detail.php?data= storemanager/contents/item.php?page_code= view_items.php?id= customer/board.htm?mode= help/com_view.html?code= n_replyboard.php?typeboard= eng_board/view.php?T****= prev_results.php?prodID= bbs/view.php?no= gnu/?doc= zb/view.php?uid= global/product/product.php?gubun= m_view.php?ps_db= productlist.php?tid= product-list.php?id= onlinesales/product.php?product_id= garden_equipment/Fruit-Cage/product.php?pr= product.php?shopprodid= product_info.php?products_id= productlist.php?tid= showsub.php?id= productlist.php?fid= products.php?cat= products.php?cat= product-list.php?id= product.php?sku= store/product.php?productid= products.php?cat= productList.php?cat= product_detail.php?product_id= product.php?pid= view_items.php?id= more_details.php?id= county-facts/diary/vcsgen.php?id= idlechat/message.php?id= podcast/item.php?pid= products.php?act= details.php?prodId= socsci/events/full_details.php?id= ourblog.php?categoryid= mall/more.php?ProdID= archive/get.php?message_id= review/review_form.php?item_id= english/publicproducts.php?groupid= …

Man in the Middle simple attack

so today we are going to learn man in the middle attack. What is a man in the middle attack?? well a man in the middle attack is when a hacker connect’s to a WiFi network mostly public WiFi from here he can alter the connection between the router and the client with this we …

Design a site like this with WordPress.com
Get started