This a short and simple understanding what the payload types do and used for. Metasploit payloads are pre -written exploits to use on targets system/site/server etc …. There 546 payloads in Metasploit for u to have fun with in this part we talk about the different types Types of payloads Inline inline payloads are single …
Category Archives: FEATURED
Metasploit part 2 Module’s
welcome back to are Metasploit section of hacking a rise so in this one im gaving a shot example of the module’s so lets start so there are six types of modules in metasploit exploit payloads auxiliary encoders post nops EXPLOIT Well it is what it is this module has pre-installed scripts to help you …
Metasploit basics part one
Hi today we going to start with Metasploit commands WHAT IS METASPLOIT ?? Metasploit framework is a tool designed for pentesting. there may ways to use Metasploit recon,exploits,scanning and post exploit. It comes preinstalled on many pentesting os Kali,patriot,cyborg hawk to name a few. Interfaces of Metasploit: (1) msfconsole to open the command line to …
XSS hacking part one
Hi and welcome to Hacking A Rise Lets explain what we are doing XSS cross site scripting is an attack most common on web apps (aka websites/servers) these attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash, but the most used XSS is malicious JavaScript. That can be executed on the other viewers …
XSS DORKING
HERE’S A LIST OF XSS DORKS FOR GOOGLE XSS Dorks Code: inurl:”.php?cmd=” inurl:”.php?z=” inurl:”.php?q=” inurl:”.php?search=” inurl:”.php?query=” inurl:”.php?searchstring=” inurl:”.php?keyword=” inurl:”.php?file=” inurl:”.php?years=” inurl:”.php?txt=” inurl:”.php?tag=” inurl:”.php?max=” inurl:”.php?from=” inurl:”.php?author=” inurl:”.php?pass=” inurl:”.php?feedback=” inurl:”.php?mail=” inurl:”.php?cat=” inurl:”.php?vote=” inurl:search.php?q= inurl:com_feedpostold/feedpost.php?url= inurl:scrapbook.php?id= inurl:headersearch.php?sid= inurl:/poll/default.asp?catid= inurl:/search_results.php?search= xp : http://host/php/index.php?lang=%5BXSS%5D POP: http://host/php/index.php?lang=XSS BL4CKH4T G4N3$H GROUP
Hacking with JSQL on Kali Linux
All right my little noob’s so due to my google dorks post i mite as well show u how to use them in an attack so since my man nife did sqlmap u can check it out here –> Sql-map basics I am going two show you how two use JSQL on kali so frist …
Google dorks
this a list few google dorks view_items.php?id= home.php?cat= item_book.php?CAT= www/index.php?page= schule/termine.php?view= goods_detail.php?data= storemanager/contents/item.php?page_code= view_items.php?id= customer/board.htm?mode= help/com_view.html?code= n_replyboard.php?typeboard= eng_board/view.php?T****= prev_results.php?prodID= bbs/view.php?no= gnu/?doc= zb/view.php?uid= global/product/product.php?gubun= m_view.php?ps_db= productlist.php?tid= product-list.php?id= onlinesales/product.php?product_id= garden_equipment/Fruit-Cage/product.php?pr= product.php?shopprodid= product_info.php?products_id= productlist.php?tid= showsub.php?id= productlist.php?fid= products.php?cat= products.php?cat= product-list.php?id= product.php?sku= store/product.php?productid= products.php?cat= productList.php?cat= product_detail.php?product_id= product.php?pid= view_items.php?id= more_details.php?id= county-facts/diary/vcsgen.php?id= idlechat/message.php?id= podcast/item.php?pid= products.php?act= details.php?prodId= socsci/events/full_details.php?id= ourblog.php?categoryid= mall/more.php?ProdID= archive/get.php?message_id= review/review_form.php?item_id= english/publicproducts.php?groupid= …
How to stay anonymous online
so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even when using proxy chains and tunneling true tor you are not fully anonymous as u dns is still showing this defeats the reason …
Man in the Middle simple attack
so today we are going to learn man in the middle attack. What is a man in the middle attack?? well a man in the middle attack is when a hacker connect’s to a WiFi network mostly public WiFi from here he can alter the connection between the router and the client with this we …
hacking wps with bully
Welcome to another one by the laughing man whoop whoop so we are going to hack a WiFi with bully now wps have 8 numbers in it this makes it easier to brute and take lot less time well depending on your system mine is a 4g dual core with 8gb swap i rock it …