free pentesting course download here What you’ll learn Perform penetration testing computers, networks, wireless, web apps and secure computers and networks by exposing vulnerabilities and patching them. Discover and exploit what a modern penetration tester does. Penetrate and Exploit even highly secured environments Effectively execute modern attack techniques Use commercial / open-source penetration testing tools …
Category Archives: Pentesting
Metasploit Part 4 recon passive information gathering
welcome back to are metasploit section so to-day we are going to use a few the auxiliary modules in a bit of recon using metasploit framework. Fire up you terminal and type service PostgreSQL start then msfconsole To know what modules are in the auxiliary section type search auxiliary ENUM_DNS the module we are going …
Continue reading “Metasploit Part 4 recon passive information gathering”
Metasploit part 4 recon
Welcome to Hacking a rise today its all about recon with metasploit So lets jump right in so start by opening a terminal and starting the PostgreSQL with this command service postgrsql start now type msfconsole with till it loads now i want u to use the search to find the aux tool in metasploit …
METASPLOIT PART 3 PAYLOADS
This a short and simple understanding what the payload types do and used for. Metasploit payloads are pre -written exploits to use on targets system/site/server etc …. There 546 payloads in Metasploit for u to have fun with in this part we talk about the different types Types of payloads Inline inline payloads are single …
Metasploit part 2 Module’s
welcome back to are Metasploit section of hacking a rise so in this one im gaving a shot example of the module’s so lets start so there are six types of modules in metasploit exploit payloads auxiliary encoders post nops EXPLOIT Well it is what it is this module has pre-installed scripts to help you …
Metasploit basics part one
Hi today we going to start with Metasploit commands WHAT IS METASPLOIT ?? Metasploit framework is a tool designed for pentesting. there may ways to use Metasploit recon,exploits,scanning and post exploit. It comes preinstalled on many pentesting os Kali,patriot,cyborg hawk to name a few. Interfaces of Metasploit: (1) msfconsole to open the command line to …
XSS hacking part one
Hi and welcome to Hacking A Rise Lets explain what we are doing XSS cross site scripting is an attack most common on web apps (aka websites/servers) these attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash, but the most used XSS is malicious JavaScript. That can be executed on the other viewers …
XSS DORKING
HERE’S A LIST OF XSS DORKS FOR GOOGLE XSS Dorks Code: inurl:”.php?cmd=” inurl:”.php?z=” inurl:”.php?q=” inurl:”.php?search=” inurl:”.php?query=” inurl:”.php?searchstring=” inurl:”.php?keyword=” inurl:”.php?file=” inurl:”.php?years=” inurl:”.php?txt=” inurl:”.php?tag=” inurl:”.php?max=” inurl:”.php?from=” inurl:”.php?author=” inurl:”.php?pass=” inurl:”.php?feedback=” inurl:”.php?mail=” inurl:”.php?cat=” inurl:”.php?vote=” inurl:search.php?q= inurl:com_feedpostold/feedpost.php?url= inurl:scrapbook.php?id= inurl:headersearch.php?sid= inurl:/poll/default.asp?catid= inurl:/search_results.php?search= xp : http://host/php/index.php?lang=%5BXSS%5D POP: http://host/php/index.php?lang=XSS BL4CKH4T G4N3$H GROUP
Hacking with JSQL on Kali Linux
All right my little noob’s so due to my google dorks post i mite as well show u how to use them in an attack so since my man nife did sqlmap u can check it out here –> Sql-map basics I am going two show you how two use JSQL on kali so frist …
Man in the Middle simple attack
so today we are going to learn man in the middle attack. What is a man in the middle attack?? well a man in the middle attack is when a hacker connect’s to a WiFi network mostly public WiFi from here he can alter the connection between the router and the client with this we …