Monday, August 20, 2018

Tutorials

All the articles under tutorials.

Tutorials

Home Tutorials
All the articles under tutorials.

fake_router6

Create a rouge ipv6 router in one simple step with fake_router6 fake_router6 is a tool inside THC-IPv6 tools bundled inside Kali...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part...
mdk3

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods...
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can...

passive_discovery6

Discover IPv6 network range & hosts from an IPv6 enabled network using passive_discovery6. Yet another IPv6 tool from THC Passive_discovery6 passivly...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference...

smurf6

Perform a Smurf attackĀ  andĀ  a Distributed Denial of Service (DDoS) attack on a on whole IPv6 network using smurf6 Smurf6...
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Update Nmap in Kali Linux

Install & Update Nmap in Kali Linux Rolling, Sana & earlier versions This tutorial will show you how to update nmap...

Must Need

PowerUpSQL

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing,...

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...
Metasploit getwlanprofiles

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From...

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download all the wireless profiles...
Metateta

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are...

Update Nmap in Kali Linux

Install & Update Nmap in Kali Linux Rolling, Sana & earlier versions This tutorial will show you how to update nmap in kali linux 2.0....
bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices...
RiskySPN

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing...

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...