SPEED READING

All about Metasploit

What is Metasploit ?   This is just a exploit framework which have many many modules that can be used for exploitation, pivoting,scanning, etc etc   What is Meterpreter ? This is the feature of metasploit, it's have payload that offers a shell connection on the victim's computer but with extra features   Approach Privilege Escalation in windows/Linux ⇒   goal is -> to become super admin of system , so from restricted/low shell to administrator/high shell For Linux we check for :-> Kernel exploits Programs running as root Installed software Weak/reused/plaintext passwords Inside …

🕵️‍♂️Digital Forensics

What is Digital Forensics? Digital Forensics is the  preservation, identification, extraction, interpretation and documentation of computer evidence that can be used in a court of law Branches of Digital Forensics: Network Forensics Firewall Forensics Database Forensics Mobile Forensics Digital Forensics help to protect from and solve cases involving: Theft of intellectual property Financial Fraud Hacker system penetration Distribution and execution of viruses and worms Some Challenges faced by Digital Forensics The increase of PC's and Internet access has m…

DNS Rebinding

Today we will get to know about DNS Rebinding -   Hacking   Routers and Taking Names What is DNS Rebinding? DNS rebinding occurs when a web server provides an IP that is different than its own, generally for potentially malicious reasons. The attack vector is providing the IP of the client in order to perform Cross Site Request Forgery attack We will be using this to ' hack ' routers This works because somewhere between some and many consumer-grade routers are configured in such a way that, when you type the external IP address of the router from within the local LAN, it will take y…

DNS Poisoning and Phishing

Let's learn about DNS Poisoning or DNS Spoofing or Pharming and Phishing   What is DNS Poisoning ⇒ Also called  Pharming or DNS Spoofing DNS Spoofing is the art of making a DNS Entry to point to an another IP than it would be supposed to point to Three Techniques used ⇒ DNS Cache Poisoning DNS ID Spoofing ARP Poison Sniff DNS Packets from a certain victim Reply Fake DNS Packets Making the attack more accurate with the  Birthday Paradox In DNS Poisoning Attack Change  IP Address  to  Redirect URLs  to  Fraudulent sites Potentially more dangerous than  phishing attacks No email solicitati…

Load More
That is All