Email Header Analysis – Verify Received Email is Genuine or Spoofed
Email Header Analysis highly required process to prevent malicious threats since Email is a business critical asset. Altering the email header to make the message appear to come from somewhere other than the actual source is a fraudulent...
Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis
This article is about collecting metadata from photographs. Metadata is information that is created for every file's format. Examples of metadata: file created date and time, Tracking Photos, last edited, etc.In this article, we will take a picture from iPhone and...
How to Perform Manual SQL Injection While Pentesting With Single Quote Error-Based Parenthesis Method
If you are trying to hack the databases with methods like single quotes error-based injection, Integer based injection, or double quotes method but the databases are not vulnerable to those methods Manual SQL Injection will fail and you cannot connect...
ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping
Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING as a great convert channel to get victim shell access using ICMP Shell.Here I have used Kali Linux(Attacker Machine) and...
Man in the Middle Attack with “Cain and Abel” Tool
In this tutorial, we will use Cain and Abel to perform this attack. Active eavesdropping alters the communication between two parties who believe they are directly communicating with each other.A man-in-the-middle attack allows a malicious actor to intercept, send...
Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers
Email spoofing is a way of delivering forged emails to recipients.These methods are used by criminals to launch attacks like phishing or spam to provide persistent backdoors with legitimate behavior.Publicly available email servers can be used for spoofing attacks. If you have...