BALA GANESH, Author at GBHackers - Latest Cyber Security News | Hacker News https://gbhackers.com/author/balaganesh/ Cyber Security News, Hacking News, Information security, Cyber Security, Penetration testing Fri, 21 Jul 2023 02:40:54 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 116523949 Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine https://gbhackers.com/netcat-vs-cryptcat/ https://gbhackers.com/netcat-vs-cryptcat/#respond Mon, 10 Jul 2023 07:07:00 +0000 https://gbhackers.com/?p=12250 Netcat is a good build network debugging tool, which can read and write data across computers using TCP or UDP, it is also called TCP/IP utilities. It is capable to act as a master and slave to do file transfer, TCP banner grabbing, backdoor shells, port scanners, port redirection, and network chats can also be performed […]

The post Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/netcat-vs-cryptcat/feed/ 0 12250
DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine https://gbhackers.com/dns-shell-command-control-dns/ https://gbhackers.com/dns-shell-command-control-dns/#respond Sun, 09 Jul 2023 05:22:00 +0000 https://gbhackers.com/?p=12753 DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor. Tool is a python-based Exploitation tool to compromise and also maintain access via command and control to the server. Must Read Complete Kali Tools tutorials from Information […]

The post DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/dns-shell-command-control-dns/feed/ 0 12753
Live Cyber Forensics Analysis with Computer Volatile Memory https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/ https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/#respond Sat, 01 Jul 2023 06:23:13 +0000 https://gbhackers.com/?p=9033 The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence). Forensics Analysis – Volatile Data: How to Collect Volatile Data: Acquisition of live Volatile Memory: Run the tool as an administrator and start the capture. Dump File […]

The post Live Cyber Forensics Analysis with Computer Volatile Memory appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/feed/ 0 9033
Brutespray – Port Scanning and Automated Brute Force Tool https://gbhackers.com/brutespray-port-scanning-brute-force/ https://gbhackers.com/brutespray-port-scanning-brute-force/#respond Sat, 01 Jul 2023 03:29:00 +0000 https://gbhackers.com/?p=12043 Brutespray is a Python script that provides a combination of both port scanning and automated brute force attacks against scanned services. Scan with Nmap and use GNMAP/XML output file to Brute force Nmap open port services with default credentials using Medusa or Use your dictionary to gain access. Download the brute spray Tool Here. Attackers Machine(Kali Linux 2.0) […]

The post Brutespray – Port Scanning and Automated Brute Force Tool appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/brutespray-port-scanning-brute-force/feed/ 0 12043
Web Application Pentesting with Manual SQL Injection – Integer Based https://gbhackers.com/perform-manual-sql-injection/ https://gbhackers.com/perform-manual-sql-injection/#respond Mon, 26 Jun 2023 11:55:00 +0000 https://gbhackers.com/?p=13572 Today we will perform manual SQL injection with an integer-based method for the MySQL database. I hope the last article on error-based string injection is useful to everyone, especially beginners. Now I will quickly drive into yet another writing for SQL injection with the integer-based method. SQL Injection ONLINE LAB: STEP 1: Breaking the Query […]

The post Web Application Pentesting with Manual SQL Injection – Integer Based appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/perform-manual-sql-injection/feed/ 0 13572
How to Perform Manual SQL Injection With Double Quotes Error-Based String Method https://gbhackers.com/perform-manual-sql-injection-2/ https://gbhackers.com/perform-manual-sql-injection-2/#respond Mon, 26 Jun 2023 08:45:00 +0000 https://gbhackers.com/?p=13720 If you are trying to hack the databases with methods like single quotes error-based Manual SQL Injection, Integer based injection but the databases are not vulnerable to those methods injection will fail and you cannot connect with the database. In short, the error-based SQL injection will use a single quote to break the query and join the […]

The post How to Perform Manual SQL Injection With Double Quotes Error-Based String Method appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/perform-manual-sql-injection-2/feed/ 0 13720
Email Header Analysis – Verify Received Email is Genuine or Spoofed https://gbhackers.com/email-header-analysis/ https://gbhackers.com/email-header-analysis/#respond Sun, 25 Jun 2023 13:48:00 +0000 https://gbhackers.com/?p=32801 Email Header Analysis highly required process to prevent malicious threats since Email is a business critical asset. Altering the email header to make the message appear to come from somewhere other than the actual source is a fraudulent email. If the spam filter is bypassed receiving the mail to the inbox can be a critical […]

The post Email Header Analysis – Verify Received Email is Genuine or Spoofed appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/email-header-analysis/feed/ 0 32801
Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis https://gbhackers.com/tracking-a-photos-geolocation-with-gps-exif-data/ https://gbhackers.com/tracking-a-photos-geolocation-with-gps-exif-data/#respond Sun, 25 Jun 2023 13:23:00 +0000 https://gbhackers.com/?p=9207 This article is about collecting metadata from photographs. Metadata is information that is created for every file’s format. Examples of metadata: file created date and time, Tracking Photos, last edited, etc. In this article, we will take a picture from iPhone and analyze that Image to collect various metadata for collected evidence. Before starting your forensic investigation for […]

The post Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/tracking-a-photos-geolocation-with-gps-exif-data/feed/ 0 9207
How to Perform Manual SQL Injection While Pentesting With Single Quote Error-Based Parenthesis Method https://gbhackers.com/manual-sql-injection-2/ https://gbhackers.com/manual-sql-injection-2/#respond Thu, 22 Jun 2023 17:50:00 +0000 https://gbhackers.com/?p=15156 If you are trying to hack the databases with methods like single quotes error-based injection, Integer based injection, or double quotes method but the databases are not vulnerable to those methods Manual SQL Injection will fail and you cannot connect with the database. In short, the error-based Manual SQL injection will use a single quote to […]

The post How to Perform Manual SQL Injection While Pentesting With Single Quote Error-Based Parenthesis Method appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/manual-sql-injection-2/feed/ 0 15156
ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping https://gbhackers.com/icmp-shell-secret/ https://gbhackers.com/icmp-shell-secret/#respond Tue, 20 Jun 2023 16:20:00 +0000 https://gbhackers.com/?p=11724 Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING as a great convert channel to get victim shell access using ICMP Shell. Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10) Attacker Machine:- Victim Machine:- Also Read :  Operating Systems can be detected […]

The post ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/icmp-shell-secret/feed/ 0 11724