Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine
Netcat is a good build network debugging tool, which can read and write data across computers using TCP or UDP, it is also called TCP/IP utilities.It is capable to act as a master and slave to do file transfer,...
DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine
DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.Tool is a python-based Exploitation tool to compromise and also maintain...
Live Cyber Forensics Analysis with Computer Volatile Memory
The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence).Forensics Analysis - Volatile Data:The data that is held in temporary storage...
Brutespray – Port Scanning and Automated Brute Force Tool
Brutespray is a Python script that provides a combination of both port scanning and automated brute force attacks against scanned services.Scan with Nmap and use GNMAP/XML output file to Brute force Nmap open port services with default credentials using Medusa or...
Web Application Pentesting with Manual SQL Injection – Integer Based
Today we will perform manual SQL injection with an integer-based method for the MySQL database. I hope the last article on error-based string injection is useful to everyone, especially beginners. Now I will quickly drive into yet another writing...
How to Perform Manual SQL Injection With Double Quotes Error-Based String Method
If you are trying to hack the databases with methods like single quotes error-based Manual SQL Injection, Integer based injection but the databases are not vulnerable to those methods injection will fail and you cannot connect with the database.In short, the...