ICMP Shell

ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping

Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING as a great convert channel to get victim shell access using ICMP Shell. Here I...

VENOM – An Exploitation Tool to Bypass Anti Virus Detection with Encrypted Payloads

Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software since AV is Difficult to detect the Encrypted and packed Malware and payload. Here...
Beef Xss Framework

BeEF – Browser Exploitation Framework Over Wan (Without Port Forwarding)

Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a penetration tester to understand past the network perimeter and client system. Its available in Kali Linux and...
DDE exploit

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the user. Hackers leveraged this method to execute malicious scripts to compromise. It...

JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts. Here I have used Kali Linux(Attacker Machine) and Victim...


Signup to get Hacking News & Tutorials to your Inbox

Most Popular