Thursday, April 18, 2024

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

0
DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination...

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

1
Commix (short for and njection eploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers...

BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)

1
Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers.It helps a penetration tester to understand...

Penetration Testing with Windows Computer & Bypassing an Antivirus Using VEIL-Framework in Kali Linux

0
Pentesters have a hard time bypassing anti-viruses nowadays Since  Antiviruses are evolving as we speak. We at GBHackers decided to put some time to teach...

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

0
DDE exploit also known as dynamic data exchange, allows data to be transferred between applications without any interaction from the user. Hackers leveraged this...

RouterSploit – Exploitation Framework for Embedded devices

3
The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:exploits – modules that...

ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping

0
Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING as a great convert...

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using...

1
In this Kali Linux Tutorial, we show you how to use Xerxes in launching a DOS attack. DDOS tools are capable of putting heavy...

Exploit Windows Remote PC with EternalBlue & DoublePulsar Exploit through Metasploit

0
EternalBlue Malware was Developed by National Security Agency (NSA) exploiting Windows-based Server Message Block (SMBv1) it is believed the tool has released by Shadow...

VENOM – An Exploitation Tool to Bypass Anti Virus Detection with Encrypted Payloads

1
Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software since AV is Difficult...

Managed WAF protection

Website

Recent Articles