Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Password Cracking and Login Brute-force [Stats]

People are frequently misguided and look at the password brute-forcing (password cracking) as on a miracle approach to gain access to something, especially people not engaged in IT industry, non-tech folks (not sure if Hollywood is to blame). In any case, numerous times we’ve received inquiries from people asking us to “brute-force” some hashes or […]

Australia Says State Actor Responsible For Parliament System Hack

Australia on Monday said a “sophisticated state actor” had hacked the country’s main political parties and parliament, just weeks before a closely fought election. Prime Minister Scott Morrison told lawmakers security agencies looking at a hack of lawmakers “also became aware that the networks of some political parties; Liberal, Labor and Nationals have also been […]

XSS Chef: Generating Custom XSS payloads

XSS Chef is a small React.js application inspired by CyberChef, which provides users with a modular way to build JavaScript payloads to typically be used during penetration tests to demonstrate cross-site scripting vulnerabilities. A live copy of the application can be found here. The current set of recipes can be found below, along with a description […]

UACME v3.1.5 releases: Defeating Windows User Account Control

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works on server version too). Admin account with UAC set on default settings required. git clone Run executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See “Run examples” below for more info. First, param […]

An Overview of UBA, SIEM and SOAR Solutions: What Are the Differences?

In pursuit of safeguarding proprietary data, companies are increasingly integrating information security systems into their IT departments. The motivation boils down to the crucial role of information in business processes nowadays. Since the range of available information security systems is continuously expanding, companies need to have an idea of the types of these systems and, […]

R3con1z3r – Lightweight Web Information Gathering Tool

R3con1z3r is a simple and lightweight web information gathering tool with all features written in Python. With this tool you can perform open source intelligence (OSINT) web-based footprinting in an easy and quick way. R3con1z3r: Lightweight Web Information Gathering Tool R3con1z3r is a passive reconnaissance tool with built-in functionalities that can help you gather open […]

Domain Name Hierarchy (Registry vs Registrar)

Domain registration and management involves multiple parties with different roles, like Registry, Registrar, Reseller & Registrant (Domain Name Hierarchy). On top of those 3, there’s also ICANN (Internet Corporation for Assigned Names and Numbers). We’ll quickly cover all these roles. ICANN ICANN is non-profit entity comprised of individuals, government, law enforcement, intellectual property law and […]

Best IP Address Grabbers 2019

Using these websites we can extract information such as IP address and GPS location data. When grabbing IP addresses and location data it’s always best to filter Internet bots such as Facebook bots. Internet Bot also known as web robot perform tasks that are both simple but also structurally repetitive at a much higher rate that […]

Pown Recon – A Powerful Target Reconnaissance Framework Powered By Graph Theory

Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead of flat table representation is that it is easier to find the relationships between different types of information which comes quite handy in many situations. Graph theory algorithms also help with diffing, searching, like finding the shortest […]

Ethical Hacking Tutorials © 2018
Skip to toolbar