Linux exploit suggester: Complete guide
Hackercool Magazine Blog
by Anamar Taknev
8h ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about various linux privilege escalation techniques. In this article, you will learn about Linux exploit suggester, a script that helps us in elevating privileges on a Linux system. Linux exploit suggester assists in detecting security deficiencies of a Linux kernel or Linux machine and suggests […] The post Linux exploit suggester: Complete guide appeared first on Hackercool Magazine ..read more
Visit website
Windows privesc check: Complete guide
Hackercool Magazine Blog
by Anamar Taknev
8h ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Windows privilege escalation in detail and various techniques used for achieving this. In this article, you will learn about windows-privesc-check, a standard executable that helps users in elevating privileges on a Windows system. Windows-privesc-check is a executable that can find misconfigurations in target systems […] The post Windows privesc check: Complete guide appeared first on Hackercool Magazine ..read more
Visit website
Complete guide to WebSploit
Hackercool Magazine Blog
by Anamar Taknev
6d ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about man in the Middle attack (MiTM). In this article, you will learn about WebSploit, which is used in MiTM attacks. Websploit is a MiTM framework that can perform various MiTM attacks like arp spoofing, http sniffing, network scanning, wireless scanning, performing de-authentication attacks on […] The post Complete guide to WebSploit appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to Sqlsus
Hackercool Magazine Blog
by Anamar Taknev
6d ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt what is SQL injection and different types of SQL injection. In this article, you will learn about Sqlsus, an open-source MYSQL injection and takeover tool. Sqlsus is a tool written in Perl and we can retrieve the database structure, inject our own SQL commands, download […] The post Beginners guide to Sqlsus appeared first on Hackercool Magazine ..read more
Visit website
Social Engineering Toolkit (SET): Beginners guide
Hackercool Magazine Blog
by Anamar Taknev
1w ago
Hello, aspiring ethical hackers. In our previous article, you learnt what is social engineering and various types of social engineering attacks. In this article, you will learn about Social Engineering Toolkit (SET), an open-source pen testing framework designed for performing versatile social engineering attacks. Let’s see how this tool works. For this, we will be […] The post Social Engineering Toolkit (SET): Beginners guide appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to Routersploit
Hackercool Magazine Blog
by kanishka10
1w ago
Hello, aspiring ethical hackers. In our previous blogpost on Data link layer attacks, you learnt about various devices that are present in a LAN. You also learnt that one of the devices is a router. In this article, you will learn about Routersploit, a tool that is used to test security of a routers and […] The post Beginners guide to Routersploit appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to Bloodhound tool
Hackercool Magazine Blog
by Anamar Taknev
2w ago
Hello, aspiring ethical hackers. In this article, you will learn about Bloodhound, an open-source tool that helps in identifying attack paths and relationships in Active Directory environment. Its also useful in uncovering hidden information about domain and security misconfigurations in AD (which would be impossible to find otherwise). Bloodhound is one of the favorite tools […] The post Beginners guide to Bloodhound tool appeared first on Hackercool Magazine ..read more
Visit website
UNIX privesc check: Complete guide
Hackercool Magazine Blog
by Anamar Taknev
3w ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Linux privilege escalation. In this article, you will learn about UNIX privesc check , a tool that will help you in elevating privileges on a Linux and UNIX system. UNIX privesc check is a shell script that checks for all simple privilege escalation vectors […] The post UNIX privesc check: Complete guide appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to PowerSploit
Hackercool Magazine Blog
by Anamar Taknev
3w ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt what is Post-Exploitation and various techniques of Post exploitation. In this article, you will learn about PowerSploit, a Post-exploitation framework. PowerSploit is a collection of Microsoft PowerShell modules that help Red Teamers and Penetration testers during post exploitation phase of pen testing. Let’s learn how […] The post Beginners guide to PowerSploit appeared first on Hackercool Magazine ..read more
Visit website
Beginners guide to Nishang
Hackercool Magazine Blog
by Anamar Taknev
3w ago
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Post-exploitation in detail. In this article, you will learn about Nishang, a post-exploitation framework. Nishang post-exploitation framework is a collection of PowerShell scripts and payloads that aids us in penetration testing and red teaming. Nishang can be useful in all the phases of penetration […] The post Beginners guide to Nishang appeared first on Hackercool Magazine ..read more
Visit website

Follow Hackercool Magazine Blog on FeedSpot

Continue with Google
Continue with Apple
OR