Windows POST Exploitation: Koadic
Hackercool Magazine
by kanishka10
1M ago
Hello aspiring Ethical Hackers. In this article you will learn about a Windows POST Exploitation tool named Koadic. Koadic, or COM command and control is a Rootkit tool that is used for Windows POST exploitation. It is similar to Meterpreter and Powershell Empire except that it performs most of its operations using Windows Script Host. […] The post Windows POST Exploitation: Koadic appeared first on Hackercool Magazine ..read more
Visit website
Password Cracking for Beginners
Hackercool Magazine
by kanishka10
1M ago
Hello aspiring Ethical hackers. In this article, you will learn what is password cracking and various types of password cracking. In Ethical hacking, password cracking is recovering passwords from data that has been stored in or transmitted by a computer system. Hackers use password cracking to grab credentials which can be helpful in further exploiting […] The post Password Cracking for Beginners appeared first on Hackercool Magazine ..read more
Visit website
EternalBlue vulnerability: Explained with POC
Hackercool Magazine
by kanishka10
2M ago
Hello, aspiring Ethical Hackers. In this article, you will learn about the infamous EternalBlue vulnerability and its exploitation. Vulnerability & Impact Exploited by Wannacry ransomware, the EternalBlue vulnerability exists in the Server Message Block (SMB) protocol. Due to improper handling of specially crafted packets by SMB version 1 (SMBV1) of Microsoft windows this vulnerability allows […] The post EternalBlue vulnerability: Explained with POC appeared first on Hackercool Magazine ..read more
Visit website
Excel 4.0 Macros: How to create a malicious one
Hackercool Magazine
by kanishka10
2M ago
Hello aspiring ethical hackers. In our previous article, you have learnt what a Macro is and how to create a malicious VBA macro. In this article, you will learn about Excel 4.0 Macros and how to create one. Excel 4.0 Macros or XLM were introduced by Microsoft in 1992 when Excel 4.0 was launched as […] The post Excel 4.0 Macros: How to create a malicious one appeared first on Hackercool Magazine ..read more
Visit website
Malicious Macro’s : What, Why and How
Hackercool Magazine
by kanishka10
2M ago
Hello aspiring Ethical Hackers. In this article, you will learn about Malicious Macros also known as Macro Malware or Macro Virus. In computer science, a Macro is a set of commands grouped together as a single command. This is used to run some tasks automatically. In Word, Macros are used to automate frequently used tasks.           […] The post Malicious Macro’s : What, Why and How appeared first on Hackercool Magazine ..read more
Visit website
Name-That-Hash: A tool to identify hashes
Hackercool Magazine
by kanishka10
3M ago
Hello aspiring Ethical hackers. In this article, you will learn about a new tool named Name That Hash. Name That Hash is a hash identifying tool that can identify over 300 types including MD5 and SHA256. The other features of this tool include displaying summaries for the hashes identified, colored output and displaying in the […] The post Name-That-Hash: A tool to identify hashes appeared first on Hackercool Magazine ..read more
Visit website
Gophish: Setup a Phishing Campaign
Hackercool Magazine
by kanishka10
3M ago
Hello aspiring ethical hackers. In this article you will learn how to setup a phishing campaign. Readers have learnt what is phishing and various phishing techniques in our previous blog posts.  It is a fitting conclusion that the next article in our phishing series should be about creating a phishing campaign. Phishing campaign or Email […] The post Gophish: Setup a Phishing Campaign appeared first on Hackercool Magazine ..read more
Visit website
Nim Malware and AV Evasion
Hackercool Magazine
by kanishka10
3M ago
Hello aspiring ethical hackers. In this article, you will learn about Nim malware and how hackers are using it to bypass Antivirus solutions. “Cyber Security researchers at ProofPoint were tracking a hacking operation they named as TA800. TA800 had a common mode of operation. They send personalized phishing emails containing a link to a supposed […] The post Nim Malware and AV Evasion appeared first on Hackercool Magazine ..read more
Visit website
WPS pin is cracked but WPA key is not shown
Hackercool Magazine
by kanishka10
4M ago
Hello aspiring ethical hackers. In this article, you will learn how to solve a problem that you experience while cracking WPS pin. We have seen how to retrieve WPA key by cracking WPS pin with both Bully and Wifite. Well, If you get WPA key as soon as you crack WPS pin, you are lucky. […] The post WPS pin is cracked but WPA key is not shown appeared first on Hackercool Magazine ..read more
Visit website
Digital Forensics with Autopsy : Part 2
Hackercool Magazine
by kanishka10
4M ago
Hello aspiring Computer Forensic Investigators. This article is the second part of performing Digital Forensics with Autopsy. Read the first part here. So let’s continue answering the questions presented by the case.   11. When was the last recorded computer shutdown date/time?  The last recorded shutdown date and time can be found out in the […] The post Digital Forensics with Autopsy : Part 2 appeared first on Hackercool Magazine ..read more
Visit website

Follow Hackercool Magazine on Feedspot

Continue with Google
OR