WordPress Users Scan/Enumeration
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
Hello friend’s, all of we know that wordpress is one of the most popular platform now a days. It cover lot’s market because it’s open source and awesome features, etc. WordPress have a default things like database contents and path also, so sometime it easy to gather information with predefined installation of it. Here we are also going to perform a basic information gathering work with a simple python script. In this tutorial, we are going to gather the information about user which available on particular wordpress based website. for this we are going to use a simple python script whic ..read more
Visit website
SQLMAP – Perform SQL Injection | Windows 10
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
Hello friend’s, lots of people ask me that can we able to run the tools on windows which are preinstalled in Kali Linux or any other penetration testing distro. My answer is here yes, we can easily install and run various penetration tools on windows platform also, but they required some dependencies. For ex a tool which creates in python with .py raw extension so this kind of tool or program required python to run it, that’s the common sense. In this article we are going to learn about SQLMAP but we are using it on windows platform. SQLMAP built in python, so we required python. For that ..read more
Visit website
LinksF1nd3r – Web Information Gathering | Kali Linux 2019.1a
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
Hello friend’s, as we know information gathering is one of the most important task for a penetration tester or an attacker. So we use different tools for information gathering like scanners,search engine as well as lots of other techniques eg social engineering. So this tutorial is basic about the information gathering stuff which help an attacker or penetration tester lot. Sometime we are trying to find all the links that included in a specific page. or else we can take simple example of unlock system for download so we need to like or subscribe what if you will get direct download link o ..read more
Visit website
SpyRat – Simple Python Rat | Kali Linux 2019.1a
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
Hello friend’s, I am back here with one more tutorial on Rat’s. Lot’s of my friend’s ask me about RAT and how we can create our own rat. So In this tutorial we are going to learn about a rat which built in python as well as we can refer it to create our own. RAT is refer as Remote Access Trojan, which help an attacker to give an access of victim system, Here we are going to use a rat called as SpyRat which is written in python and developed by M4sc3r4n0 Mostly rat gives reverse shell, in that attacker only need to listen on particular port. First we need to download our tool from gi ..read more
Visit website
Create FUD using NXcrypt – Python Backdoor Framework | Kali Linux 2019.1a
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
Hello Friend’s, I am back here with a new tutorial, as we know lots of people create a backdoor using msfvenom with or without encoder option. If you go with one of the famous encoder “shikata ga nai” is also detected by many antiviruses. So here is the issue comes in scenario, if you are penetration tester or ethical hacking trying for post exploitation then obviously you will try to execute some file [backdoor] on that particular machine. Most important challenge is here that an attacker need to encode backdoor in a way that none of antivirus will detect it or bypass it. In this tutorial ..read more
Visit website
How to change/set wifi adapter to monitor mode manually
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
I saw lots of my friends having problem while enabling monitor mode, so here i bring a simple and basic method to change/set monitor mode of an external wifi adapter like tp-link or alfa, etc. First we need to verify the name of wireless interface or we can say wifi adapter it may be external or built-in, for that we need to run the command given below- ifconfig In the above example, wlan0 is a wireless interface, an external wifi adapter. Now to check which interface have wireless extension, we are also ging to use a command, we can predict that eth0 and lo doesn’t have wireless ..read more
Visit website
How to Hack Wi-Fi using Kali Linux | Aircrack-ng
FH-Team - Penetration Testing | Ethical Hacking
by Shubham Nagdive
5y ago
Hello friend’s, as we know that wifi hacking is one of the most popular stuff into hacking field. There are lots of methods to crack wifi encryption. It contains different encryption like WEP, WPA, WPA2, WPA3. As well as lots of tools available to perform attacks against target wifi network. Aircrack-ng is suite of tools which use for wifi cracking, it perform different task monitoring, testing, cracking. developed by Thomas d’Otreppe de Bouvette. Aircrack-ng precome in lots of penetration operating system like Kali Linux, Parrot Sec, etc. If you don’t know what is monitor mode and ..read more
Visit website

Follow FH-Team - Penetration Testing | Ethical Hacking on FeedSpot

Continue with Google
Continue with Apple
OR