Analysis of Algorithms
UPSC IAS Exams Notes
Developer's Best Practices
Questions and Answers
Effective Resume Writing
HR Interview Questions
Who is Who
Get the Reverse Shell with MSI package
Published on 23-Sep-2020 15:57:06
Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is Msiexec.exe.Launch msiexec attack via msfvenomLet’s generate an MSI Package file (1.msi) utilizing the Windows Meterpreter payload as follows;msfvenom -p windows/meterpreter/reverse_tcp ...
Bypass Antivirus with Shelter
Published on 23-Sep-2020 15:55:27
Shellter is an active shellcode insertion tool. It effectively re-encodes payloads to bypass anti-virus software. Shellter embeds a 32-bit Windows application and the shellcode in such a way that it goes undetected by the AV software.InstallationYou can install Shellter directly on Kali by using the following command −apt-get install shellterapt-get ...
Safe & Security
Published on 23-Sep-2020 15:52:58
Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB ...
Address Space Layout Randomization (ASLR)
Published on 23-Sep-2020 15:50:51
Memory corruption vulnerabilities have plagued software for decades, despite efforts by large companies like Apple, Google, and Microsoft to eradicate them. This article presents some basic facts about ASLR, focusing on the Windows implementation. In addition to covering what ASLR accomplishes to improve security posture, we aim to give defenders ...
How to Secure ZOOM application
Safe & Security
Published on 20-Apr-2020 09:37:31
This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having ...
Bypass Anti-virus using Veil Framework
Server Side Programming
Published on 20-Apr-2020 09:31:31
This article is intended to demonstrate, how to bypass the anti-virus detection using the Veil framework, as it is a collection of tools designed for use during penetration testing. It currently consists of the following modules −Veil-Evasion − a tool to generate antivirus-evading payloads using a variety of techniques and ...
Published on 13-Apr-2020 11:44:23
This article showcases the real − time satellite tracking and orbit prediction program for both the Linux and desktop using gpredict software. We can run in real-time, simulated real-time (fast forward and backward), and manual time control with this tool.Core features of GpredictTracking of a large number of satellites moving ...
Run Linux Natively on Windows 10
Published on 13-Apr-2020 11:38:42
Microsoft has introduced the WSL Subsystem for Linux, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine.Limitations of Windows Subsystem for LinuxWhile this is a step in the right direction for Microsoft, it's not quite there yet in terms of ...
Windows UAC protection Bypass
Safe & Security
Published on 18-Mar-2020 12:40:37
UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling ...
Reset Kali Linux Password
Published on 18-Mar-2020 12:32:49
The Kali Linux is a Debian-derived Linux distribution designed for penetration testing and digital forensics adopted by both hackers and security professionals. It is highly probable that the user could not have been login owing to the forgotten password or not able to reset the password after installing it in ...
Bookmark this page