Computer Network Articles

Page 40 of 122

Rundll32.exe Attack

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 727 Views

A Rundll32.exe attack exploits the legitimate Windows utility rundll32.exe to execute malicious Dynamic Link Libraries (DLLs). Rundll32.exe is a Windows system process that allows programs to invoke functions from DLL files, making it an attractive target for attackers who can abuse this functionality to run malicious code while appearing as legitimate system activity. Attackers leverage rundll32.exe because it can load and execute code from DLL files, and security tools often trust this legitimate Windows process. This technique is commonly used in penetration testing and malware campaigns to bypass security controls and establish remote access to target systems. How ...

Read More

Bypass Antivirus with Shelter

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

Shellter is a dynamic shellcode injection tool used in penetration testing to bypass antivirus detection. It works by taking legitimate PE (Portable Executable) files and injecting custom payloads into them while maintaining the original application's functionality, making the modified executable appear legitimate to antivirus software. Shellter operates differently from traditional packers or crypters by using dynamic analysis to understand the target executable's behavior, then strategically places shellcode at runtime locations that won't interfere with normal operation. How Shellter Works The tool employs several sophisticated techniques to achieve AV evasion: Dynamic Analysis − Shellter runs the ...

Read More

Get the Reverse Shell with MSI package

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 2K+ Views

Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is msiexec.exe. In penetration testing, MSI packages can be leveraged to obtain reverse shells on target Windows systems. This technique exploits the legitimate Windows Installer functionality to execute malicious payloads. How It Works The MSI reverse shell technique works by creating a malicious MSI package containing a reverse shell payload. When executed on the target system using msiexec, the package triggers the payload to establish a connection back ...

Read More

Hacking with Santet

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

This article demonstrates how to use the Santet penetration testing tool, which combines multiple security testing capabilities into a single package. Santet includes payload generation, Facebook group hijacking, SMS bombing, SMS spoofing, and Denial of Service (DoS) attack functionalities for ethical hacking and security research purposes. Important: This tool should only be used in authorized penetration testing environments or for educational purposes. Unauthorized use against systems you don't own is illegal and unethical. Installation and Setup To install Santet on Kali Linux, follow these steps: Step 1: Clone the Repository Open a terminal in Kali ...

Read More

Hacking with HTA file (MSHTA.exe)

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 2K+ Views

The Windows OS utility MSHTA.exe is responsible for running HTA (HTML Application) files that can execute JavaScript or VBScript code. These files can be interpreted and executed using the Microsoft MSHTA.exe tool, making them a potential attack vector for malicious activities. HTA File Execution Process HTA File .hta extension MSHTA.exe Windows utility Code Execution JS/VBScript ...

Read More

TheZoo Repository Live Malware Analysis

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

TheZoo is an open-source repository that provides cybersecurity researchers and malware analysts with access to live malware samples for educational and research purposes. It enables the study of malware behavior, analysis techniques, and development of countermeasures in a controlled environment. TheZoo contains a comprehensive collection of malware samples categorized by family, type, and platform. This repository serves as a valuable resource for security professionals, researchers, and students who need to understand how malicious software operates and spreads. Installation and Setup To set up TheZoo repository on your system, follow these steps: git clone https://github.com/ytisf/theZoo cd ...

Read More

Pentesting using Docker

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 358 Views

Penetration testing using Docker provides security professionals with an efficient way to deploy and test vulnerable applications in isolated environments. Docker containers offer a clean, reproducible setup for security assessments without affecting the host system. Docker is a containerization platform that packages applications with all their dependencies into lightweight, portable containers. This makes it ideal for quickly setting up vulnerable web applications like DVWA (Damn Vulnerable Web Application) for penetration testing practice. Installing Docker Before setting up vulnerable applications, install Docker on your system using these commands: apt update apt install docker.io systemctl start docker ...

Read More

Functions of the Network Layer

Moumita
Moumita
Updated on 16-Mar-2026 22K+ Views

The network layer or layer 3 of the OSI model is responsible for delivering data packets from source to destination across multiple hops or links. It also controls the operation of subnets and manages logical addressing for end-to-end communication. The network layer acts as an intermediary between the transport layer above and the data link layer below, ensuring reliable packet delivery across interconnected networks. Network Layer Functions Source Host Transport ...

Read More

Network Layer Design Issues

Moumita
Moumita
Updated on 16-Mar-2026 54K+ Views

The network layer or layer 3 of the OSI (Open Systems Interconnection) model is concerned with delivery of data packets from the source to the destination across multiple hops or links. It is the lowest layer that is concerned with end−to−end transmission. The designers who are concerned with designing this layer need to address certain critical issues that encompass the services provided to the upper layers as well as internal design of the layer. The design issues can be elaborated under four heads: Store−and−Forward Packet Switching Services to Transport Layer Providing Connection Oriented Service Providing Connectionless Service ...

Read More

Store – and – Forward Packet Switching

Moumita
Moumita
Updated on 16-Mar-2026 19K+ Views

In telecommunications, store-and-forward packet switching is a technique where data packets are stored in each intermediate node before being forwarded to the next node. The intermediate node verifies that the packet is error-free before transmitting, thus ensuring data integrity. The network layer typically operates using store-and-forward packet switching. Working Principle The source node delivers its packet to the nearest router. The packet is stored in the router until it has fully arrived and its checksum is verified for error detection. Once verified, the packet is transmitted to the next router. This process continues at each router until the ...

Read More
Showing 391–400 of 1,219 articles
« Prev 1 38 39 40 41 42 122 Next »
Advertisements