Skip to main content

Posts

Showing posts from August, 2020

Theharvester: Email Harvesting Throughout Year

You might have harvested many things upto now but what we are going to harvest today is something bad :) Requirements: A Linux box (I'm using Kali Linux ) theharvester program (already available in Kali Linux) So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address. OK stop talking and start doing. Fire up a terminal in your kali box an...

RapidScan: The Multi-Tool Website Vulnerabilities Scanner With Artificial Intelligence

RapidScan's Features: One-step installation. Executes a multitude of security scanning tools , does other custom coded checks and prints the results spontaneously . Come of the tools include nmap , dnsrecon , wafw00f , uniscan , sslyze , fierce , lbd , theharvester , dnswalk , golismero etc executes under one entity. Saves a lot of time, indeed a lot time! Checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively. Legends to help you understand which tests may take longer time, so you can Ctrl+C to skip if needed. Association with OWASP Top 10 2017 on the list of vulnerabilities discovered. (under development) Critical, high, large, low and informational classification of vulnerabilities. Vulnerability definitions guides you what the vulnerability actually is and the threat it can pose Remediations tells you how to plug/fix the found vulnerability. Executive summary gives you an overall context of the scan performed with criti...

EasySploit: A Metasploit Automation Bash Scripts To Use Metasploit Framework Easier And Faster Than Ever

About EasySploit:  EasySploit is  Metasploit automation tool to use Metasploit Framework EASIER and FASTER than EVER. EasySploit's options: Windows --> test.exe (payload and listener) Android --> test.apk (payload and listener) Linux --> test.py (payload and listener) MacOS --> test.jar (payload and listener) Web --> test.php (payload and listener) Scan if a target is vulnerable to ms17_010 (EnternalBlue) Exploit Windows 7/2008 x64 ONLY by IP (ms17_010_eternalblue) Exploit Windows Vista/XP/2000/2003 ONLY by IP (ms17_010_psexec) Exploit Windows with a link (HTA Server) Contact with me - My accounts EasySploit's installation    You must install Metasploit Framework first.    For Arch Linux-based distros, enter this command: sudo pacman -S metasploit    For other Linux distros, enter these command to install Metasploit Framework:    And then, enter these commands to install EasySploit: How to use EasySploit? (EasySploit video...

RECONNAISSANCE IN ETHICAL HACKING

What is reconnaissance in ethical hacking? This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc. They are of two types- Active Reconnaissance  Passive Reconnaissance  1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail! Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system. Related word Hacking Tools Software Termux Hacking Tools 2019 Hacking Tools Name Hackers Toolb...