Author Archives: Pentester

Privilege Escalation in windows xp using metasploit
03 Jan

Privilege Escalation in windows xp using metasploit

Last post i explained how to get a admin privileges in windows 7 after successful hack,  comparing to that its even more easier in windows XP . This picture below taken when hacked successfully gain an access using  Payload create by me. For creating your own payload visit by previous post  create a payload in […]

read more »
03 Jan

OS fingerprinting with Metasploit

OS fingerprinting is the process of determining the operating system running by a host. Port 445 is used by SMB protocol for providing shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. Most usage of SMB involves computers running Microsoft Windows. To check if port 445 is open, use auxiliary/scanner/portscan/syn hit enter set RHOSTS […]

read more »
02 Jan

The Ultimate List of Hacking Scripts for Metasploit’s Meterpreter

Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on.In a previous post, I had provided you a cheat sheet of meterpreter commands. These commands are essential to running Metasploit’s meterpreter, but in recent years, numerous hackers and security pros have developed scripts that we can run […]

read more »
01 Jan

MySQL SQL Injection Practical Cheat Sheet

There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provide only the components of a SQL injection rather an entire, working string. As a result, successfully putting a valid query together can take some trial and error and waste precious time. I have thus attempted to create a […]

read more »
SQL Injection Cheat Sheet
01 Jan

SQL Injection Cheat Sheet

What is an SQL Injection Cheat Sheet? An SQL injection cheat sheet is a resource in which you can find detailed technical information about the many different variants of the SQL Injection vulnerability. This cheat sheet is of good reference to both seasoned penetration tester and also those who are just getting started in web application security. […]

read more »
HOW TO HACK WIFI WPA AND WPA2 WITHOUT USING WORDLIST IN KALI LINUX OR HACKING WIFI THROUGH REAVER
31 Dec

HOW TO HACK WIFI WPA AND WPA2 WITHOUT USING WORDLIST IN KALI LINUX OR HACKING WIFI THROUGH REAVER

Hello Friends Today I Am Going to Show You How To Hack Wifi Without Using Wordlist Or You Can Call it as Hacking Wifi Password Using Reaver Method THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY THIS IS FOR EDUCATIONAL PURPOSE […]

read more »