(878) 959-8010

create a plugin for the most used Open Source CMS WordPress. By activating this plugin, you will receive a Reverse Shell Connection from the Victim System to your Attacking Machine. In the first step I search for an existing WordPress installation with the Information Gathering Tool nikto on the web server in the run-up, I…

860-695-1094

in this tutorial I explain how it is possible within a few seconds to get a remote shell connection from the vulnerable system to my attack machine. what we need for it is a special USB Stick. I personally use the Hak5 (USB Rubber Ducky) then a small script which is run by USB Stick…

Cr4ck WPA / WPA2 Network Key

In this tutorial I show you how easy it is to hack an encrypted (WPA / WPA2) network. the WPA / WPA2 password must be cracked. What you need is a Linux distribution of your choice. I have used BackTrack 5 for this, in addition a Wlan Stick the Wireless Stick is active. and a…

Social Engineering Identity theft

in this tutorial I steal Login data for example facebook.com The good thing is that the user gives me this data voluntarily. He logs in on a manipulated Facebook login page, which I have provided to you. and its logins are recorded in real time. start with this Command the Social Engeeniring Toolkit setoolkit you…

zoacum

OSCE is a Certification for the Offensive-Security CTP (Cracking the Perimeter) Course. The Cracking The Perimeter (CTP) Course is a online security course combines a unique blend of penetration testing skills for one purpose: how to bypass security. The field of pentesting is constantly evolving. Both security awareness training and more secure technologies are on the rise. The bar…

601-573-2270

Before registration you must face a challenge provided at /www.fc4.me Here is the challenge: The “Cracking the Perimeter” Online course is not an introductory security course. Many pre-requisites are required, such as good familiarity with a Ollydbg, and a general mastery of offensive network security techniques. This is a two stage registration Challenge: Stage 1:…

2086885012

In this tutorial I will show you how you can spy on the last or even the current location from another person. ATTENTION the spying on other persons is strictly forbidden. I accept no liability for damages caused by imitation. These tools are required. Kali Linux (Penetration Tester & Hacker Linux Distribution) The tool Trity…

949-225-7059

The offensive security Wifu course is designed for network administrators, network penetration tester and ethical hacker The Offsec Wifu (OSWP) course is a pure offline course. Alone, this course is extremely different from the other PWK (OSCP) and CTP (OSCE) Offsec courses, as these are complete online courses. At the Wifu course you can get…

Boot2Root Vulnerable Machine Mr.Robot

i test in my virtual Homelab to hack vulnerable Machines. Here again one that was successfully hacked. This system is an Ubuntu 14.04.2 this vulnerable Machine can you Download from this URL with the tool netdiscover found i the IP Address from the vulnerable Machine Mr.Robot in my virtual Lab Network. netdiscover -r 192.168.234.0/24 with…

Boot2Root on a Vulnerable Machine Sedna

i test in my virtual Homelab to hack vulnerable Machines.Here again one that was successfully hacked. This system is an Ubuntu 14.04.1 LTS this vulnerable Machine can you Download from this URL with the tool nikto found i a interessting File on the Victim System This is a vulnerability in the installed CMS, which means…