Menu

Articles of @neoslab

All articles written by @neoslab
How Hackers Exploit Struts2 on Linux and Windows Servers
How Hackers Exploit Struts2 on Linux and Windows Servers

The Jakarta Multipart Parser in Apache Struts 2 has incorrect exception handling and error-message generation during file-upload attempts.

ApacheJexbossLinuxMetasploitStruts2Windows
Top Password Cracking Techniques used by Hackers
Top Password Cracking Techniques used by Hackers

In general, most people will tend to set passwords that are easy to remember, such as a birthday, a first-name or last-name, a license plate or a phone number.

DictionaryHydraJohnJohnnyRainbowCrackBruteforce
SQL Injection Tutorial from Beginner to Advanced
SQL Injection Tutorial from Beginner to Advanced

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server.

BlindInjectionMySQLSelectSQLITablesUnion
How to Find my IP Address using command line on Linux
How to Find my IP Address using command line on Linux

How do I find my public IP address on the Linux and OS X Unix using my own bash shell script ? Is there command-line option which will show my dynamic IP?

BashCurlDIGIPOpenDNSProtocol
How to hide my IP Address using TorPhantom
How to hide my IP Address using TorPhantom

How to hide your IP ? TOR is one of the best available network to protect your identity. Its considered safe because of its highly cryptographic data transfer [...]

DNSLeakIptablesNodeTORCryptography
How to Create a Web-Based Javascript Keylogger
How to Create a Web-Based Javascript Keylogger

Researchers estimate thousands of ecommerce sites are under attack by a single threat actor that has infected servers with a web-based keylogger.

InjectJavascriptjQueryKeyloggerKeystrokesPHP
How to Create a Reverse Shell to Remotely Execute Commands
How to Create a Reverse Shell to Remotely Execute Commands

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want to establish an [...]

BashNetcatPerlPHPPythonReverseRubyShellTelnet
The Most Useful Nmap Commands from Beginner to Advanced
The Most Useful Nmap Commands from Beginner to Advanced

Nmap is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine also against [...]

HostNmapPortProtocolScanningServices
Evading AntiVirus with Encrypted Payloads using Venom
Evading AntiVirus with Encrypted Payloads using Venom

Be able to bypass Antivirus can be very useful while penetration testing phases. Venom allow you to generate shellcode that work with encrypted payloads.

AntivirusDLLMetasploitMSIPayloadsPythonRubyVenom
Getting Started with Metasploit for Ethical Hacking
Getting Started with Metasploit for Ethical Hacking

As an Ethical Hacker, you will be using "Kali Distribution" or "Parrot" which has the Metasploit community version embedded in it along with other ethical [...]

AuxiliaryEncoderEvasionExploitPayloads
How to Generate a Payload for Metasploit
How to Generate a Payload for Metasploit

Often one of the most useful and to the beginner underrated abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module.

ASPBashBinaryJSPMacPayloadsPerlPHPPython