Assignment Task: Create a Shell_Reverse_TCP shellcode Reverse connects to configured IP and Port Execs shell on successful connection IP and Port should be easily configurable The TCP reverse shell is used to connect back to the attacking machine, with an interface to execute commands on the target machine. The TCP reverse shell code consists of […]

SLAE: Assignment #2

SLAE: Assignment #1
Assignment Task: Create a Shell_Bind_TCP shellcode Binds to a port Execs shell on incoming connection Port number should be easily configurable The TCP bind shell is used to setup a listener (or server) on the target machine which allows the attacker machine to execute commands on the said machine. The TCP bind shell code consists […]
AttackDefense: Meterpreter Basics Walk-through
This video gives a walk-through of AttackDefense Meterpreter Basics lab. To visit AttackDefense Labs, use the following URL: http://public.attackdefense.com/
AttackDefense: TShark Basics Walk-through
This video gives a walk-through of AttackDefense TShark Basics lab. To visit AttackDefense Labs, use the following URL: http://public.attackdefense.com/
Steal Windows Credentials using a PDF File (NTLM Hash)
This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files.
Hack Windows 7 SP1 in 3 mins: Using NSA Hacking Tools
In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool.
Durpalgeddon2: Patch or Be Hacked
This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2.

Google Play Protect: Android’s New Security System
Now more than ever, mobile device users are conscious about significant advances in both device and OS security. Every time a new build of a mobile operating system is released, it includes a variety of new safety features. This time Google has taken a significant step forward with Google Play Protect. Since it was launched […]

Here’s how to ensure online safety of your children
The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]

BlueBorne: Turn that Bluetooth off
A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 8
- Next Page »