Posts

Showing posts from May, 2020

A Step By Step Tutorial On How To Setup Proxy Chains In Kali Linux

Image
----------------------------- For Beginners : ----------------------------- If you have installed kali linux on a VMWare workstation or even on your physical machine, you may be able to try and use this steps mentioned in the tutorial. Stay anonymous using proxy chain on kali linux ------------------------------ Procedure : ----------------------------- Note your IP address and DNS address from google before doing this step ✔️Procedure 1: Edit the Proxychains configuration file inside ''etc'' folder nano /etc/proxychains.conf ✔️Procedure 2: (Now in the proxychains.conf file make the below changes) ⚠ Remove the # before dynamic change ⚠ Add the # before strict change ⚠ Remove the # before proxy dns request – no leak for dns data ⚠ In the [proxy list] add a line below socks4 – ⚠ Socks5 127.0.0.1 9050 ✔️Procedure 3: Check if your kali linux os has been installed with TOR service service tor status ✔️Procedure 4: If Tor service is Installed p

OSINT Framework

Image
OSINT Framework: The Perfect Cyber Security Gathering Tool While there are tons of public resources for getting information about any individual or organization, they are spread throughout different parts of the internet, sometimes mixed with security tools and data intelligence utilities. That’s why the OSINT Framework plays such an important role. What is OSINT Framework? A collection of OSINT tools to make your information gathering and data collection tasks easier. This tool is mostly used by security researchers and penetration testers for digital footprinting, OSINT research, intelligence gathering, and reconnaissance. It provides a simple web-based interface that allows you to browse different OSINT Tools  filtered by categories. OSINT Framework is classified based on different topics and goals. This can be easily seen while taking a look at the OSINT tree available through the web interface. OSINT Framework classification When you immediately load the w

XSS Cheat Sheet

Image
Top Most Important XSS Script Cheat Sheet for Web Application Penetration Testing. XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable. Here we are going to see about most important XSS Cheat Sheet. What is XSS(Cross Site Scripting)? An attacker can inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site. XSS classified into three types and these XSS Cheat Sheet will help to find the XSS vulnerabilities for Pentesters. Reflected XSS Stored XSS DOM-Based XSS Link:-  https://github.com/abhinavporwal/xss-cheat-sheet

HackTheBox.eu Lab Setup

Image
Hackthebox is one of the best sites to test and improve your hacking skills, it’s fun to complete challenges and crack the active boxes. THIS IS MERELY CREATED FOR EDUCATIONAL & ETHICAL PURPOSE, AUTHOR IS NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY THE VISITORS Step 1.    Go to  https://www.hackthebox.eu/  ; scroll down and click on “ Login ” Step 2.   You will be redirected to  https://www.hackthebox.eu/home   Step 3.   Click on the access option. You will be redirected to  https://www.hackthebox.eu/home/htb/access Step 4.   Follow the given step in Getting Started Portion. Step 5.    Download your connection pack. Step 6.   This is your connection pack file. Step 7.   Open Terminal where your connection file. Step 8.   Enter this command.     Run openvpn example.ovpn in terminal.   Step 9.   Enter your sudo password & press enter key Step 10.   Check last line in cmd if you see Initialization sequence c