Wilmer AlmazanProdevnetjourney.com·4 hours agoCrunch: Custom Word List GeneratorOverview Crunch is a versatile and powerful tool for generating custom wordlists. It allows users to specify character sets, patterns, and word lengths to create tailored lists for penetration testing. This detailed guide will explain Crunch's functi...DiscussPentestingpentesting
Wilmer AlmazanProdevnetjourney.com·4 hours agoCeWL: Custom Word List GeneratorOverview CeWL, or Custom Word List Generator, is a versatile tool used by penetration testers to create tailored wordlists by crawling target websites. These wordlists are then used for various security testing purposes, such as password cracking, br...DiscussPentestingcewl
Wilmer AlmazanProdevnetjourney.com·5 hours agoGenerating a Custom Wordlist Using John the RipperOverview John the Ripper (often abbreviated as "John" or "JtR") is a widely used password-cracking tool that includes powerful wordlist generation capabilities. While John is primarily known for its password-cracking functions, it also provides utili...DiscussPentestingwordlist
Morgan Bin Bashmorganbinbash.hashnode.dev·Jul 24, 2024Advanced SQLI TechniquesWARNING: If you don't know what you are doing, please refrain from using these techniques. Improper use may harm the database. Advanced Payloads and Techniques Error-Based SQL Injection Advanced Error Payloads: ' AND (SELECT 1 FROM (SELECT COUNT(*...Discusscyber security
Christine Coomanschristinecdev.hashnode.dev·Jul 24, 2024How to Install Genymotion & VirtualBox on Parrot OSI’ve recently dived into the world of “hacking”. No, not the type of advanced hacking that you see in Watch Dogs or Mr. Robot, because I am a super noob/skiddie, and let’s be honest, cybersecurity is vast and difficult to get started in. So I thought...Discuss#genymotion
Wilmer AlmazanProdevnetjourney.com·Jul 24, 2024Crafting Backdoors with MetasploitDisclaimer: This guide is for educational purposes only. Unauthorized use of these techniques for hacking activities is illegal. Metasploit is a crucial tool for penetration testing, providing a robust environment for creating and deploying stealthy ...DiscussPentestingpentesting
Muhammad Mushlihmushlih.hashnode.dev·Jul 15, 2024How to Connect an Android Emulator to WSLConnecting an Android Emulator or a real Android device to WSL (Windows Subsystem for Linux) can be very useful for development purposes. This tutorial will guide you through the steps required to establish this connection over USB. Step 1: Configure...Discuss·29 readspentesting
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...Discussjpfdevs cybersec
Cyber Seklercybersekler.com·Jul 13, 2024Git Gone Wrong: Application Compromise via Exposed .git DirectoryEvery penetration test begins with reconnaissance, and my initial steps always involve looking for potentially interesting endpoints. During one engagement, I encountered an exposed .git endpoint and I will discuss how I exploited it to gain admin-le...Discuss·38 readspenetration testing
0ussamaBernoubernou.hashnode.dev·Jul 6, 2024Streamline Your Local VM Workflow with AutomationTired of the repetitive process of setting up a new Linux virtual machine for pen testing? Do you ever find yourself creating snapshots to avoid configuration mistakes, only to forget to do so and end up reinstalling everything? This blog post introd...Discuss·10 likesansible