Div0 Blog EditorJan 4, 20152 min12th Day of Christmas: Browser Exploitation Framework (BeEF)On the 12th Day of Christmas, Div0 gave to me ... Browser Exploitation Framework (BeEF), theHarvester, nmap Scripting Engine (NSE), msfve...
Div0 Blog EditorJan 3, 20151 min11th Day of Christmas: theHarvesterOn the 11th Day of Christmas, Div0 gave to me ... theHarvester, nmap Scripting Engine (NSE), msfvenom, searchsploit, urlcrazy, recon-ng, ...
Div0 Blog EditorJan 2, 20151 min10th Day of Christmas: nmap Scripting Engine (NSE)On the 10th Day of Christmas, Div0 gave to me ... nmap Scripting Engine (NSE), msfvenom, searchsploit, urlcrazy, recon-ng, Zone Transfer ...
Div0 Blog EditorJan 1, 20152 min9th Day of Christmas: msfvenomOn the 9th Day of Christmas, Div0 gave to me ... msfvenom, searchsploit, urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest Data...
Div0 Blog EditorDec 31, 20141 min8th Day of Christmas: searchsploitOn the 8th Day of Christmas, Div0 gave to me ... searchsploit, urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest Databases, Has...
Div0 Blog EditorDec 29, 20141 min6th Day of Christmas: recon-ngOn the 6th Day of Christmas, Div0 gave to me ... recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash Identification, Passwo...
Div0 Blog EditorDec 25, 20141 min2nd Day of Christmas: Password Mutation Using JTROn the 2nd Day of Christmas, Div0 gave to me ... Password Mutation Using JTR, and Custom Word List Generator (CeWL). Previously, using Ce...
Div0 Blog EditorDec 16, 20143 minPort Scanning & Banner Grabbing Using PythonMy Network Setup My Machine: Ubuntu 14.04 LTS with Python 2.7.6, IP address: 192.168.209.128 Another Machine: “Damn Vulnerable Linux” (DV...
Div0 Blog EditorOct 27, 20131 minLost In TranslationA substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...
Div0 Blog EditorAug 11, 20132 minPenTesting through Proxy ChainingUnlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing framew...
Div0 Blog EditorFeb 8, 20132 minHacking Made Too EasyA couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught m...
Div0 Blog EditorJan 15, 20131 minSafe PenTesting with MetasploitFor anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems vulnerab...
Div0 Blog EditorSep 12, 20122 minPowershell Injection Using SETAt this year's BSides Cleveland and BSides Las Vegas, Dave Kennedy (ReL1K) presented "Secret Pentesting Techniques Shhh...". The purpose ...
Div0 Blog EditorAug 8, 20122 minArmitage — Metasploit Made EasyIntroduction I am sure anyone who does penetration testing or is active in the security field knows what Metasploit is, and what it does....
Div0 Blog EditorNov 29, 20117 minNetcat – The Swiss Army Knife of Networking1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the abi...