top of page
Search


12th Day of Christmas: Browser Exploitation Framework (BeEF)
On the 12th Day of Christmas, Div0 gave to me ... Browser Exploitation Framework (BeEF), theHarvester, nmap Scripting Engine (NSE),...

Div0 Blog Editor
Jan 5, 20152 min read
56 views
0 comments


11th Day of Christmas: theHarvester
On the 11th Day of Christmas, Div0 gave to me ... theHarvester, nmap Scripting Engine (NSE), msfvenom, searchsploit, urlcrazy, recon-ng,...

Div0 Blog Editor
Jan 4, 20151 min read
18 views
0 comments


10th Day of Christmas: nmap Scripting Engine (NSE)
On the 10th Day of Christmas, Div0 gave to me ... nmap Scripting Engine (NSE), msfvenom, searchsploit, urlcrazy, recon-ng, Zone Transfer...

Div0 Blog Editor
Jan 3, 20151 min read
30 views
0 comments


9th Day of Christmas: msfvenom
On the 9th Day of Christmas, Div0 gave to me ... msfvenom, searchsploit, urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest...

Div0 Blog Editor
Jan 2, 20152 min read
26 views
0 comments


8th Day of Christmas: searchsploit
On the 8th Day of Christmas, Div0 gave to me ... searchsploit, urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest Databases,...

Div0 Blog Editor
Jan 1, 20151 min read
11 views
0 comments


6th Day of Christmas: recon-ng
On the 6th Day of Christmas, Div0 gave to me ... recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash Identification,...

Div0 Blog Editor
Dec 30, 20141 min read
28 views
0 comments


2nd Day of Christmas: Password Mutation Using JTR
On the 2nd Day of Christmas, Div0 gave to me ... Password Mutation Using JTR, and Custom Word List Generator (CeWL). Previously, using...

Div0 Blog Editor
Dec 26, 20141 min read
139 views
0 comments


Port Scanning & Banner Grabbing Using Python
My Network Setup My Machine: Ubuntu 14.04 LTS with Python 2.7.6, IP address: 192.168.209.128 Another Machine: “Damn Vulnerable Linux”...

Div0 Blog Editor
Dec 17, 20143 min read
1,733 views
0 comments


Lost In Translation
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...

Div0 Blog Editor
Oct 28, 20131 min read
11 views
0 comments


PenTesting through Proxy Chaining
Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...

Div0 Blog Editor
Aug 12, 20132 min read
611 views
0 comments


Hacking Made Too Easy
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...

Div0 Blog Editor
Feb 9, 20132 min read
30 views
0 comments


Safe PenTesting with Metasploit
For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...

Div0 Blog Editor
Jan 16, 20131 min read
39 views
0 comments


Powershell Injection Using SET
At this year's BSides Cleveland and BSides Las Vegas, Dave Kennedy (ReL1K) presented "Secret Pentesting Techniques Shhh...". The purpose...

Div0 Blog Editor
Sep 13, 20122 min read
101 views
0 comments


Armitage — Metasploit Made Easy
Introduction I am sure anyone who does penetration testing or is active in the security field knows what Metasploit is, and what it does....

Div0 Blog Editor
Aug 9, 20122 min read
196 views
0 comments


Netcat – The Swiss Army Knife of Networking
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the...

Div0 Blog Editor
Nov 30, 20117 min read
1,594 views
0 comments
BLOG: Blog2
bottom of page