Brute Forcing Multiple Databases using HexorBase

HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ). HexorBase allows packet routing through proxies or even metasploit pivoting antics to communicate with remotely inaccessible servers which are hidden within local subnets.

To run hexorbase in kali Linux  click application > database assessment > hexorbase

Another way, open the terminal and type hexorbase.

 It will open graphical interface for hexorbase as given in the screenshot. It is the collection of several database servers where you can apply brute force attack on desired server.

Now to start brute force attack, first you need to create an account. In the middle you can see administration panel here type username and password according to your wills. I had type admin: pass as username and password this will allow me to start brute force attack using hexor on desired backend server.

Now choose your database type. I have selected MY SQL for brute force attack.

Now follow few steps for brute force attack on server.

  • Type target IP: 168.1.104 under database connection.
  • Now click on user list for dictionary attack option and select a dictionary of username.
  • Repeat the above step for word list to select password list.
  • Finally click on lunch attack to start brute force attack.

Now it will try to match the combination of username and password on target IP. After sometime when the process is completed 100% you will get matched combination as result. You can perceive from screenshot that I have got username and password combination as msfadmin:msfadmin for MYSQL server.

Author: AArti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here

Search Port Names and Numbers using whatportis

Whatportis is a utility command to search port numbers and/or names. It often happens that we need to find the default port number for a specific service, or what service is normally listening on a given port.

Many a times what happens is while running an nmap command, we encounter various ports whose information are missing or we couldn’t recognize the port. At that time, whatportis will be helpful.

To run the command, we first need to download the utility from github. To install whatportis from github, we type the following command:

pip install whatportis

If the dependencies of the utility are already installed on your pc, it will take less time to install; else the installation time will depend on your connection speed.

Once, the utility is installed, we can run the command, ‘whatportis’.

For example, I want to check what all port names are there for the port number 80, so I type:

whatportis 80

As we can see that all the port names associated with the port 80 is displayed on the screen.

Another example could be:

whatportis 3389

And whatportis displays 3389 successfully, which is a Microsoft WBT Server port.

Yet another example is:

whatportis 445

Where, 445 is a Microsoft-ds port. We can confirm the result on internet or consulting any good book.

Author: Harshit Rajpal is an InfoSec researcher and has a keen interest in technology. contact here

How to Detect Meterpreter in Your PC

Anti-metasploit is an article to know about how can you detect if you are hacked by someone through metasploit or not. Today, most of the time we stumble upon the ways about how we can be hacked or how to hack someone but no one tells you that how to detect if you are hacked.

So, therefore, in this article we will learn how to detect of you are hacked someone through metasploit. And to this there are two tools :

  • Antipwny
  • Antimeter

Both of these tools will help us to achieve our goal. These tools help you kill the meterpreter session that your hacker has gained. You can download these tools from –>


When you will double click on the software, a dialogue box will open and it will show the meterpreter file running in your computer as show :

Now, right click on the process and select kill process option.

And so you can detect the file and stop it too in just two simple steps.


When you open this software, it will scan the whole computer and it show the virus containing file. Also, it will ask you to kill the process or not. So, you type y for yes and the process will die.

Thus, the ways to detect if you have been hacked. These tools does not only allow us to detect the file but helps us to kill it also that too in two simple steps. When the steps are completed your hacker will loose the session making you safe and secure. So go on and raise your head against these exploiting hackers.

Author: Yashika Dhir is a passionate Researcher and Technical Writer at Hacking Articles. She is a hacking enthusiast. contact here

Perform Man in the Middle Attack in Network using Xerosploit

Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow realising efficient attacks, and also allows carrying out denial of service attacks and port scanning. Powered by bettercap and nmap

First of all the github repo with command:

git clone

Now install xerosploit by running the python script in cloned folder with command:


Now run xerosploit with command:


Now run the following command on xerosploit console to know the initial commands:


And now scan the network for connected devices with command:


Now enter the IP of the targeted system on the terminal.

Now enter help command on the console to view all the available modules

We will be using the 4 modules in this article:


First of all we will use driftnet module to capture all the images the victim is surfing on the web with following commands:



All the captured images will be saved in the /opt/xerosploit/xedriftnet directory.


Now we will use a replace module to replace the all the images on the victim’s web browser with command:


And then to execute the module enter command:


And then give the path to the image file you want to be replaces with.

Hit ctrl^c to stop the attack.

As you can see the images on the victim’s browser are replaced with our image.


Now run the following module to sniff all the traffic of the victim with command:


and then enter the following command to execute that module:


Now it will ask you if you want to use SSLTRIP to strip the HTTPS URl’s to HTTP so that we can the catch the login credentials in clear text. So enter y.

Now it will open a separate terminal in which we can see all the credentials in clear text. As you can see it has successfully captured the login credentials.


Now we will dos (denial of service) the victim’s system with module dos which will cause the target unresponsive, so run commands:



Hit ctrl^c to stop the attack

Related Posts Plugin for WordPress, Blogger...