In this article, we will learn how to use Ares tool. This tool performs the Command and Control over the Web Interface. This tool can
This article explores using WebDAV for covert Command and Control (C2) channels, enabling attackers to maintain persistent access. Table of Content Introduction Installation Exploiting Target
In this article, we will learn how to use WebSocket C2 tool. It is also known as WSC2. Table of Content Introduction Installation Exploiting Target
Today we are going to solve another CTF challenge “Vault”. It is a retired vulnerable lab presented by Hack the Box for helping pentesters to
In this article, we will learn how to use DropboxC2 tool. It is also known as DBC2. Table of Content Introduction Installation Getting Dropbox API
Today, we will play a war-game called Natas. It has a collection of 34 levels. OverTheWire Organization hosts this war-game. Absolute Beginners are the target
In this article, we will learn about Nessus which is a network vulnerability scanner. There are various network vulnerability scanners but Nessus is one of
Kage is a GUI for Metasploit RCP servers. It is a good tool for beginners to understand the working of Metasploit as it generates payload
Today we are going to solve another CTF challenge “Curling”. It is a retired vulnerable lab presented by Hack the Box for helping pentesters to