Generally, the hacker uses a hidden network to escape from a firewall and IDS. In this post, you will learn how to steal information from
Hello friends! Today we are going to take another CTF challenge known as “SP eric”. The credit for making this VM machine goes to “Daniel
In this article, we will learn how to use Ares tool. This tool performs the Command and Control over the Web Interface. This tool can
This article explores using WebDAV for covert Command and Control (C2) channels, enabling attackers to maintain persistent access. Table of Content Introduction Installation Exploiting Target
In this article, we will learn how to use WebSocket C2 tool. It is also known as WSC2. Table of Content Introduction Installation Exploiting Target
Today we are going to solve another CTF challenge “Vault”. It is a retired vulnerable lab presented by Hack the Box for helping pentesters to
In this article, we will learn how to use DropboxC2 tool. It is also known as DBC2. Table of Content Introduction Installation Getting Dropbox API
Today, we will play a war-game called Natas. It has a collection of 34 levels. OverTheWire Organization hosts this war-game. Absolute Beginners are the target
In this article, we will learn about Nessus which is a network vulnerability scanner. There are various network vulnerability scanners but Nessus is one of