Today you will learn How to exploit any Operation System running inside a virtual machine. Requirements Attacker: Kali Linux Target: VM image windows server 2012
Hello friends! Today you will learn how to set up a VOIP server in a virtual machine using tribox 2.8.0.4 ISO image for making phone
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error
In our previous tutorial, we had discussed on SSH pivoting and today we are going to discuss Telnet pivoting. From Offensive Security Pivoting is a technique to get
In the previous article we had described VNC penetration testing and VNC tunneling through SSH but today we are going to demonstrate VNC pivoting. From
In the previous article, we had performed VNC penetration testing and today you will VNC tunneling to connect the remote machine with VNC server when
In our previous tutorial we had discussed on SSH pivoting & RDP pivoting and today you will learn FTP pivoting attack. From Offensive Security Pivoting is a technique
Hello friends! Today we are going to take another CTF challenge known as Primer. The credit for making this vm machine goes to “couchsofa” and
We can also find out version and valid user of SMTP server using telnet. Execute the following command and find out its version and valid