Penetration Testing

Multi Ways to Setup Cloud Pentest Lab using OwnCloud

Docker Installation & Configuration

Apache Tomcat Penetration Testing Lab Setup

Lxd Privilege Escalation

Linux For Pentester: socat Privilege Escalation

Linux for Pentester: scp Privilege Escalation

Linux For Pentester: tmux Privilege Escalation

Linux for Pentester: ed Privilege Escalation

Linux for Pentester: sed Privilege Escalation

Linux for Pentester: pip Privilege Escalation

Linux for Pentester: git Privilege Escalation

Linux for Pentester: cp Privilege Escalation

Linux for Pentester: Taskset Privilege Escalation

Linux for Pentester: Time Privilege Escalation

Linux for Pentester: xxd Privilege Escalation

Linux for Pentester : ZIP Privilege Escalation

Linux for Pentester: APT Privilege Escalation

Linux for Pentester: CAT Privilege Escalation

Linux for Pentester: Find Privilege Escalation

Linux for Pentester: Wget Privilege Escalation

Dradis: Reporting and Collaboration Tool

Comprehensive Guide to Steghide Tool

Comprehensive Guide on fcrackzip Tool

Comprehensive Guide on Snort (Part 1)

Comprehensive Guide on Ncrack – A Brute Forcing Tool

Comprehensive Guide on Dymerge

Comprehensive Guide on Pydictor – A wordlist Generating Tool

Comprehensive Guide on Cupp– A wordlist Generating Tool

Comprehensive Guide on Dirbuster Tool

Comprehensive Guide on Cewl Tool

Comprehensive Guide on Gobuster Tool

Comprehensive Guide on Dirb Tool

Comprehensive Guide on Medusa – A Brute Forcing Tool

Comprehensive Guide on Hydra – A Brute Forcing Tool

Comprehensive Guide on Netcat

Compressive Guide on File Transfer (Post Exploitation)

Comprehensive Guide on SSH Tunnelling

Comprehensive Guide on SearchSploit

Comprehensive Guide on Crunch Tool

Comprehensive Guide on Sniffing

ExifTool : A Meta-Data Extractor

EvilOSX-RAT for MacOS/OSX

Retina: A Network Scanning Tool

Shellphish: A Phishing Tool

Penetration Testing on Splunk

Evilginx2- Advanced Phishing Attack Framework

Beginner’s Guide to Nexpose

Beginner’s Guide to Nessus

Threat Detection for your Network using Kfsensor Honeypot

Commix-Command Injection Exploiter (Beginner’s Guide)

Post Exploitation on Saved Password with LaZagne

Penetration Testing on Memcached Server

Pentest Lab Setup on Memcached

Jenkins Pentest Lab Setup

Exploiting Jenkins Groovy Script Console in Multiple Ways

Exploiting Windows using Contact File HTML Injection/RCE

Exploiting Windows PC using Malicious Contact VCF file

Get Reverse-shell via Windows one-liner

Configure Sqlmap for WEB-GUI in Kali Linux

SMB Penetration Testing (Port 445)

A Little Guide to SMB Enumeration

Defend against Brute Force Attack with Fail2ban

Multiple Ways to Exploit Tomcat Manager

Socks Proxy Penetration Lab Setup using Microsocks

Web Proxy Penetration Lab Setup Testing using Squid

Xerosploit- A Man-In-The-Middle Attack Framework

Linux Privilege Escalation via Automated Script

Meterpreter File System Commands Cheatsheet

Multiple Ways to Secure SSH Port

Multiple Ways to Bypass UAC using Metasploit

Windows Kernel Exploit Privilege Escalation

Window Privilege Escalation via Automated Script

Multiple ways to Connect Remote PC using SMB Port

Windows Privilege Escalation (AlwaysInstallElevated)

Windows Privilege Escalation (Unquoted Path Service)

3 Ways Extract Password Hashes from NTDS.dit

Beginner Guide to impacket Tool kit

Multiple Ways to Get root through Writable File

Penetration Testing on X11 Server

Beginners Guide for John the Ripper (Part 2)

Beginners Guide for John the Ripper (Part 1)

Working of Traceroute using Wireshark

Exploiting Wildcard for Privilege Escalation

Linux Privilege Escalation by Exploiting Cron jobs

Linux Privilege Escalation using LD_Preload

Linux Privilege Escalation Using PATH Variable

Linux Privilege Escalation using Misconfigured NFS

Linux Privilege Escalation using Sudo Rights

Linux Privilege Escalation using SUID Binaries

Editing /etc/passwd File for Privilege Escalation

Capture NTLM Hashes using PDF (Bad-Pdf)

SNMP Lab Setup and Penetration Testing

6 Ways to Hack SNMP Password

4 ways to Hack MS SQL Login Password

Spawn TTY Shell using Msfvenom (One Liner Payload)

6 Ways to Hack VNC Login Password

6 Ways to Hack PostgresSQL Login

5 Ways to Hack MySQL Login Password

Bypass SSH Restriction by Port Relay

Port Scanning using Metasploit with IPTables

Understanding Guide to Mimikatz

Manual Post Exploitation on Windows PC (Network Command)

Sessions Command in Metasploit

Bind Payload using SFX archive with Trojanizer

Beginner Guide to IPtables

Post Exploitation Using WMIC (System Command)

Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports)

Manual Post Exploitation on Windows PC (System Command)

Understanding Nmap Packet Trace

Nmap Scan with Timing Parameters

Generating Scan Reports Using Nmap (Output Scan)

Nmap Scans using Hex Value of Flags

Forensic Investigation of Nmap Scan using Wireshark

Understanding Guide for Nmap Timing Scan (Firewall Bypass)

Understanding Guide for Nmap Ping Scan (Firewall Bypass)

Comprehensive Guide on Nmap Port Status

How to Detect NMAP Scan Using Snort

Understanding Guide to Nmap Firewall Scan (Part 2)

Understanding Guide to Nmap Firewall Scan (Part 1)

Understanding Nmap Scan with Wireshark 

Password Cracking using Nmap

Finding Vulnerability in Server/Client using Nmap

Network Scanning using NMAP (Beginner Guide)

Post Exploitation in Windows using dir Command

How to Configure Suricata IDS in Ubuntu

Detect SQL Injection Attack using Snort IDS

Check Meltdown Vulnerability in CPU

Network Packet Forensic using Wireshark

ICMP Penetration Testing

TCP & UDP Packet Crafting with CatKARAT

DOS Attack with Packet Crafting using Colasoft

Packet Crafting with Colasoft Packet Builder

DHCP Penetration Testing

DOS Attack Penetration Testing (Part 2)

DOS Attack Penetration Testing (Part 1)

Understating Guide of Windows Security Policies and Event Viewer

Post Exploitation for Remote Windows Password

Security Onion Configuration in VMware

Command Injection Exploitation using Web Delivery (Linux, Windows)

IDS, IPS Penetration Testing Lab Setup with Snort (Manaually)

Android Mobile Exploitation with Evil-Droid

Msfvenom Tutorials for Beginners

Exploiting Remote Machine with Pastejacking

Exploiting Windows Machine with DDE Exploit

Wifi Post Exploitation on Remote PC

Beginner Guide to Classic Cryptography

WiFi Exploitation with WifiPhisher

4 Ways to Capture NTLM Hashes in Network

MSSQL Peneration Testing using Nmap

MS-SQL Penetration Testing lab Setup

Post Exploitation in VMware Files with Meterpreter

Lab Setup for VOIP Penetration Testing

Understanding Guide to ICMP Protocol with Wireshark

Telnet Pivoting through Meterpreter

SSH Pivoting using Meterpreter

VNC Pivoting through Meterpreter

VNC tunneling over SSH

FTP Pivoting through RDP

RDP Pivoting with Metasploit

FTP Penetration Testing on Windows (Port 21)

FTP Penetration Testing in Ubuntu (Port 21)

SSH Penetration Testing (Port 22)

Penetration Testing on Telnet (Port 23)

SMTP Pentest Lab Setup in Ubuntu (Port 25)

NetBIOS and SMB Penetration Testing on Windows (Port 135-139,445)

MSSQL Penetration Testing with Metasploit (Port 1433)

Penetration Testing on MYSQL (Port 3306)

Penetration Testing on Remote Desktop (Port 3389)

VNC Penetration Testing (Port 5901)

MySQL Penetration Testing with Nmap

4 ways to SMTP Enumeration

How to Setup Mail Server for Penetration Testing using hMail

How to secure Ubuntu Server using Google Authenticator

4 Ways to DNS Enumeration

Understanding Log Analysis of Web Server

Configure Web Server for Penetration Testing (Beginner Guide)

Bypass UAC in Windows 10 using bypass_comhijack Exploit

Setup DNS Penetration Testing Lab on Windows Server 2012

6 Ways to Hack SSH Login Password

Vulnerability Analysis in Web Application using Burp Scanner

3 ways to scan Eternal Blue Vulnerability in Remote PC

5 Ways to Crawl a Website

Beginner Guide to Meterpreter (Part 1)

Bypass UAC Protection of Remote Windows 10 PC (Via FodHelper Registry Key)

Bypass Admin access through guest Account in windows 10

Hack Legal Notice Caption of Remote PC

Exploit Windows PC using EternalBlue SMB Remote Windows Kernel Pool Corruption

Create SSL Certified Meterpreter Payload using MPM

Exploit Remote PC using Microsoft Office Word Malicious Hta Execution

How to use Public IP on Kali Linux

Exploit Remote Windows PC with Eternalblue & Doublepulsar Exploit in Metasploit

Embedded Backdoor with Image using FakeImageExploiter

2 ways to use Msfvenom Payload with Netcat

Server Side Injection Exploitation in bWapp

Exploit Windows 10 PC with Microsoft RTF File (CVE-2017-0199)

How to Detect Sniffer in Your Network using shARP

Exploit Windows 7 PC using Torrent File

Dump Cleartext Password in Linux PC using MimiPenguin

Mobile Forensics Investigation using Cellebrite UFED

Stealing Windows Credentials of Remote PC with MS Office Document

Bypass Windows Login Password using Android Phone with DriveDroid

Capture VNC Session of Remote PC using SetToolkit

How to Delete Firewall Log in Remote PC using Metasploit

How to Enable and Monitor Firewall Log in Windows PC

Run OS Command against Multiple Session in Metasploit

Hiding Shell with Prepend Migrate using Msfvenom

Shell to Meterpreter using Session Command

Capture VNC Session of Remote PC using Msfvenom

How to Upgrade Command Shell to Meterpreter

How to set and Bypass Outbound Rule in Windows Firewall using Metasploit

How to Secure Your Port using Port Forwarding

Hack Remote PC with Apache OpenOffice Text Document Malicious Macro Execution

Shell Uploading in Web Server through PhpMyAdmin

Expoit Windows PC using Firefox nsSMIL Time Container: :Notify Time Change() RCE

Web Penetration Testing with Tamper Data (Firefox Add-on)

Brute Forcing Multiple Databases using HexorBase

Hack Remote PC using PSEXEC Injection in SET Toolkit

Hack Admin Access of Remote windows 10 PC using Eventvwr Registry Key Exploit

Penetration Testing in Metasploitable 3 with SMB and Tomcat

Exploitation of Metasploitable 3 using Glassfish Service

Manual Penetration Testing in Metasploitable 3

Hack Metasploitable 3 using Mysql Service Exploitation

Perform DOS Attack on Metasploitable 3

Hack Metasploitable 3 using SMB Service Exploitation

Metasploitable 3 Exploitation using Brute forcing SSH

Hack Metasploitable 3 using Elasticsearch Exploit

FTP Service Exploitation in Metasploitable 3

Get Meterpreter Session of Locked PC Remotely (Remote Desktop Enabled)

Hack Locked PC in Network using Metasploit

Capture Images in Mobile using Driftnet through Wifi Pumpkin

Hack Android Phone using HTA Attack with QR Code

Exploit Windows 10 pc using WinaXe 7.7 FTP Client Remote Buffer Overflow

Hack ALL Linux Kernel using Dirtycow Exploit (Privilege Escalation)

Hack Remote Windows 10 PC using HTA Web Server

Hack any Android Phone using Spade APK Backdoor

Hijacking Gmail Message on Air using Burpsuite

Hack Android Phone using Backdoor Apk

Build an Android Penetration Testing lab

Hack Admin Access of Remote Windows 10 PC using TpmInit UACBypass

Penetration Testing Skills Practice with Metasploitable (Beginner Guide)

Setup VPN Penetration Testing Lab in Server 2008

Fun with Metasploit Payloads

Hack Remote Windows PC using Office OLE Multiple DLL Hijack Vulnerabilities

How to Detect Meterpreter in Your PC

Control Remote PC using PSTools

5 Ways to Hack SMB Login Password

Penetration Testing in Active Directory using Metasploit (Part 2)

Hack Remote Windows PC using DLL Files (SMB Delivery Exploit)

Get Admin Access of Remote Windows PC using MS16-016 mrxdav.sys WebDav Escalation

Hack Remote Windows 10 PC using TheFatRat

Firewall Pentest Lab Setup with pfsense in VMware

Proxy Server Lab Setup using Wingate (Part 2)

Wifi Penetration Testing in Remote PC (Part 1)

Proxy Server Lab Setup using Wingate (Part 1)

How to Setup Cloud Computing Penetration Testing Lab

Penetration Testing in Windows Server Active Directory using Metasploit (Part 1)

Capture VNC Session of Remote Windows PC by Payloads Injection

Gather Credential of WebNMS Framework Server using Metasploit

Hack Remote Windows PC using Macros with Msfvenom

Hack Web Server using Tiki Wiki Unauthenticated File Upload Vulnerability

Hack Remote PC using Malicious MS Office Documents

Hack Web Server using PHP Command Injection (Smplshllctrlr)

Exploit Remote Server using Tiki-Wiki CMS Calendar Command Execution

Hack Remote Windows PC using Regsvr32.exe (.sct) Application Whitelisting Bypass Server

Hack Wifi using Evil Twin Method with Linset in kali Linux

OpenSSH User Enumeration Time-Based Attack with Osueta

Hack Password using Rogue Wi-Fi Access Point Attack (WiFi-Pumpkin)

Wifi Penetration Testing using Gerix Wifi Cracker

Hack Remote PC using Microsoft Office Files (Macro Payloads)

Hack Locked Workstation Password in Clear Text

Penetration Testing in Windows/Active Directory with Crackmapexec

Hack Untangle NG Firewall using command Injection Vulnerability

How to Detect Sniffer on Your Network

3 Ways to Crack Wifi using Pyrit, oclHashcat and Cowpatty

Crack Wifi Password using Aircrack-Ng (Beginner’s Guide)

Hack Any Android Phone with DroidJack (Beginner’s Guide)

5 Ways to Surf Internet Anonymously in Android Phone

Exploit Linux PC using IPFire Bash Environment Variable Injection (Shellshock)

HTTP RAT Tutorial for Beginners

5 ways to Create Permanent Backdoor in Remote PC

Exploitation in Linux Firewall using IPFire proxy.cgi RCE

Detect Hacker in Network using Android Phone

Cracking WiFi Password using Fern WIFi Cracker

Hack Wi-Fi using Social Engineering with Fluxion (Evil Twin Attack)

Hack Wireless Network using Airgeddon

How to Create Botnet for D-Dos Attack with UFONet

Automating Exploitation of Remote PC using Metasploithelper

Hack Remote PC using BrowserBackdoor – JavaScript WebSocket Backdoor

Hack your Network through Android Phone using cSploit

Bypass All Antivirus and Hack Remote Windows 10 PC using Hercules

Hack Remote PC with Reverse PowerShell using Brosec

Hack Gmail and Facebook Password in Network using Bettercap

Access Sticky keys Backdoor on Remote PC with Sticky Keys Hunter

Exploit Remote PC using Advantech WebAccess Dashboard Viewer upload Image Common Arbitrary File Upload

Hack Remote Windows PC using Dell SonicWALL Scrutinizer 11.01 methodDetail SQL Injection

Hack Remote Windows 10 PC using Cypher (Adding Shellcode to PE files)

How to identify Network Vulnerabilities using Nessus (Beginner Guide)

Hack Windows Server in Network using Atelier Web Remote Command

Information Gathering using Maltego (Beginner Guide)

Vulnerability Scanning in Network using Retina

Hack Web Server using ATutor 2.2.1 SQL Injection / Remote Code Execution

Hack Web Server using PHP Utility Belt Remote Code Execution

Weeman – HTTP Server for Phishing

Setup Firewall Pentest Lab using Clear OS

Hack Remote Windows PC using Office OLE multiple DLL side loading vulnerabilities

Hack Remote Linux PC using PHPFilemanager 0.9.8 Remote Code Execution

Pentest Lab Setup for Windows Server 2008 R2

Hack Remote Windows PC using PCMAN FTP Server Buffer Overflow – PUT Command

Hack Remote Windows PC using Easy File Sharing HTTP Server 7.2 SEH Overflow

Gather Browser and OS Information of Remote PC using Http Client Exploit

Hack Remote Windows 10 Password in Plain Text using Wdigest Credential Caching Exploit

Finding Vulnerability in EasyCafe Server using Metasploit

Hack anyone’s Whatsapp through QR code (Working)

Hack Wallpaper of Remote Android Phone using Metasploit

Hack Call Logs, SMS, Camera of Remote Android Phone using Metasploit

DOS Attack in Network using Colasoft Packet Builder (Beginner Guide)

Setup Browser Based Framework for Web Penetration Testing in Kali Linux (Mantra Toolkit)

Hack Remote Windows 10 PC using ARCANUS (Bypass All Antivirus)

Setup Web Pentest Lab using Broken Web Applications (Beginner Guide)

Exploit Windows 10 PC using msfven.sh Script

How to Setup VyOS (Virtual Router Pentest Lab)

4 Ways to Hack Telnet Passsword

Wifi Forensic Investigation using Wifihistoryview

Hack Remote Windows 10 PC using Discover Tool

Hack Remote Linux PC using PHP File

6 Ways to Hack FTP Password

2 Ways to Hack Remote Desktop Password using kali Linux

How to Configure Untangle Firewall for Network Security (Beginner Guide)

Exploit Remote Windows PC using PSploitGen

Hack Remote Windows 10 PC using psmsf

Hack Remote PC using Darkcomet RAT with Metasploit

Exploit Remote Windows PC using HTA Attack with Net Tools

Find the Vulnerable Router on Internet using RouterhunterBR

2 Ways to Hack Windows 10 Password Easy Way

3 ways to Capture HTTP Password in Network PC

Denial of Service Attack on Network PC using SET Toolkit

Hack Remote PC with Nettool MitM Pentesting Toolkit

Hack Gmail or Facebook Password of Remote PC using NetRipper Exploitation Tool

Exploitation of Windows PC using Venom: Shellcode Generator

Hack Remote PC with PHP File using PHPSploit Stealth Post-Exploitation Framework

Hack Remote Windows PC using VNC Keyboard Remote Code Execution

Hack Remote Windows or Linux PC using MPC

Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 using Potato

Hack Windows 7 Password from Guest Account using 2015-1701 Exploit (Easy Way)

How to Create unlimited Folder in Remote Victim PC using Metasploit

How to Access Unauthorized on Remote PC using Metasploit

Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit

Hack Remote PC using HTA Attack in SET Toolkit

Wifi Hacking with Evil Twin Attack using Linset

Hack Windows Password in Clear Text using Mimikatz and Windows Credentials Editor

Session Hijacking using Ettercap, Hamster and Ferret (A Beginner Guide)

Hack Remote PC using WinRAR SFX Remote Code Execution Vulnerability

Hack Remote Windows PC using The Backdoor factory with Metasploit

Hack Remote PC using Fake Updates Scam with Ettercap and Metasploit

How to Hack Windows Wallpaper of Remote PC

How to show all Possible Exploits in Victim PC using Windows-Exploit-Suggester

How to Hack Saved sessions in Putty using Metasploit

Windows 7 Sticky Key Hack Attack using Metasploit

Magic Unicorn – PowerShell Downgrade Attack and Exploitation tool

How to Gather WIFI Password in Remote Windows PC

Bypass Antivirus and Hack Remote Windows PC with shelter

Pen Testing for iPhone Part 1

Metasploit Tutorial for Beginners (Part 2)

Metasploit Tutorial for Beginners (Part 1)

16 Comments Penetration Testing

  1. tahir

    back track5 is no longer available can i install alternative it would be good be good for hacking kindly reply…..

    Reply
  2. nereus

    Can trouble you to build a directory, put all kinds of tutorials together, thank you, read your tutorial feeling quite a lot!

    Reply
  3. whiteSniper

    Sir,
    will you please make an online book on these article?

    These are very good blog but they are not organised well. I hope you can understand what I am saying.

    This will be a great initiative.

    Thank you
    whiteSniper

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *