admin

How to hack Android Phone using Kali Linux

How to hack Android Phone using Kali Linux

In today’s hyper-connected world, our mobile phones are more than just communication tools—they’re personal vaults that store everything from banking details to intimate conversations. But ever wondered, how mobile phones get hacked ? In this article, we will be looking into how we hack any Android Phone. Why Android ? Android is the most popular […]

How to hack Android Phone using Kali Linux Read More »

Steganography: Hiding secrets like Mr. Robot

Steganography: Hiding secrets like Mr. Robot

In this article, we will look into Steganography, which is the “art of hiding” information in plain sight. But, lets understand steganography first. What is Stegnography ? Steganography is a fascinating technique that involves hiding secret messages within other forms of media, such as images, audio files, or videos. Imagine writing a note in invisible

Steganography: Hiding secrets like Mr. Robot Read More »

Hacking Windows with Fake Captchas

Hacking Windows with Fake Captchas

In recent weeks, cybersecurity researchers at various companies spotted a new type of phishing attack involving those pesky re-captchas. Originally, reCAPTCHA is a security tool designed to differentiate between human users and automated bots on websites. However, hackers in the wild were using them to social engineer the victim and run malicious powershell scripts on the target systems. Let’s see

Hacking Windows with Fake Captchas Read More »

Vulnlab - Sync

Vulnlab – Sync

In this walk through, we will be going through the Sync room from Vulnlab. This room is rated as Easy on the platform and it consist of abuse of rsync service to download site.db database which reveals hash of user triss that have to be made compatible for cracking for hashcat. Cracking it reveals the

Vulnlab – Sync Read More »

Vulnab - Media

Vulnab – Media

In this walk through, we will be going through the Media room from Vulnlab. This room is rated as Medium on the platform and it consist of abusing of file upload functionality by creating documents to capture user NTLM hash, cracking it will give us initial access to the target. For Privilege Escalation, abuse of

Vulnab – Media Read More »

Vulnlab - Feedback

Vulnlab – Feedback

In this walk through, we will be going through the Feedback room from Vulnlab. This room is rated as Easy on the platform and it consist of exploitation of Log4shell vulnerability to get initial access on the target. For privilege escalation, used the admin password found in tomcat-users.xml file to get root. So, let’s get

Vulnlab – Feedback Read More »

Vulnlab - Data

Vulnlab – Data

In this walk through, we will be going through the Data room from Vulnlab. This room is rated as Easy on the platform and it consist of dumping of grafana DB using CVE-2021-43798 which reveals the hash password of user boris that have to crack using hashcat to get initial access on the target. For

Vulnlab – Data Read More »

Scroll to Top