top of page
Search
Div0 Blog Editor
Jan 5, 20152 min read
12th Day of Christmas: Browser Exploitation Framework (BeEF)
On the 12th Day of Christmas, Div0 gave to me ... Browser Exploitation Framework (BeEF), theHarvester, nmap Scripting Engine (NSE),...
51 views0 comments
Div0 Blog Editor
Jan 4, 20151 min read
11th Day of Christmas: theHarvester
On the 11th Day of Christmas, Div0 gave to me ... theHarvester, nmap Scripting Engine (NSE), msfvenom, searchsploit, urlcrazy, recon-ng,...
18 views0 comments
Div0 Blog Editor
Jan 3, 20151 min read
10th Day of Christmas: nmap Scripting Engine (NSE)
On the 10th Day of Christmas, Div0 gave to me ... nmap Scripting Engine (NSE), msfvenom, searchsploit, urlcrazy, recon-ng, Zone Transfer...
29 views0 comments
Div0 Blog Editor
Jan 2, 20152 min read
9th Day of Christmas: msfvenom
On the 9th Day of Christmas, Div0 gave to me ... msfvenom, searchsploit, urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest...
25 views0 comments
Div0 Blog Editor
Jan 1, 20151 min read
8th Day of Christmas: searchsploit
On the 8th Day of Christmas, Div0 gave to me ... searchsploit, urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest Databases,...
10 views0 comments
Div0 Blog Editor
Dec 30, 20141 min read
6th Day of Christmas: recon-ng
On the 6th Day of Christmas, Div0 gave to me ... recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash Identification,...
27 views0 comments
Div0 Blog Editor
Dec 26, 20141 min read
2nd Day of Christmas: Password Mutation Using JTR
On the 2nd Day of Christmas, Div0 gave to me ... Password Mutation Using JTR, and Custom Word List Generator (CeWL). Previously, using...
123 views0 comments
Div0 Blog Editor
Dec 17, 20143 min read
Port Scanning & Banner Grabbing Using Python
My Network Setup My Machine: Ubuntu 14.04 LTS with Python 2.7.6, IP address: 192.168.209.128 Another Machine: “Damn Vulnerable Linux”...
1,699 views0 comments
Div0 Blog Editor
Oct 28, 20131 min read
Lost In Translation
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...
10 views0 comments
Div0 Blog Editor
Aug 12, 20132 min read
PenTesting through Proxy Chaining
Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...
576 views0 comments
Div0 Blog Editor
Feb 9, 20132 min read
Hacking Made Too Easy
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...
18 views0 comments
Div0 Blog Editor
Jan 16, 20131 min read
Safe PenTesting with Metasploit
For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...
39 views0 comments
Div0 Blog Editor
Sep 13, 20122 min read
Powershell Injection Using SET
At this year's BSides Cleveland and BSides Las Vegas, Dave Kennedy (ReL1K) presented "Secret Pentesting Techniques Shhh...". The purpose...
95 views0 comments
Div0 Blog Editor
Aug 9, 20122 min read
Armitage — Metasploit Made Easy
Introduction I am sure anyone who does penetration testing or is active in the security field knows what Metasploit is, and what it does....
193 views0 comments
Div0 Blog Editor
Nov 30, 20117 min read
Netcat – The Swiss Army Knife of Networking
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the...
1,554 views0 comments
BLOG: Blog2
bottom of page