Hackholics

addicted to hacking

Page 2 of 3

Droopy v0.2 CTF

This VM, provided by VulnHub There’s 2 hints I would offer you: 1.) Grab a copy of the rockyou wordlist. 2.) It’s fun to read other people’s email.   Ok , let me start first by finding the IP of… Continue Reading →

WordPress plugin leaves up to 70k sites vulnerable to stored xss

Recently we discover a stored Cross Site Scripting in a WordPress plugin which is installed in our website. It also effects more that 70.000 WordPress users. We immediately get in work and find a fix for that. After fixing the… Continue Reading →

Pcap analysis

You are a hacker in public Cafe sniffing the network. In the same Cafe is a developer using the same WLAN as you. Hes not aware about dangerous might be exist in those places and he logging in to his site…. Continue Reading →

Launch a Client-Side Attack Using Excel Files

In this article, we’ll discuss client-side attacks with Excel files. Client-side attacks are always a fun topic for attackers today. As network administrators and software developers fortify the perimeter, pentesters need to find a way to make the victims open… Continue Reading →

Post Exploitation Techniques

In this tutorials you’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: We already have a meterpreter session     Start the Handler We’re assuming we already have a backdoor installed on the remote system…. Continue Reading →

Mapping a SMB share in Windows

What is NetBIOS? NetBIOS stands for Network Basic Input Output System. In basic terms, it’s responsible for managing the internal share of files and printers – but it’s not limited to these functions. For the purpose of this guide, let’s… Continue Reading →

« Older posts Newer posts »

© 2017 Hackholics — Powered by WordPress

Theme by Anders NorenUp ↑