Installing VMware and Vulnhub Kioptrix

So our Journey of Hack starts here. We are going to install VMware to run our Vulnerable Machine Kioptrix. Download VMware or Virtual Box Download Kioptrix a ready made Vulnerable Machine provided by TCM-SEC from Vulnhub Now Import downloaded VM Image on your virtual engine. - Open - Default Username: john - Default password: TwoCows2

December 18, 2022 · 1 min

Reconnaissance Part 2

OSINT Open Source Intelligence Email OSINT Email Discovery hunter.io phonebook.cz voilanorbert.com Clearbit - Chromium Plugin tools.verifyemailaddress.io (Verify Email Address) Use Forgot Password to tie email accounts. In this way a recovery email can be tied to another email address. Password OSINT Credentials Stuffing Automate Prevoiusly found username & Passwords Dehashed Hunting Breached Credentials with DeHashed Find Subdomains *.domain.com Sublist3r python3 sublist3r.py -d domain.com Owasp Tomnomnom Build and Frameworks Know how website is built builtwith....

December 17, 2022 · 1 min

Reconnaissance Part 1

Passive Reconnaissance Physical Location Satellite Images Drone Recon Building Layouts, etc. Social Job Information Employees Name, Job, Title, Manager Name Picture Badge Picture Desk Photos Computer Photos Web/Host Target Validation Whois nslookup dnsrecon Finding Subdomains Google Fu dig nmap sublist3r bluto crt.sh Fingerprinting Finding what is used on the app. nmap wappalyzer WhatWeb BuiltWith Wetcat Data Breaches haveibeenpwned Breach-Parse weleakinfo

December 17, 2022 · 1 min

The Ethical Hacker Methodology

Reconissance Info Gathering. Active Scanning and Enumeration Using Different Tools Finding Open Ports and Vulneribilities Passive Google Search Social Media Scan Facebook Twitter Linkedin, etc. Scanning & Enumeration Scanning Through PC Nmap Nessus Nikto, etc.7 Gaining Access Exploitation Maintaining Access Also Scanning And Enumeration Covering Tracks Deleting Logs and Cleaning Up The Method is also called 5 Stages of Ethical Hacking.

December 17, 2022 · 1 min