Advertisements

BOB Walkthrough: Vulnhub CTF Challenge

This article is a walkthrough on how I solved Bob CTF challenge. You can download Bob CTF via this link: https://www.vulnhub.com/entry/bob-101,226/. It is a Beginner to intermediate challenge and at the end we have to gain the root access and get the flag. So let’s do this: To find the vulnerable machines through your attacking machine: http://www.anonhack.in/2018/06/part-2-finding-the-ip-address-of-your-victim-in-your-vmware-hacking-lab-network/

Advertisements
Advertisements

SMTP – Extracting Emails

In my article about What is SMTP?, We took a look on what exactly SMTP works for! In SMTP – Extracting Emails, I will be providing a tutorial on Extracting Emails from the SMTP server. There are several programs and scripts that are available for Gathering emails from a website. So It would be pretty

Advertisements
Advertisements

Sniffing And Spoofing

In this article I want to give you a sneak peak about what actually sniffing and spoofing means and then we will move on to how to do it in order to gain access to a remote computer. So here the first term which is sniffing. Sniffing: Sniffing as a hacking terminology is the way

Advertisements
Advertisements

DNS Reconnaissance

DNS Reconnaissance is one of the basic steps and most important part of hacking. DNS stands for Domain Name Server, it keeps tracks of the record of IP addresses, services and resources connected to the Internet. Now as we know that computer works on binary numbers…So they would not actually understand the meaning of “www.google.com”,

%d bloggers like this: