This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, February 8, 2014

How to install and use Veil-Catapult in backtrack?

Today we are gonna talk about Veil-Catapult.Veil-Catapult is payload delivery for when metasploit’s psexec getting caught by AV.It utilizes Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution.It officially supported on kali linux only.I`m going to show you how to install Veil-Catapult in backtrack? First if you have not already installed veil-evasion framework then...

Monday, January 6, 2014

Deliver powershell payload using macro.

In past we saw method of direct shell code execution in Ms word or Excel using macro;but if document is closed then we will lose our shell so we have to migrate to other process and sometimes migration is pick up by AV. So in this tutorial we are going to use powershell payload.Advantages of this method:-(1)Persistence(2)Migration is not needed(3)AV bypass(1)First we will generate powershell payload; for this purpose i used SET.You can also used...

Wednesday, December 18, 2013

Creating custom username list & wordlist for bruteforciing.

During brute-forcing every time you need custom  password list & username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in username enumeration.Creating custom username list:-(1)Jigsaw:-During information gathering stage , you may use jigsaw script. It is great script...

Friday, November 29, 2013

XPATH Injection Tutorial

XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner.We are gonna learn using simple example. Download code from here & put it in your local server directory.(Code is created by Amol Naik )Sample...

Wednesday, November 20, 2013

Broken Authentication & Session Management in Mutillidae

Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection.Authentication BypassPrivilege EscalationUsername EnumerationWe have already covered Username enumeration in last article & we got valid username list which exist in database. Today we are going to use authentication bypass method.Using cookieUsing brute-forceUsing SQL injection(1)Authentication Bypass...

Saturday, November 16, 2013

How to solve compile error in veil?

As you know, veil is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload.pure windows/meterpreter/reverse_tcp stager, no shellcodepure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcodeCompiler Error in c payloads:- Available c payloads:    VirtualAlloc                        ...

Sunday, November 10, 2013

Username Enumeration in Mutillidae using Burpe Intruder.

Mutillidae  is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Username Enumeration :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account.In Mutilliade login page , when you provide valid username & invalid password , web-application...