How To Hack: Exploit and Gain Remote Access to Windows XP (Metasploit)

hack-windows-xp-with-metasploit

Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean the same thing. When first looking at the Metasploit Framework, it can be a bit overwhelming with the … Continue reading

WiFi Pineapple Mark V Unboxing – Hak5 Portable Hacking Tool

WIFI-UNBOX

The WiFi Pineapple Mark V is the latest generation wireless network auditing tool from Hak5. With its custom, purpose built hardware and software, the WiFi Pineapple enable users to quickly and easily deploy advanced attacks using our intuitive web interface. … Continue reading

How To Hack: Embed a Backdoor Connection in an Innocent-Looking PDF

While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we’ll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in … Continue reading

How To Hack: Use MS Word to Embed a Listener on a Remote Computer

Word Bug

As web server and OS’s have become hardened and living behind significant perimeter defenses, hackers have migrated to the easiest route to the pot of gold. This is through the often unpatched, unhardened client-side system with little in the way … Continue reading

How To Hack: Online Dictionary Attack with Hydra

xhydra09132013-293x150

1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading

How To Hack: Using Netcat

For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it’s virtually unknown outside. It’s so … Continue reading

How to setup DarkComet RAT for Easy Access to a Target Computer

Trojan

Note: In this format, the RAT program will quite easily be detected by anti-virus software. In order to evade such detection you will have to crypto the DarkComet RAT. It must become undetectable in order to use stealthily. Or, the … Continue reading

Microsoft Office Exploit 2003, 2007, 2010, 2013 – Embed EXE in DOC or XLS

infected

So, have you gone to school and studied up on all of your classes? Do you ever send or receive Microsoft Office documents in your daily life? I be sometimes you get so many different things in your email, there … Continue reading

(How to) Kali Linux: Hack Encrypted Wifi Passwords with Reaver and Airmon-ng WPA – WPA2 – WPS

Hack Wifi Passwords and Encryption

Here we will go through how I tested Kali Linux with Reaver and Airmon-ng to hack into my WPA2 encrypted work network. In order to use Reaver, you need to get your wireless card’s interface name, the BSSID of the … Continue reading