Man In The Middle (MITM)
In the man in the middle attack the attacker will put himself in the middle of the communication between the victim and the other device,
SQL Injection
All websites that make interaction with a DB, use SQL. But if the SQL script is not correctly written could be passible of some manipulation
CEH
Scanning and Enumeration given the following IP 192.168.1.113, what are the IP running under this subnet? netdiscover -r 192.168.1.0/24 or nmap 192.168.1.0/24 NMAP (https://www.geeksforgeeks.org/nmap-cheat-sheet/?ref=ml_lbp) To
Steganography
Steganography is the practice of hiding a message inside of (or even on top of) something that is not secret. The steganography has the double
Functional Attack to API providers
We could have few security attacks to an API: SQL Injections In this attack, the attacker tries to identify input parameters used in a SQL
Getting access to Android using ADB
ADB stands for Android Debug Bridge and it is a CLI used to communicate with an Android device which is physically connected (through a USB
Metasploit
Metasploit Framework is a cybersecurity project that provides info about vulnerability, simplifies penetration tests and helps in the development of intrusions systems check. It is
WP Scan
WPScan is a tool designed to test the security of a WordPress web site. To use it, simply type: Adding -e u parameter it will
NMAP, discover devices on the (same) network
There are different tools that can discover devices connected on the same network. The simpler one is netdiscover. Let’s check our subnet before. Type, so
MAC Address
MAC stands for Media Access Control. It is a Permanent, Physical, Unique (in the world) “code” assigned to a physical object that allows to connect
Website hack – discovering vulnerabilities
File upload The easy type of vulnerability, because a php o python or other type of file could be uploaded and, once called can represent
Preliminary steps to get information about target website
Do you want to hack a wesite? Follow these steps first, to gather few information about it. Try to get the following: IP address So
How to get wireless with WPS enabled
we will use a program named wash root@kali:~# wash -i wlan0 where wlan0 is the wireless network interface root@kali:~# aireplay-ng –fakeauth 30 -a E4:8F:34:37:BA:0C -h
Airodump-ng
With a wireless adapter in monitor mode you are able to sniff packet in the air: at least the one in our range even if
How to set wireless adapter in monitor mode
Get the wireless id iwconfig put it down ifconfig wlan0 down to kill any process that could interfere with using our interface (not mandatory) airmon-ng
linux network command line
ifconfig, show all network interfaces Ex. root@kali:~# ifconfigeth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500inet 192.168.160.128 netmask 255.255.255.0 broadcast 192.168.160.255inet6 fe80::20c:29ff:feae:2778 prefixlen 64 scopeid 0x20<link>ether 00:0c:29:ae:27:78 txqueuelen 1000 (Ethernet)RX