Browsing category

Tutorials

Footprinting a target with datasploit

DATASPLOIT:- Datasploit is a tool used in footprinting a target or defending target. It allows you to collect relevant information about the domain, email, phone number, person, etc, as per ethical hacking courses. It collects the information about a target which can expand your attack, defense. This tool is used in kali linux penetration testing. […]

Extract info from Windows machine using ENUM4LINUX

ENUM4LINUX:- Enum4linux is used to extract information from Windows and samba hosts, ethical hacking specialists clarifie. The tool is written in Perl and wrapped in samba tools smbclient, rpclient, net and nslookup. This tool is used by many ethical hackers. FEATURES OF ENUM4LINUX:- Share enumeration Password policy retrieval Identifying the remote operating system. Detecting if […]

Inspects the deep web URL with onioff

What is ONIOFF:- Onioff is a tool written in python. It basically inspects the deep web URLs or the onions URLs. Onioff checks the status of the deep web URLs that it is active or not, as per ethical hacking courses. It showcase the actual status of the onion URLs. According to ethical hacking researcher of […]

Finds vulnerabilities in wordpress websites using WPSCAN

WPSCAN:- WPScan finds vulnerabilities in wordpress websites. This tool is known for scanning vulnerabilities within the core version, plugins and themes of wordpress website. WPScan even finds weak passwords, users and security configuration issues that are present. As per research done by one of to ethical hacking researcher of International Institute of Cyber Security, most of […]

Find employees working in a company

THEHARVESTER:- Harvester an OSINT tool, written by Christian Martorella. Harvester allows to gather information like email addresses, sub domains all from public resources, explain ethical hacking specialists. This tool mostly lookups on sites like- Google, Bing, LinkedIn and Shodan. According to ethical hacker of International Institute of Cyber Security, theharvester is used in advance information gathering […]

DNS enumeration

DNSENUM. Dnsenum which is used to gather information about the target. Quite similar to (DIG) Domain information groper. Each of the DNS records can give bit of information about the target. The more information attacker get from the upfront, the better attacker is prepared for the attack. DNS security should not be left unattended and […]