
File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the ...

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is of ...

After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people re ...

The default tool for payload generation is MSFvenom, a Metasploit standalone payload generator as well as encoder. This tool ...

Hak5's products get a lot of attention. Popping up in popular shows like Mr. Robot, their hacking tools are bold proof of con ...

If you need to scan a large number of domains for a specific web app vulnerability, Dorkbot may be the tool for you. Dorkbot ...

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to ...

In 2013, Offensive Security released Kali Linux, a rebuild of BackTrack Linux derived from Debian. Since then, Kali has gone ...

During a penetration test, one of the most important aspects of engaging a target is information gathering. The more informat ...

In my previous article, we learned how to generate a vulnerable virtual machine using SecGen to safely and legally practice h ...