Using proxychains4 with TOR browser (as the proxy), I want to perform a Nmap scan of a host. Since Tor is a TCP only proxy, would that mean that a scan that uses other protocols than TCP such as ICMP would not be "encrypted" with TOR? Would anyone know what would happen in thi ...more
se7en's Popular Posts
I used the php/meterpreter/reverse tcp and setup my lhost and my lport. Next, I copied the payload and placed it all in <?php payload here ?>. I setup a server with a page containing the vulnerable php payload and setup a exploit/multi/handler with the same lhost/lport and wi ...more
At this date I used: Mutillidae DVWA DVL Metasploitable2 Hackthissite What do you think about these applications? Which one would you add to the list?
I read this whitepaper http://pastebin.com/Dg5wWSAm from anonsec. It explains each steps of how they managed to control a drone remotely. It is really interesting and I find real cases way more educational (they explain better than the theory/dedicated vulnerable web applicati ...more
Hi, I am new to this community and I always wondered how people modded games such as call of duty 5 with usb (gamesave). So, few years back when I was playing on xbox 360, I really got interested in the subjet. Tried to find articles, but there was only tools that someone else ...more