Skip to main content

Posts

Showing posts from 2013

PWNing A System via (MSF) Metasploit Framework

PWNing A System via (MSF) Metasploit Framework PWNing A System via (MSF) Metasploit Framework Lab Requirements : Both OS running under my Virtual Machine. 1, Back Track 5 R3 Machine 2, Windows XP Machine Vulnerability : This is the know Vulnerability In Windows XP and Server 2003, MS08-067 vulnerability that uses the netapi module in the Windows SMB Protocol that may be used for arbitrary code execution. The Link's for more Information regarding this Vulnerability is  - http://blogs.technet.com/b/srd/archive/2008/10/23/more-detail-about-ms08-067.aspx http://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=21702 http://www.rapid7.com/db/modules/exploit/windows/smb/ms08_067_netapi Effect Of MS08-067 NetAPI Vulnerability : This module exploits a parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service. This module is capable of bypassing NX on some operating systems and service packs. The correct target m...

Hacking via Cloning Site Using Kali Linux

Hacking via Cloning Site Using Kali Linux Hacking via Cloning Site Using Kali Linux  SET Attack Method : SET stands for Social Engineering Toolkist , primarily written by  David Kennedy . The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the  http://www.social-engineer.org  launch and has quickly became a standard tool in a penetration testers arsenal. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test. Actually this hacking method will works perfectly with DNS spoofing or Man in the Middle Attack method. Here in this tutorial I’m only writing how-to and step-by-step to perform the basic attack , but for the rest you can modified it with your own imagination. In this tutorial we will see how this attack methods can owned your com...

Hacking via BackTrack using SET Attack Method

Hacking via BackTrack using SET Attack Method Hacking via BackTrack using SET Attack  1. Click on Applications, BackTrack, Exploit Tools, Social Engineering Tools, Social Engineering Toolkit then select set.

MySQL server has gone away

MySQL server has gone away for query MySQL server has gone away for query  Solution for “WordPress database error MySQL server has gone away for query …” If you have a WordPress blog and it is hosted on a shared server then you may want to continue reading.. For the past six months or so, my blog has been doing  weird  things.. like timing out, taking ages to load pages, sometimes the login page wouldn’t appear for me, etc.. Just random events occurring now and then.. or so I thought. Also my CPU utilisation was going through the roof, resulting in warnings from my  web host  to reduce it, or else risk my site going offline. So I decided to dig a bit deeper to try to find out the root cause of these issues. Error Log After logging into my website one day I noticed an  error_log  in the  /public/html  directory, So I opened it up to see what it contained, I was quite shocked when I discovered th...