Penetration Testing

Get 60 0FP0EXP Token to remove widget entirely!

source code



source code
old source code

get any 0FP0EXP Token to automatically turn off or 10 0FP0EXP Token to remove this JavaScript Mining.

Get 50 0FP0EXP Token to remove my NFTS advertisements!

Get 40 0FP0EXP Token to remove this donation notification!

get 30 0FP0EXP Token to remove this paypal donation.

View My Stats

get 20 0FP0EXP Token to remove my personal ADS.

word number: 91

Time: 2022-09-12 02:21:49 +0000

Denial of Service (DOS) on Wifi using Ostinato Linux

There was no CommView in Linux where I used it to perform DoS. However, I found a similar software called Ostinato and it can work for Dos.

Keywords: LinuxDoSdenial of servicewifiOstinato

Denial of Service (DOS) Pada Wifi Menggunakan Ostinato Linux

Tidak ada CommView di Linux untuk melakukan DoS. Namun, saya menemukan perangkat lunak serupa yang disebut Ostinato dan dapat Dos.

Keywords: LinuxDoSdenial of servicewifiOstinato

Denial of Service (DOS) on Wifi using CommView Windows

DOS prevents other users from doing activities on the network. Here I will demonstrate DOS on a wifi using CommView for WiFi on Windows.

Keywords: WindowsDOSdenial of servicewifiCommView

Denial of Service (DOS) Pada Wifi Menggunakan CommView Windows

DOS mencegah pengguna lain beraktivitas di jaringan. Di sini saya akan mendemonstrasikan DOS pada wifi menggunakan CommView for WiFi di Windows.

Keywords: WindowsDOSdenial of servicewifiCommView

Simple Password Bruteforce Demonstration Using Hydra

I can define password brute forcing in just one sentence which is trying every single character combination to crack a password.

Keywords: penetration testingbrute forceHydraLinuxBacktrackNMAP

Demonstrasi Bruteforce Sederhana Menggunakan Hydra

Saya dapat mendefinisikan password bruteforce hanya dalam satu kalimat yaitu mencoba setiap kombinasi karakter untuk memecahkan kata sandi.

Keywords: penetration testingbrute forceHydraLinuxBacktrackNMAP

Having a Taste of Being a Hacker

There are four main steps in penetration testing which are (1) Information Gathering, (2) Scanning, (3) Exploitation, (4) Maintaining Access

Keywords: penetration testinghackinginformation gatheringscanningexploitationmaintaining accessmetasploitnmaptheharvesteropenvaspingnslookupGooglewhite hatgrey hatblack hat

Cicipan Menjadi Hacker

Ada empat langkah utama dalam pengujian penetrasi (1) Pengumpulan Informasi, (2) Pemindaian, (3) Eksploitasi, (4) Mempertahankan Akses.

Keywords: hackerpentestpengumpulan informasipemindaianeksploitasipemeliharaan aksesmetasploitnmaptheharvesteropenvaspingnslookupGooglewhite hatgrey hatblack hat

Hacking Sethc and Office Trend USB Windows 7 When You Have Physical Access

The method uses physical means through a bootable media to gain access to administrative command line (cmd.exe here) and exploit sethc.exe.

Keywords: Bypass BlocksUSB AccessMicro TrendHackingAdministrative AccessWindows 7sethcvulnerability