Profile

Cover photo
Hacking tutorials
2,122 followers|340,927 views
AboutPostsPhotosYouTube

Stream

Hacking tutorials

Shared publicly  - 
 
One of the most common and oldest security vulnerabilities in software are buffer overflow vulnerabilities. Buffer overflow vulnerabilities occur in all kinds of software from operating systems to client/server applications and desktop software. This often happens due to bad programming and the lack of or poor input validation on the application side.

In this article we will look at what a buffer overflow exactly is, how they work and how they can become serious security vulnerabilities. We will also look at what happens when a buffer overrun occurs and mitigation techniques to minimize their harmful effects.


www.hackingtutorials.org
In this tutorial we will learn how a buffer overflow works, how buffer overflows can be exploited by hackers and malware and how to mitigate them.
4
2

Hacking tutorials

Shared publicly  - 
 
Microsoft Windows still holds the largest market share when it comes to operating systems for desktop computers, both for enterprise use and personal use. Therefore it is highly likely you will encounter a lot of Windows workstations and servers during your penetration testing training and career.

On the other hand, most penetration testers mainly use Linux based distributions such as Kali Linux, Pentoo or Backbox. Therefor you need the ability to quickly compile Windows exploits on your Linux machine. The solution for this is: Mingw-w64.

Learn more about hacking on www.hackingtutorials.org
Learn how to use Mingw-w64 on Kali Linux to compile Windows exploits. In this tutorial we will be learning about cross compiling exploits with Mingw-w64.
2
1

Hacking tutorials

Shared publicly  - 
 
Part 1 of Hacking with Netcat: The basics. In this tutorial we will be covering some basic netcat features such as raw connections, banner grabbing and file transfers. In the upcoming part 2 we will be looking at bind and reverse shells. In part 3 we will cover some advanced techniques such as netcat proxies and traffic redirection.

Share if you like :)
Netcat is a great network utility for reading and writing to network connections. Learn how to use Netcat for hacking in this series of Hacking with Netcat.
13
2

Hacking tutorials

Shared publicly  - 
 
Passed for OSCP! It was a long road but very rewarding!
12

Hacking tutorials

Shared publicly  - 
11
SMARTLY Simple's profile photo
 
that is wonderful


Hacking tutorials

Shared publicly  - 
 
Great article about SQLi and SQLmap.
SQL injection – one of the most critical vulnerabilities till now – is still included in the OWASP Top 10 list’s Injection flaws section. SQLMap is a tool that helps penetration testers…
17
2

Hacking tutorials

Shared publicly  - 
 
Hacking Tutorials 2017.
Hacking Tutorials 2017 mission, vision, plans. In 2017 we will be focusing on penetration testing tutorials and training in virtual labs. Read on...
8
2

Hacking tutorials

Shared publicly  - 
 
In part 1 of the Hacking with Netcat tutorials we have learned the very basics of Netcat. Now it is time to dive deeper into the most popular and common usage of Netcat: Setting up bind shells and reverse shells. In this tutorial we will be learning about the difference between a bind shell and a reverse shell and how to use them.

Quiet often Netcat is not present on systems as it could be considered as a potential security issue. In these cases we will learn about how to use other tools and programming languages than Netcat which replaces some functionality to setup a reverse shell. Programming and script languages like Python, PHP, Perl and Bash are great alternatives. We will conclude this tutorial with how to use bind shells.
In part 2 of hacking with Netcat we will be learning about bind shells and reverse shells on Windows and Linux using Netcat, Python, PHP, Perl and Bash.
4
1

Hacking tutorials

Shared publicly  - 
 
Check out my OSCP course review! :)
In this article we will be reviewing the OSCP course, labs and the 24 hour exam. We will look at prior knowledge needed and tips for passing the exam.
19
3

Hacking tutorials

Shared publicly  - 
 
We had a couple hours downtime but everything is up and running again. Check out Hacking Tutorials: http://www.hackingtutorials.org
9
2

Hacking tutorials

Shared publicly  - 
 
In this tutorial we will be exploiting VSFTPD v2.3.4 manually and with Metasploit. This particular VSFTPD exploit is pretty easy to exploit and is a great first start on the Metasploitable 2 box. Instead of quickly running Metasploit to exploit this vulnerability we will start looking at how the application is exactly vulnerable. Than we will analyse the source code, test it in a controlled environment and then exploit it on the Metasploitable 2 machine. This will help you to get a better understanding of the exploitation process and actually see what is happening and how.

Read more on www.hackingtutorials.org
In this tutorial we will be exploiting VSFTPD v2.3.4 on Metasploitable 2 manual and with Metasploit. This version of VSFTPD contains a backdoor.
9
1
Story
Tagline
Hacking Tutorials
Introduction
Hacking Tutorials is supplying (beginner) hacking tutorials about hacking with Kali Linux, Windows and other operating systems to show home and office users how easy it often is to breach security and crack bad passwords. We will be covering subjects like Wifi hacking, fingerprinting, vulnerability scanning, malware analysis and exploiting, penetration testing and ethical hacking.

The main goal is to increase security awareness, teach about information security, countermeasures and give our readers information on how to use the tools to test their own security. Most tutorials contain advise, tips and tricks on how to prevent yourself from being hacked. For more advanced users we will be focusing on malware analysis topics as this is becoming a more popular and interesting subject these days. Malware analysis allows us to determine malware’s functions, threats and behaviour.

Feel free to ask questions or request new tutorials on Google+, Youtube, Twitter or e-mail.