• Learn about the post penetration tool Koadic

    preface: I saw a recommended tool Koadic on a friend's blog. After I contacted it, I found that it was very good. I thought that the power of this tool was the various module functions after I got the shell. I will write it myself and send it to you. First, clone the project locally: Project address https://github.com/zerosum0x0/koadic.git Then unzip it. If you want to install it to the directory you specified, you should first cd it to that directory and download it. I copied it there, so I unzip it. As shown below   Run koadic cd ko... read the whole passage
    Author: qxz_xp | Published: December 9, 2017 | Classification: Hacker technology , Hacker attack and defense | 5 comments
  • Burpsuite 1.7.03, the latest cracked version of penetration artifact

    The cracking software provided in this article is for software trial only, please delete it within 24 hours. As we all know, Burp Suite is a resounding web application penetration test integration platform. From the initial mapping and analysis of the application attack surface to the process of finding and exploiting security vulnerabilities, all tools work together seamlessly to support the overall test program. All tools in the platform share the same robust framework to uniformly handle HTTP requests, persistence, authentication, upstream agents, logging, alarms, and scalability. Burp Suite allows attackers to read the whole passage
    Author: qxz_xp | Published: August 1, 2016 | Classification: Hacker Tools , Hacker attack and defense | 5 comments
  • Research on Simple Personal Common Password Combinations

    Do a little research on passwords Zi Fei SpongeBob (Hehe) | 2014-09-24 13:44 Recently, I have been researching and infiltrating, and found some rules of passwords. I want to write a tool, so I want to investigate something The most common combination of passwords is letter+number The most frequently used symbol should be _ underline... because it seems that the mailbox symbol only supports this habit in those days 1. Alphabetical part: the first letter of each word of the name in the general four names For example, Wang Xiaoming The letters in the password are generally wang xia read the whole passage
    Author: qxz_xp | Published: September 25, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Discussion on the method and process of penetration test

    1. Analyze the content and functions of the target website (1) First, determine the language in which the website is written or whether there is any mixed use. You can get it here by viewing the website source file, observing the website links, capturing and submitting requests, etc (2) Crawl the website directory, use tools to crawl the website directory, which can help the previous step to make the results more accurate. Archive the crawling results, if possible, here should analyze whether the website uses a common program, if yes, record it and proceed to the next step (3) According to the results of the previous step read the whole passage
    Author: qxz_xp | Published: December 30, 2013 | Classification: Rookie Entry , Hacker technology , Hacker attack and defense | 2 comments
  • Basic Skills of Infiltration in the Domain

    1. What is a domain Some people say that domain is an organizational structure and a security boundary. The domain also has another name, Active Directory. No matter what the domain is, it always has some characteristics. With it, it is much easier to manage an organization's organizational units, personnel, especially computers, because the domain is built on computers. It will be very convenient to join computers in the domain, share files, and share Internet access. The domain has an important role, domain controller (DC). It has the supreme authority. It can be used in the domain for other read the whole passage
    Author: qxz_xp | Published: December 13, 2013 | Classification: Rookie Entry , Hacker technology , Hacker attack and defense | No comment
  • Some Thoughts on Social Engineering

      There are many ways to hack social workers. First of all, I heard that Kameng of KaTesco is more active recently. Then I will talk about how the webmasters of Kameng of social workers are generally non mainstream MCs, and there are more accounts registered everywhere. Now let's talk about the social work sub station, and we will share with you our main social work station, Kameng. First of all, check your pants. Maybe not, because they have many forum accounts registered. I've done three or four with pants. There is also a more commonly used, now read the whole passage
    Author: qxz_xp | Published: December 6, 2013 | Classification: Social worker related , Hacker attack and defense | No comment