• Learn about the post penetration tool Koadic

    preface: I saw a recommended tool Koadic on a friend's blog. After I contacted it, I found that it was very good. I thought that the power of this tool was the various module functions after I got the shell. I will write it myself and send it to you. First, clone the project locally: Project address https://github.com/zerosum0x0/koadic.git Then unzip it. If you want to install it to the directory you specified, you should first cd it to that directory and download it. I copied it there, so I unzip it. As shown below   Run koadic cd ko... read the whole passage
    Author: qxz_xp | Published: December 9, 2017 | Classification: Hacker technology , Hacker attack and defense | 5 comments
  • Burpsuite 1.7.03, the latest cracked version of penetration artifact

    The cracking software provided in this article is for software trial only, please delete it within 24 hours. As we all know, Burp Suite is a resounding web application penetration test integration platform. From the initial mapping and analysis of the application attack surface to the process of finding and exploiting security vulnerabilities, all tools work together seamlessly to support the overall test program. All tools in the platform share the same robust framework to uniformly handle HTTP requests, persistence, authentication, upstream agents, logging, alarms, and scalability. Burp Suite allows attackers .. read the whole passage
    Author: qxz_xp | Published: August 1, 2016 | Classification: Hacker Tools , Hacker attack and defense | 5 comments
  • Research on Simple Personal Common Password Combinations

    Do a little research on passwords . Zi Fei SpongeBob (Hehe) | 2014-09-24 13:44 Recently, I have been researching and infiltrating, and found some rules of passwords. I want to write a tool, so I want to investigate something The most common combination of passwords is letter+number The most frequently used symbol should be _ underline... because it seems that the mailbox symbol only supports this habit in those days 1. Alphabetical part: the first letter of each word of the name in the general four names For example, Wang Xiaoming The letters in the password are generally wang xia read the whole passage
    Author: qxz_xp | Published: September 25, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Discussion on the method and process of penetration test

    1. Analyze the content and functions of the target website (1) First, determine which language the website is written in Or whether there are mixed uses This can be obtained by viewing the website source file, observing website links, capturing submission requests, etc (2) Crawl the website directory, and use tools to crawl the website directory, which can help the previous step to make the results more accurate Archive the crawling results. If possible, analyze whether the website uses a common program here, and if so, record it Proceed to the next step (3) According to the results of the previous step, the site root directory or .. read the whole passage
    Author: qxz_xp | Published: December 30, 2013 | Classification: Rookie Entry , Hacker technology , Hacker attack and defense | 2 comments
  • Basic Skills of Infiltration in the Domain

    1. What is a domain Some people say that domain is an organizational structure and a security boundary. The domain also has another name, Active Directory. No matter what the domain is, it always has some characteristics. With it, it is much easier to manage an organization's organizational units, personnel, especially computers, because the domain is built on computers. It will be very convenient to join computers in the domain, share files, and share Internet access. The domain has an important role, domain controller (DC). It has supreme authority. It can be used for other users in the domain .. read the whole passage
    Author: qxz_xp | Published: December 13, 2013 | Classification: Rookie Entry , Hacker technology , Hacker attack and defense | No comment
  • Some Thoughts on Social Engineering

      There are many ways to hack social workers. First of all, I heard that Kameng of KaTesco is more active recently. Then I will talk about how the webmasters of Kameng of social workers are generally non mainstream MCs, and there are more accounts registered everywhere. Now let's talk about the social work sub station, and we will share with you our main social work station, Kameng. First of all, check your pants. Maybe not, because they have many forum accounts registered. I've done three or four with pants. There is also a more commonly used, now .. read the whole passage
    Author: qxz_xp | Published: December 6, 2013 | Classification: Social worker related , Hacker attack and defense | No comment