|
|
STICKY:
easy-way-to-generate-reverse-shell/
(Preview)
n this article, we will learn how to get a reverse in a few easy steps. Usually, the problem when reverse shell commands is to remember its long and complicating syntax. But due to growing AI of our digital world, this problem tackled and dealt with. Let’s see how it is done through this article.Table of...
|
cYber-coder
|
0
|
103
|
|
|
|
|
STICKY:
UPload shell in mybb and wordpress and Hack via simlink
(Preview)
Hie Hf it is my first tut here i hope it will help some noobs : Lets Start: Here I will use my site just to show you how u can upload shell in mybb sites: Go to the admin panel :site.com/admin: username:ImNotGoing To show here pass:yourpass Now we are inside the mybb control panel: Now go to >>Themes a...
|
cYber-coder
|
0
|
724236
|
|
|
|
|
STICKY:
ثغره في Powered By Vbulletin Version 3.8.6
(Preview)
السلام عليكم ورحمه الله طبعا اليوم سنتكلم عن ثغره تسمح لك برويه البيانات المسجله في ملف config وهذه البيانات ستودي طبعا الى اختراق الموقع اذا لم يكن السيرفر-------طبعا فكره الثغره هي البحث داخل المنتدى عن كلمه database من خلال عمليه البحث سيظهر لك كل المعلومات الثمينه عن الملف طبعا الى الاستغلال::::...
|
cYber-coder
|
0
|
29345
|
|
|
|
|
aSYNcrone | Multifunction SYN Flood DDoS Weapon
(Preview)
aSYNcrone's POWER!!!USAGEgit clone https://github.com/fatihsnsy/aSYNcrone.gitcd aSYNcronegcc aSYNcrone.c -o aSYNcrone -lpthread -O2./aSYNcrone <source port> <target IP> <target port> <thread number>What is aSYNcrone?aSYNcrone is a C language based, m...
|
cYber-coder
|
0
|
14
|
|
|
|
|
What is Directory Browsing Vulnerability? (Practical Explanation)
(Preview)
Hello dear TurkHackTeam members, in this post I will talk about Directory Browsing Vulnerability and try to explain what kind of data you can access by using this vulnerability. Directory Browsing Vulnerability is a web security vulnerability . This vulnerability occurs when the inde...
|
cYber-coder
|
0
|
12
|
|
|
|
|
What is Local File Inclusion Vulnerability? (Practical Explanation)
(Preview)
Hello dear TurkHackTeam members, in this post I will talk about the Local File Inclusion vulnerability and try to explain what kind of data you can access by using this vulnerability. LFI, or Local File Inclusion , is a web security vulnerability . Thanks to this vulnerability , we can rea...
|
cYber-coder
|
0
|
8
|
|
|
|
|
How attackers target web applications? part1
(Preview)
understanding of how attackers target web applications? This guide will explore five hacking techniques, ranging from beginner to advanced levels. We’ll cover:Login brute forceHTTP verb tamperingSQLiXSSCode injection leading to remote code executionBefore we start, it's important that...
|
cYber-coder
|
2
|
17
|
|
|
|
|
Web Vulnerability Detection with Skipfish
(Preview)
HellO, Today I will show you how to detect web vulnerabilities with Skipfish . Let's go then . What is SkipFish? Skipfish is a tool used in web application security testing , supported by Google . In addition to security vulnerabilities, dictionary-side scans can also be performed...
|
cYber-coder
|
0
|
11
|
|
|
|
|
Collecting Information About the Target Website
(Preview)
We can use the site report netcraft site to collect information about the target website. For example, let's look at turhackteam.org. Site report for https://www.turkhackteam.org | netcraftUsing results from Netcraft's internet data mining, find out the technologies and infrastructure of h...
|
cYber-coder
|
0
|
16
|
|
|
|
|
What is SSH? How does it work?
(Preview)
Telnet and rlogin are communication protocols used to communicate with a remote server. However, Telnet and rlogin are not a secure communication protocol because it does not have any security mechanism and transfers data containing your sensitive information, user passwords over the network...
|
cYber-coder
|
0
|
115
|
|
|
|
|
what is websploit used for ??
(Preview)
WebSploit Labs is a learning environment created by Omar Santos for different Cybersecurity Ethical Hacking, Bug Hunting, Incident Response, Digital Forensics, and Threat Hunting training sessions. WebSploit Labs includes several intentionally vulnerable applications running in Do...
|
cYber-coder
|
0
|
101
|
|
|
|
|
Today we will tell you how to collect information with Dmitry? I will explain this. Since one of the most important sta
(Preview)
Today we will tell you how to collect information with Dmitry? I will explain this.Since one of the most important stages of penetration tests is to collect information about the target, I recommend that you read the subject carefully.DmitryDmitry is a console-based information gathering appli...
|
cYber-coder
|
0
|
125
|
|
|
|
|
What is Wpscan? , How to use ?
(Preview)
WHAT CAN WPSCAN DO?-Information about WordPress version and update can be obtained.-Information about plugins and themes on the target site can be obtained.-Usernames of authors and administrators on the target site can be found.-Brute-force attacks can be made.-Information about security...
|
cYber-coder
|
0
|
109
|
|
|
|
|
What is SQLMap and how to use it.
(Preview)
SQLMap SQLMap is a tool used to detect SQL injection vulnerabilities and gain access to the database by exploiting these vulnerabilities. Now let's take a look at how it is used. Our target site -> How to link to our articles SQLMap Installation Before moving on to its use, let's briefly show...
|
cYber-coder
|
0
|
123
|
|
|
|
|
What is FTP and Where is it Used?
(Preview)
FTP is the abbreviation of the English words " File Transfer Protocol " . This protocol is a communications protocol used to facilitate file transfer between computers. The main purpose of FTP is to securely transfer files from one computer to another computer.FTP's usage areas are quite w...
|
cYber-coder
|
0
|
109
|
|
|
|
|
burp-suite-for-pentester
(Preview)
Not only the fronted we see or the backend we don’t, are responsible to make an application be vulnerable. A dynamic web-application carries a lot within itself, whether it’s about JavaScript libraries, third-party features, functional plugins and many more. But what, if the installed features...
|
cYber-coder
|
0
|
98
|
|
|
|
|
Beginner Guide to Google Dorks
(Preview)
google is the main tool for hackers because its ability of gathering info on any site or person as a hacker you have to understad using dork .... in this tut : Intitlee.g->intitle:hackingarticlesThis query will return the pages which include the term “hackingarticles” in it.inurle.g-&g...
|
cYber-coder
|
0
|
113
|
|
|
|
|
Successfully Hack a Website in 2016!
(Preview)
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions.Second i want to say sorry for the series i left in stand by mode, as soon as i get time i will re...
|
cYber-coder
|
0
|
1263
|
|
|
|
|
ثغرات السيرفرات
(Preview)
الدرس الاول التعرف علي انوع الثغرات و المصطلحات المنتشره ' هناك الكتير من المشاكل التي تواجه المبتداء عن دخوله لمجال الهاكر وهذا يرجع لعد معرفته الاساسيات و المصطلحات ولكن في هذا الدرس البسيط هضع شرح للمصطلحات حسنا, يمكنني الان افتراض بانك قرات جميع السطور السابقة وفهمت جيدا من سنقوم به وتريد المتابع...
|
cYber-coder
|
0
|
2767
|
|
|
|
|
أختراق السيرفرات
(Preview)
درس اليوم هوه عن بعد ما اخذت الرووت وكيف استفيد منه كمبتدى في السيطره على السيرفر ومن اهم الاوامر التي اهم الاغراض يلي يفكر فيها بعد ما اخذ الرووت فالكثيرمن الشباب يوخذ رووت ولا يعرف ما يفعل بعد ذلك ويوقف على الرووت ولا يعرف ما يفعل؟؟؟ الان ماخذ رووت على احد السيرفرات ومعي باسورد الرووت الان نقوم بالدخول عن...
|
cYber-coder
|
0
|
2681
|
|
|