If you want to attack any victim you somehow need to trick victim to open malicious file. Usually normal user would not download and execute your malicious file, so you need to create some type of file (jpg, pdf, mp4, etc.) for which you know that victim will open it. And in this file you
1. Introduction In this post I will describe you how you can infiltrate in some local network by using hardware implant as Raspberry Pi. This is very useful if you want to perform attack on site e.g. company, shopping center, hospital, school, etc. The goal is to install small hardware as Raspberry Pi, which would
In this post I will describe you how you can decode base64 string and encode it back. By default msfvenom does not have base64 encoder for powershell script. So, the first thing is that we need to create encoder and add it in metasploit folder. Here is the link for encoder created in ruby. Just
In this post I will describe you how you can create executable batch file (.bat), which will download and execute any file over powershell you will define. I usually use this technique to create malware, which includes multiple attacks at once. For example, you can create file which will download and execute payload. At the
1. Introduction Those days many skids does not know how powerful bash scripting is. The simple language gives you limitless possibilities of task automatization, which consequently brings you many ways of hacking. With combination of social engineering and bash scripting, some big damage could be done. This article will be focused on hacking the linux;
How to avoid detection is a question of every attacker. In those days it is not easy to create payload which will avoid detection and triggering alarm. All antivirus software vendors including microfoft defender are putting big effort to protect users against threats, and each day they are doing their job better and better. They