Peter Butucel

120 Flips | 8 Magazines | 148 Likes | 4 Followers | @cephasiii2014 | Keep up with Peter Butucel on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Peter Butucel”

Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)

Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into …

Forensics

Hands off my data! 15 default privacy settings you should change right now

On the Internet, the devil’s in the defaults.<p>You’re not reading all those updated data policies flooding your inbox. You probably haven’t even looked for your privacy settings. And that’s exactly what Facebook, Google and other tech giants are counting on.<p>They tout we’re “in control” of our …

Apps

Javascript: What Is The Execution Context? What Is The Call Stack?

What is the <b>Execution Context in Javascript</b>?<p>I bet you don't know the answer.<p>What are the most basic components of a programming language?<p>Variables and …

JavaScript

Hackers Find New Method of Installing Backdoored Plugins on WordPress Sites

Hackers have come up with a never-before-seen method of installing backdoored plugins on websites running the open-source WordPress CMS, and this new …

Information Security

How to Update macOS Using a Simple Terminal Command

If you're sick of waiting for the progress bar to complete every time you reboot after a macOS software update, then you'll be pleased to learn there's another way to update your Mac that could potentially reduce your downtime.<p>The process involves a simple Terminal command, and allows you to …

Operating Systems

Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports)

IntroductionNetwork Address Translation generally involves “re-writing the source and/or destination addresses of IP packets as they pass through a …

"SANS Poster: Building a Better Pen Tester - PDF Download"

  Blog Post by: Jason Blanchard   It's here! It's here! The NEW SANS Penetration Testing Curriculum Poster has arrived (in PDF format)! …

Information Security

A step-by-step guide to Git

If you've never used Git, you may be nervous about it. There's nothing to worry about—just follow along with this step-by-step getting-started guide, …

Nmap Cheatsheet

Nmap Quick commands<p>Ping Sweep<p>example<p>or<p>List Scan aka reverse-dns lookup<p>On a corperate network this is a bit better of a scan due to enumeration of …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

How to VNC Through SSH Tunnel

VNC, or “Virtual Network Computing”, is a connection system that allows you to use your keyboard and mouse to interact with a graphical desktop …

How to Configure Custom SSH Connections to Simplify Remote Access

SSH (SSH client) is a program for remotely accessing a machine, it enables a user to execute commands on a remote host. It is one of the most …

10 Useful Sudoers Configurations for Setting ‘sudo’ in Linux

In Linux and other Unix-like operating systems, only the root user can run all commands and perform certain critical operations on the system such as …

Stop Those Annoying Browser Prompts Asking for Your Location or to Send Notifications

If you've grown tired of answering those annoying browser prompts every time a website wants to show you notifications or know your location, you can …

How to access your local iCloud folder from the terminal

Working within the terminal window doesn't mean you can't keep your code, configuration files, or text files in sync with your iCloud account. Jack …

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

Pretending to be someone you're not in an email has never been quite hard enough—hence phishing, that eternal scourge of internet security. But now …

Information Security

Mr.SIP – SIP Attack And Audit Tool

Mr.SIP was developed in Python as a SIP Attack and audit tool which can emulate SIP-based attacks. Originally it was developed to be used in academic …

P4wnP1: A Open Source USB Attack Platform

PenTestIT RSS FeedAs of now, hardware security projects seem to be attracting me more than software based projects. Evidently, I wrote a few posts …

4 Ways to Capture NTLM Hashes in Network

Hello friends! Today we are describing how to capture NTLM Hash in a local network. In this article we had captured NTLM hash 4 times through various …

FTP Pivoting through RDP

In our previous tutorial we had discussed on <b>SSH pivoting</b> & <b>RDP pivoting</b> and today you will learn FTP pivoting attack.From Offensive Security<b>Pivoting</b> …

Penetration Testing on Telnet (Port 23)

Welcome to Internal penetration testing on telnet server where you will learn telnet installation and configuration, enumeration and attack, system …

VPNPivot - Explore Internal Networks

Sometime we do external penetration testing and when we compromise the remote target we would like to explore the internal network behind and getting …

MySQL Penetration Testing with Nmap

In this article we are discussing MYSQL penetration testing using Nmap where you will learn how to retrieve database information such as database …

Reaver - Attack against Wi-Fi Protected Setup (WPS)

<b>Reaver</b> has been designed to be a robust and practical attack against <b>Wi-Fi Protected Setup (WPS)</b> registrar PINs in order to <b>recover WPA/WPA2 …

RDP Pivoting with Metasploit

In our previous turtorial we had discussed on <b>SSH pivoting</b> and today we are going to discuss RDP pivoting.From Offensive Security<b>Pivoting</b> is technique …

Penetration Testing on Remote Desktop (Port 3389)

In this article we are discussing Remote Desktop penetration testing in four scenarios. Through that we are trying to explain how an attacker can …

Build a Raspberry Pi Scanner that Tracks the Devices Connected to Your Local Network

We’re going to make use of a Raspberry Pi to build a network scanner to keep track of the hosts connecting to our local network. It’s actually pretty easy to do. And as we’re going to make use of ARP scans to do it, which are moderately stealthy unless you heavily hammer the network, it would be …

Raspberry Pi

How to Hack Networking

This curated post is authored by Jordan Gonen, Writer, StrategicThe post How to Hack Networking appeared first on iamwire.

Beginner Guide to Google Dorks (Part 1)

Google is a tool which helps in finding what one is looking for. Google operators are the terms provided to us for making our search easy and …

Beginner Guide to OS Command Injection

The dynamic Web applications may make the most of scripts to call up some functionality in the command line on the web server to process the input …