Skip to content
Evotechspace
  • Home
  • Blog

Burp Suite 3: How to crawl the entire website.

January 24, 2019

Burp Suite spider crawls the entire website that has been targeted on the scope. The spider crawls the entire website thereby mapping the entire structure of the website. Go to spider ->control and make sure Spider scope is set to …

Read more

Categories Tutorials, Web Applications Leave a comment

Burp Suite 2: How To Setup Scope In The Burp Suite.

January 22, 2019

Open Burp Suite and go to the target and scope tab. Under the “include in scope” click “add” to enter the website you want to test. Under the “exclude from scope” enter the website that you don’t want to test …

Read more

Categories Tutorials, Web Applications Leave a comment

Burp Suite: Pentesting Web Applications vulnerability

January 21, 2019

In this series we are going to use Burp Suite for complete web application testing. Let’s dive in. Tools. Burp suite (Tool to test) – comes pre-installed in Kali Linux but readily available for download. You can visit https://portswigger.net/ to …

Read more

Categories Tutorials, Web Applications Leave a comment

Nmap + Armitage: Fingerprint your victim network

January 18, 2019

In the previous tutorial, we did set up Metasploitable and performed basic port scanning using Nmap. Here, we are going to use some advanced nmap options to better perform some advanced scanning. I will also introduce you to Armitarge ~ …

Read more

Categories Network Pentesting, Systems Hacking, Tutorials Leave a comment

Basic Lab Setup for Penetration Testing

January 14, 2019

In this tutorial we are going to see how we can setup a basic pentest lab and perform port scanning. (I feel this should have been the first post as I encourage every reader here to create a personal pentest …

Read more

Categories Network Pentesting, Systems Hacking, Tutorials Leave a comment

Steganography 2; adding a secret text to an audio file

January 13, 2019

In the previous tutorials we saw how to hide text message inside an image file. In this tutorial we are going to see how we can save our secret text file inside an audio file. Tools DeepSound. Steps Go and …

Read more

Categories Tutorials Leave a comment

Steganography; the art of hiding text messages in image

January 10, 2019

Steganography is the method of hiding a text message inside an image. In this tutorial we are going to see how we can use the tool. Tools needed. Stegosuite(used for stegnography). Image (to hide the message). Steps. First go to …

Read more

Categories Tutorials, Uncategorized Leave a comment

How to view saved WiFi password using cmd and python tool

January 6, 2019

Hello readers, during our previous tutorial we saw how we can use lazagne and see the saved WiFi and browser password In this tutorial we are going to see how we can view stored WiFi passwords using cmd and also …

Read more

Categories Network Pentesting, Systems Hacking, Tutorials, Uncategorized Leave a comment

HOW TO GET SAVED PASSWORD OF THE VICTIM

January 6, 2019

Hey guys, for this tutorial we shall need to have a physical access to a victims machine. We shall use a popular software tool to be able to retrieve and view passwords of the user. Tools needed Lazagne 2.4 Steps …

Read more

Categories Systems Hacking, Tutorials Leave a comment

How to crack zip file password using python

January 1, 2019

Most times we find ourselves having zip files that are password protected. In this tutorial, I am going to show you how we can use python to crack the password. Steps First we are going encrypt the sample file “test.txt” …

Read more

Categories Python for Pentesters, Tutorials Leave a comment
Older posts
Newer posts
← Previous Page1 Page2 Page3 Page4 Next →
Expect Better
Twitter Github