
Capture the flag (CTF)
Drunk Admin Web Hacking Challenge
This challenge includes a web application generally designed for image hosting. The application has a few vulnerabilities. The challenge is to exploit the ap

Hacking
Vulnerability scanning with Metasploit part I
Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to

Hacking
Exploiting X11 unauthenticated access
In this article, we are going to see how to exploit the x11Server Unauthenticated Access vulnerability which is associated with the CVE-1999-0526. How bad i

Penetration testing
Web application pentest guide Part-II
In last part of the article we have discussed the process of Requirement Collection, Information gathering and URL discovery now we will discuss the other st

Penetration testing
Web Application Pentest Guide Part-I
In this article, we are going to pentest a web application which was developed by HP for scanner evaluation purpose. We will be demonstrating the complete pr

Capture the flag (CTF)
Hackerfest Sedna CTF Walkthrough
Sedna is the second and medium level CTF from Hackerfest. We hosted the VM in Virtual box and ran nmap on its target IP. [pkadzone zone="main_top"] As can

Capture the flag (CTF)
Hackerfest Quaoar CTF Walkthrough
Quaoar is the first and easiest CTF from Hackerfest. We hosted the VM in Virtual box and ran nmap on its target IP. [pkadzone zone="main_top"] As can be seen

Penetration testing
Penetration Testing from Amazon Cloud
In this article, we are going to see how we will deploy a Windows and Linux system on an Amazon cloud server for penetration testing purposes. What is the di