Category: Exploitation

 

Network pivoting: concept, examples, techniques, tools

How to control computers via backdoor

Pupy manual: how to create a backdoor

How to install Pupy

How to use netcat (nc), ncat

How to run Armitage in Arch Linux and BlackArch

RouterSploit User Manual

Concealed control of a Windows-based computer (using Metasploit)

How to use sqlmap for injection in address of a web site page (URI). Arbitrary injection points

How to hack routers in Windows (Router Scan by Stas’M manual)