Skip to main content

Posts

API hacking lab setup

 Follow the commands to install and configure API hacking lab: 1. Install kali linux and update all the packages.  apt update -y apt upgrade -y or apt dist-upgrade -y or apt full-upgrade -y If you face any problem regarding update, install cloud flare warp in the host machine, then again start updating packages in your kali vm.  2. Install and configure burpsuite professional.  Open burpsuite and go to Extender tab. Click on BAppStore. Search for Autorize extension, It will help us to automate authorization testing. Click on Download Jython. From Jython website click on Jython standalone and save it. Go to Extender > Options and under python environment select the jython jar file that you just downloaded. Now again go to BAppStore and re-search for Autorize extension. You will see Install option this time after selecting Autorize extension. Install it. You will see all the installed extensions under Extender > Extensions tab.  3. Install foxy proxy to prox...
Recent posts

Activating windows 11 Pro

  Activating windows 11 Pro.... Step 1.1: Open command prompt with admin privilege.  Step 1.2: Install KMS client key. Use the command “ slmgr /ipk kmsclientkey ” to install a license key (kmsclientkey is the activation key that corresponds to your Windows edition). The following is the list of Windows 11 Volume license keys. Home: TX9XD-98N7V-6WMQ6-BX7FG-H8Q99 Home N: 3KHY7-WNT83-DGQKR-F7HPR-844BM Home Single Language: 7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFH Home Country Specific: PVMJN-6DFY6-9CCP6-7BKTT-D3WVR Pro: W269N-WFGWX-YVC9B-4J6C9-T83GX Pro N: MH37W-N47XK-V7XM9-C7227-GCQG9 Education: NW6C2-QMPVW-D7KKK-3GKT6-VCFB2 Education N: 2WH4N-8QGBV-H22JP-CT43Q-MDWWJ Enterprise: NPPR9-FWDCX-D2C8J-H872K-2YT43 Enterprise N: DPH2V-TTNVB-4X9Q3-TJR4H-KHJW4 Step 1.3: Set KMS server. Use the command “ slmgr /skms kms8.msguides.com ” to connect to my KMS server. Step 1.4: Activate your Windows. The last step is to activate your Windows using the command “ slmgr /ato ”. Step 1.5: Check the activati...

Installing header exploitation tool HExHTTP

  https://github.com/c0dejump/HExHTTP Found that manually installing this tool will give you some pain in kali. So I choose docker option.  apt install docker.io -y git clone https://github.com/c0dejump/HExHTTP.git cd HExHTTP docker build -t hexhttp:latest . docker run --rm -it --net=host -v "$PWD:/hexhttp/" hexhttp:latest -u 'https://target.tld/' Avi

Amass tool installation guide and usage

 Installation guide: https://github.com/owasp-amass/amass/blob/master/doc/install.md Usage: https://github.com/owasp-amass/amass/blob/master/doc/tutorial.md External Attack surface monitoring using Owasp Amass project. This is also called reconnaissance or information gathering phase to more than 80 sources. It an wonderful tool to use. Results are almost accurate. But you should check if you see a result that is not familiar to you. Because amass taking data from the third party db. So there is a possibility that, that of db giving amass fake data. Though amass apply dns enumeration for better result but still it is worth checking for weird informations.  Comes with 3 subcommands. amass intel|enum|db amass intel -- Discover target namespaces for enumerations i.e. target is associated with how many domains!!!! amass enum -- Perform enumerations and network mapping of those domains and sub-domains. amass db -- Manipulate the Amass graph database Amass Intel amass intel ...

Installation of xssdynagen tool

Link to the repo:  https://github.com/Cybersecurity-Ethical-Hacker/xssdynagen?tab=readme-ov-file git clone https://github.com/Cybersecurity-Ethical-Hacker/xssdynagen.git cd xssdynagen The following 4 packages are needed for this tool to work and are already installed in kali.  pipx install aiohttp  pipx install colorama pipx install tqdm pipx install "uvloop>=0.17.0" You can always check the package existence: dpkg -l | grep packagename If not installed then use this command: pip/pip3 install -r requirements.txt If that also does not work then: apt install python3-aiohttp apt install python3-colorama apt install python3-tqdm apt install python3-uvloop In kali you need to install paramspider: apt install paramspider -y paramspider -d example.com   (Though this command in kali does not work) For ubuntu: git clone https://github.com/0xKayala/ParamSpider cd ParamSpider pip/pip3 install -r requirements.txt (If giving error then install the packages in above mentioned w...

Installtion of SQLMutant tool

This tool is perfectly works on ubuntu 24 system. And I found it is not working properly in kali linux 24 version.   https://github.com/blackhatethicalhacking/SQLMutant/tree/main This tool need to use along with sqlmap tool. Showing this cheat sheet for kali or debian based system.  This tool actually analyze everything and give you the vulnerable url where sql injection is possible. You just need to use then sqlmap to exploit that.   Prerequisite: apt install pipx -y (for ubuntu) pip3 install uro or pipx install uro pipx ensurepath pipx completions  (not needed)  source ~/.bashrc   or restart system If go tool is not installed then run the below two commands first ( golang-go ) or follow this link to install go (https://mahimfiroj.blogspot.com/2024/12/installing-nuclei-in-kali.html) otherwise skip this step.   dpkg -l | grep packagename (Using this command you can check package is installed or not) apt install gccgo-go -y or apt install gol...

Burpsuite install and crack in kali debian ubuntu

  Cracking burpsuite in kali: https://drive.google.com/drive/folders/13WQeT99kyyeWOmKGRKnjTKzCJmkrKdUa (This is not shared link. Log in to ovi.it88 gmail id and then click on the link) Follow step by step procedure...... Download the tool from the above link. Place the tool in /tmp folder or in any folder where you have permission in kali. The tool is under this folder  burpsuite_pro_v2024.5 for linux. Go to that /tmp/burpsuite_pro_v2024.5 for linux folder Open command prompt meaning terminal there and run this command: java -jar burploader.jar A pop-up window will appear. Click Run then another pop up window called license agreement will appear. Uncheck the condition and click I Accept . From the loader window, copy the License key . Now you have two window. Paste that on the Enter license key window and click Next.  Check the "Use proxy server to connect" and click on Manual activation .  Now click Copy request under Manual Activation window.  Paste i...