Posts

MikroTik Bridge VLAN Filtering – Full Setup Tutorial for Secure Your Network

  MikroTik Bridge VLAN Filtering – Full Explanation with Configuration Bridge VLAN Filtering in MikroTik is essential when you're managing VLANs (Virtual LANs) using hardware offloading for high performance (using a bridge instead of a router). It's the modern and efficient method for VLAN management in RouterOS 6.41+ and RouterOS v7 . 🔐 What is Bridge VLAN Filtering? Bridge VLAN filtering allows you to isolate or segment traffic on different VLANs through one bridge interface , applying VLAN rules per-port efficiently. 🧱 Key Concepts for VLAN Filtering: Bridge: Logical switch combining multiple interfaces. VLAN: Virtual separation of Layer 2 domains. PVID (Port VLAN ID): Used for untagged incoming traffic. Tagged: Traffic with VLAN ID. Untagged: Plain Ethernet traffic. ✅ Example Scenario for the Mikrotik Configuration.  If We have: ether1 as uplink to trunk (to switch or another router) ether2 for VLAN 10 ether3 for VLAN 20 ?...

Apache Tomcat Upload Exploitation (Step-by-Step Guide)

Image
  Apache Tomcat Upload Exploitation (Step-by-Step Guide) 🎥 Watch the demonstration here : https://youtu.be/P8nlsRdKzT8 If you’re diving into web exploitation or pentesting Apache Tomcat servers, upload-based exploitation is one of the key techniques to understand. This method targets weak configurations where Tomcat allows file uploads (such as WAR files) that can be executed on the server—leading to Remote Code Execution (RCE) . In this blog post, we’ll walk through Apache Tomcat Upload Exploitation with clear steps and explanations. Whether you're learning ethical hacking or creating educational content, this walkthrough is a practical hands-on example. 🔧 Requirements Kali Linux or any attacker machine Apache Tomcat server (target) Valid Tomcat credentials (default or stolen) Metasploit (optional, but useful) ✅ Step 1: Access the Tomcat Manager Panel Tomcat’s web interface usually runs on: http://<target-ip>:8180/manager/html If credentials are know...

Discover and Exploit Samba Vulnerabilities with Metasploit – CVE-2007-2447 Explained

Image
  How to Discover Vulnerable Samba Shares with Metasploit  Before you dive into the attack you have to be vulnerable so if you use Kali linux you have to disable your filewall as below.  🔥 Using UFW (Uncomplicated Firewall) Check if UFW is installed and active:                               sudo ufw status                               To disable the firewall:                               sudo ufw disable      To make sure it doesn’t auto-start on boot (optional):                sudo systemctl disable ufw   🔥 Using iptables To flush (clear) all rules and effectively disable the firewall:            ...

Hide Your IP and Browse Anonymously on Android: How to Change Your Android Mobile IP Randomly

 Change your Android phone IP Randomly  This is only education purpose so do not use the technique for any harmful Activities.   Step 1: Confirm Root Access Before anything else, make sure your phone is properly rooted or not. It must be rooted. Install a root checker app from the Play Store (e.g. Root Checker ) Verify you have superuser access. Step 2: Install Orbot (Tor Proxy) Download Orbot from the official Tor Project site -https://www.torproject.org/download/ or the Play Store. Open Orbot Grant root access when prompted by SuperSU/Magisk Step 3: Enable Transparent Proxy (Root Mode) This is what enables system-wide Tor routing: Launch Orbot Tap the Settings icon Scroll down to "Transparent Proxying" Enable: "Tor Everything" "Enable Transparent Proxying"   "Request Root Access" This routes all traffic through Tor – including apps that don’t support proxies or VPNs.   📱 Step 4: (Opt...

How to Use Metasploit for Ethical Hacking: Step-by-Step Lab Setup for Beginners

Image
  Dive Into Ethical Hacking with Metasploit: A Beginner’s Guide by Learn Cybersecurity BD. Are you ready to dive into the world of ethical hacking and discover how real cybersecurity professionals uncover system vulnerabilities before real attackers do ? Then you need to understand the power of the Metasploit Framework — one of the most essential and widely used tools in cybersecurity. 💡 What Is Metasploit and Why Is It So Important? Metasploit is a powerful open-source framework that allows ethical hackers and security professionals to simulate real-world cyberattacks in a safe, controlled environment. It’s a must-have tool for penetration testing, vulnerability scanning, and security research. Whether you're scanning systems with Nmap , exploiting a misconfigured service, or performing post-exploitation with Meterpreter , Metasploit unifies all these tools into a single robust platform. What is Metasploit? Metasploit Framework is a powerful penetration testing...