Posts

How to Set Up a Home Lab for Ethical Hacking and Cybersecurity

  How to Set Up a Home Lab for Ethical Hacking (Beginner’s Guide) If you’re interested in learning ethical hacking or preparing for a cybersecurity career , setting up a home lab is the safest and most practical way to start. A home lab gives you a controlled environment where you can practice hacking techniques, test tools, and build your skills without risking real-world systems. In this beginner-friendly guide, I’ll explain everything you need to set up your own ethical hacking lab at home — step by step. 🖥️ Hardware Requirements for an Ethical Hacking Lab Before installing any tools, make sure your computer can handle multiple virtual machines (VMs). PC or Laptop – At least 8GB RAM , 250GB+ storage , and a quad-core CPU . More is better. External HDD/SSD (Optional) – For storing VM files and backups. Wi-Fi Adapter (Recommended) – One that supports monitor mode and packet injection (e.g., Alfa AWUS036NHA). Optional Router/Switch – For hands-on networkin...

How to Completely Uninstall PowerShell Empire from Your Linux Machine

  How to Completely Uninstall PowerShell Empire from Your Linux Machine By Engr. Md. Jashim Uddin | Learn Cybersecurity PowerShell Empire is a powerful post-exploitation framework used by cybersecurity professionals and penetration testers. However, there are times when you need to completely uninstall it—whether for troubleshooting, upgrading, or simply cleaning your system. In this blog post, I will guide you through the step-by-step process to fully remove PowerShell Empire and its database from a Linux machine, so you can have a clean slate or reinstall it fresh without any leftover files or configurations. Why Uninstall PowerShell Empire? You want to reinstall Empire cleanly to fix installation issues. You need to free up system resources or remove unused tools. You want to ensure no residual data or configuration remains on your machine. Step 1: Stop PowerShell Empire Before uninstalling, ensure that Empire is not running. Use the following command to stop any...

🔓 Complete Guide to AndroRAT: Hack Android Devices Over LAN & Internet Using Python - Educational Purposes Only

Image
 ⚠️ Disclaimer : This tutorial is intended for educational and ethical hacking purposes only. Unauthorized access to devices is illegal. Use this tool only in a controlled environment or with explicit permission . 📌 What is AndroRAT? AndroRAT (Android Remote Administration Tool) is a powerful open-source tool that allows you to remotely access and control Android devices. It is commonly used by cybersecurity learners and ethical hackers to understand how remote access works on Android. AndroRAT is written in Python and works by creating a malicious APK file that, when installed on a target device, gives the attacker full control via a remote shell. 🎯 Features of AndroRAT           AndroRAT offers an impressive range of features once connected to a victim's phone: Access call logs, SMS, contacts Capture camera photos or record audio/video Track GPS location in real-time Send fake messages or toasts Even reboot the phone remotel...

MikroTik Bridge VLAN Filtering – Full Setup Tutorial for Secure Your Network

  MikroTik Bridge VLAN Filtering – Full Explanation with Configuration Bridge VLAN Filtering in MikroTik is essential when you're managing VLANs (Virtual LANs) using hardware offloading for high performance (using a bridge instead of a router). It's the modern and efficient method for VLAN management in RouterOS 6.41+ and RouterOS v7 . 🔐 What is Bridge VLAN Filtering? Bridge VLAN filtering allows you to isolate or segment traffic on different VLANs through one bridge interface , applying VLAN rules per-port efficiently. 🧱 Key Concepts for VLAN Filtering: Bridge: Logical switch combining multiple interfaces. VLAN: Virtual separation of Layer 2 domains. PVID (Port VLAN ID): Used for untagged incoming traffic. Tagged: Traffic with VLAN ID. Untagged: Plain Ethernet traffic. ✅ Example Scenario for the Mikrotik Configuration.  If We have: ether1 as uplink to trunk (to switch or another router) ether2 for VLAN 10 ether3 for VLAN 20 ?...

Apache Tomcat Upload Exploitation (Step-by-Step Guide)

Image
  Apache Tomcat Upload Exploitation (Step-by-Step Guide) 🎥 Watch the demonstration here : https://youtu.be/P8nlsRdKzT8 If you’re diving into web exploitation or pentesting Apache Tomcat servers, upload-based exploitation is one of the key techniques to understand. This method targets weak configurations where Tomcat allows file uploads (such as WAR files) that can be executed on the server—leading to Remote Code Execution (RCE) . In this blog post, we’ll walk through Apache Tomcat Upload Exploitation with clear steps and explanations. Whether you're learning ethical hacking or creating educational content, this walkthrough is a practical hands-on example. 🔧 Requirements Kali Linux or any attacker machine Apache Tomcat server (target) Valid Tomcat credentials (default or stolen) Metasploit (optional, but useful) ✅ Step 1: Access the Tomcat Manager Panel Tomcat’s web interface usually runs on: http://<target-ip>:8180/manager/html If credentials are know...

Discover and Exploit Samba Vulnerabilities with Metasploit – CVE-2007-2447 Explained

Image
  How to Discover Vulnerable Samba Shares with Metasploit  Before you dive into the attack you have to be vulnerable so if you use Kali linux you have to disable your filewall as below.  🔥 Using UFW (Uncomplicated Firewall) Check if UFW is installed and active:                               sudo ufw status                               To disable the firewall:                               sudo ufw disable      To make sure it doesn’t auto-start on boot (optional):                sudo systemctl disable ufw   🔥 Using iptables To flush (clear) all rules and effectively disable the firewall:            ...

Hide Your IP and Browse Anonymously on Android: How to Change Your Android Mobile IP Randomly

 Change your Android phone IP Randomly  This is only education purpose so do not use the technique for any harmful Activities.   Step 1: Confirm Root Access Before anything else, make sure your phone is properly rooted or not. It must be rooted. Install a root checker app from the Play Store (e.g. Root Checker ) Verify you have superuser access. Step 2: Install Orbot (Tor Proxy) Download Orbot from the official Tor Project site -https://www.torproject.org/download/ or the Play Store. Open Orbot Grant root access when prompted by SuperSU/Magisk Step 3: Enable Transparent Proxy (Root Mode) This is what enables system-wide Tor routing: Launch Orbot Tap the Settings icon Scroll down to "Transparent Proxying" Enable: "Tor Everything" "Enable Transparent Proxying"   "Request Root Access" This routes all traffic through Tor – including apps that don’t support proxies or VPNs.   📱 Step 4: (Opt...