Have you ever had that feeling that someone is following you? In this video I am going to show you how easy it is for a hacker to use a combination of social engineering and a Python tool called Seeker, to deceive their victims into revealing their exact location data by tapping into the GPS…
Category: Red Team/Pen Testing
How hackers launch phishing attacks (Social Engineering) 🎣
In this video we will go on a little phishing trip! I will show you a two phased approach how a hacker can potentially launch a phishing attack against their victims. We will be using two tool, the first is ZPhisher, a phishing automation script, that allows us to host various login pages to harvest…
Enumerate Users & Brute Force Attack WordPress using WPScan
In this video we explore WPScan’s ability to enumerate usernames and brute force attack a vulnerable WordPress website using Kali Linux. We will also discuss possible mitigation techniques in the form of strong, unpredictable usernames and passwords, as well as explore a popular web application firewall (WAF) call Wordfence that can be used to further…
Using WPScan to Scan WordPress Sites & Setup RCE Attacks
With WordPress being as popular as it is, with and estimated 43% of websites online today using this content management system. It is super important that we as cybersecurity professionals know how to scan for vulnerabilities and protect against the many attacks these websites face on a daily basis. In this video I will show…