Hackercool 2024 03.pdf

(11455 KB) Pobierz
Simplifying Cyber Security since 2016
HACKERCOOL
March 2024 Edition 7 Issue 3
Learn how Black Hat Hackers hack
Hacking MSSQL servers
in
BLACK HAT HACKING
GAINING ACCESS
Create your own HTA file to download and
execute your chosen payload.
EXPLOIT WRITING
Creating a simple server and client in Python
TOOL OF THE MONTH
Medusa password cracker: complete guide
2
Copyright
©
2016
-
2024 Hackercool CyberSecurity (OPC) Pvt Ltd
All rights reserved. No part of this publication may be reproduced, distributed, or
transmitted in any form or by any means, including photocopying, recording, or other
electronic or mechanical methods, without the prior written permission of the
publishe -r, except in the case of brief quotations embodied in critical reviews and
certain other noncommercial uses permitted by copyright law. For permission
requests, write to the publisher, addressed “Attention: Permissions Coordinator,” at
the address below.
Any references to historical events, real people, or real places are used fictitiously. Na
-mes, characters, and places are products of the author’s imagination.
Hackercool Cybersecurity (OPC) Pvt Ltd.
Banjara Hills, Hyderabad 500034
Telangana, India.
Website :
www.hackercoolmagazine.com
Email Address :
admin@hackercoolmagazine.com
3
In fo rm a tio n p ro v id ed in this M agazine is
strictly fo r e d u c a tio n a l p u rp o se only.
Please d o n 't m isuse this know ledge
to hack into devices o r netw orks w ith o u t
ta k in g perm ission. T h e M agazine will not
take any responsibility fo r m isuse o f this
in fo rm a tio n .
4
Then you will know the truth and the truth will set you free.
John 8:32
Editor's Note
Edit ion
7
Issue
3
Hello readers,
Welcome to the third issue of year 2024. The temperature is getting hot and so
does Black Hat Hacking. Lame poetry aside, let’s see what you will learn in our
latest Issue. We start this Issue with a Black Hat Hacking scenario named “Hacki
ng MSSQL servers”. MSSQL servers are one of the most widely used database
software around the world?Black Hat Hackers have been compromising
MSSQL servers since long time may be since 2016. However, it is not vulnerabili
-ties they are exploiting.
Why are hackers making MSSQL their targets? MSSQL is installed on a
Windows machine and compromising it can give them access to the underlying
Windows system. The second reason oeing that it is easy to hack them. Next,
you will learn how to create an HTA file that downloads and executes your chos
-en pavloads. Note that we are not talking about creating HTA file with msfveno-
m tool. If you want to be a Black Hat Hacker, you have to learn how to create
some files manually.
Next, we bring you a complete guide on another popular password cracker
named Medusa. Then, we move on to the first Exploit Writing feature of year
2024. Breaking the norm until now, in this feature we will show you how to creat
-e a simple server and client and initiate a connection between tnem. This will
help our readers understand how to establish connections to remote devices on
internet using Python.
In this Issue, we have also included a Beginner basics article on Encryption.
Encryption plays a very significant role in ethical hacking. This is a foundational
article in which we will be giving you a detailed explanation as to what is encryp
-tion, types of encryption techniques and where they used in ethical hacking.
Last but not least, we bring our readers information about thelatest
vulnerability affecting almost all CPUs in use around the world. Enjoy reading it
as much as we enjoyed preparing it.
Kalyan Chinta,
Founder, Hackercool Magazine
THERE IS A RISE IN USE OF SVG FILES BY HACKERS TO DELIVER THEIR CHOSEN
PAYLOADS.
5
INSIDE
See what our Hackercool Magazine's March 2024 Issue has in store for you.
1. Black Hat Hacking:
Hacking MS-SQL servers
2. Gaining Access:
Creating your own HT A file to download and execute chosen payloads.
3. Tool Of The Month:
Medusa password cracker.
4. Exploit Writing:
Clearing a simple server and client in Python.
5. Beginner Basics:
Encryption.
6. Vulnerability for beginners:
Ghost Race.
7. Cybersecurity:
Are private conversations truly private? A cybersecurity expert explains how end-
to-end encryption protects you.
Other Useful Resources
Zgłoś jeśli naruszono regulamin