Quick Setup Vulnerable Web Application Lab

There are a lot of things to learn about Web application hacking and Penetration Testing. You can learn these things only by practicing those learnings in a private virtual environment. You can set up that virtual environment very quickly by following this article. Here we are going to build an isolated lab within your laptop or desktop with no extra hardware required. 

One-Liners Payload Delievery with Kali & Parrot-Sec OS's

Previously we discussed some of the ways through which we can transfer an advanced payload like meterpreter to the victim's machine during penetration testing and red teaming. Today we will see how quickly we can transfer these advanced payloads using some one-liners.

Tools used:
Kali OS
Python 2.7 | 3.7
PHP
Netcat

Create a FTP server to transfer Payloads with Kali Linux | Parrot-Sec OS

In this article, we will learn about creating an FTP server to transfer an advanced payload like meterpreter to the victim machine. This is very much convenient and reliable when transferring to the Windows machine as FTP client is already installed and enabled in all of them.

FTP:

FTP is an acronym of the file transfer protocol. This protocol allows us to upload and download a file from the FTP server with or without authentication. FTP works on TCP protocol, which provides a reliable means for the transfer of data.

TFTPD payload delievery | Create a TFTPD server and access it from victims machine | Advanced Penetration testing

In this article, you will be going to learn about how someone can deliver a more advanced payload like meterpreter on the victim 's box after getting an initial shell on the box with the help of the Advanced TFTP server, that is already installed on your Kali machine. This is a series of short articles, which will discuss major techniques of how to transfer an advanced payload on a victim machine after getting an initial shell on the box. In all these techniques one thing we have to imagine here is that we had an initial shell on the box, and we are trying to upload advanced payloads to the victim machine.