![]() ![]() We will copy this bash command which I will paste into my parrot OS machine. In this, I have entered the kali machines IP and port which we will be using for listening to get the reverse shell. Let’s now see how we can use an exploit to get a reverse shell of Parrot OS machine on a kali machine. You can use the payload based on the language used by the webpage or by the OS used by its server. In this, there are various reverse shells present for different systems. When you will open the extension, you will be presented with the Reverse Shell. We will look for which of these can be useful and when. ![]() When you open up the extension you will see that there are various options present on the left-hand side of the extension. There are various services provided by this extension. If you are interested in viewing its source code then click here. Similarly, you can get this extension on your google chrome by clicking here. ![]() You will get a prompt to add that extension to Firefox just press the Add buttonĪfter this, you will see that extension has been added to firefox. For Firefox, visit the linkand then click on add to Firefox button: You can simply visit their extension website or add on the store of the browser and search for hacktool over there to add this extension to your browser. Hacktool extension is available for both Google Chrome and Mozilla Firefox. So, let’s start to explore all the functionalities that are provided by this extension. So, what if we can get all the payload in one place so that you don’t have to hop from one site to another? For that, we have got a great extension called Hacktool that provides us with a cheat sheet that is very useful in performing web penetration testing. It’s very hard for a bug bounty hunter or a web application pentester to remember all the codes or to search for different payloads by searching it over google. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |