Posts

Showing posts from June, 2024

GhostTrack GitHub Tool Installation Step-by-Step (Beginner Tutorial)

GhostTrack GitHub Tool Installation Step-by-Step (Beginner Tutorial) 🧠 What is GhostTrack? GhostTrack is an open-source tracking tool for gathering information like IP, location, phone, and username data via various OSINT methods. It’s popular for security research and ethical hacking learning — but you must only run it on systems you own or with explicit permission .  🛠️ Prerequisites Before installing GhostTrack, make sure you have: Git (to clone the repository) Python 3 (required to run the tool) A Linux computer or Termux (Android) (Termux is a terminal app that lets you run Linux packages on Android).   📦 Step-by-Step Installation (Linux / Debian) Update & install basics sudo apt update && sudo apt upgrade sudo apt install git python3 python3-pip -y Clone GhostTrack git clone https://github.com/HunxByts/GhostTrack.git Enter the directory cd GhostTrack Install Python dependencies pip3 install -r requirements.txt Run the tool python3 GhostTR.py Once runni...

How Payloads Work (Metasploit)

Image
                      How Payloads Work Payload modules are stored in  modules/payloads/{singles,stages,stagers}/<platform> . When the framework starts up, stages are combined with stagers to create a complete payload that you can use in exploits. Then, handlers are paired with payloads so the framework will know how to create sessions with a given communications mechanism. Payloads are given reference names that indicate all the pieces, like so: Staged payloads:  <platform>/[arch]/<stage>/<stager> Single payloads:  <platform>/[arch]/<single> This results in payloads like  windows/x64/meterpreter/reverse_tcp . Breaking that down, the platform is  windows , the architecture is  x64 , the final stage we’re delivering is  meterpreter , and the stager delivering it is  reverse_tcp . Note that architecture is optional because in some cases it is either ...