In case of multiple websites using a single IP, and we have been asked to perform vulnerability assessment to ensure its security, how many to target

When doing black-box vulnerability assessment (with permission of course) of a subdomain of a website, the first step is enumeration; and the first step of that is finding IP of the subdomain.
If you find this IP, and then upon performing … Continue reading In case of multiple websites using a single IP, and we have been asked to perform vulnerability assessment to ensure its security, how many to target

Web application discovery: Can there be virtual hosts configured even when there is a response without host header?

I’m currently learning how to discover web applications running on a machine using port scanning, vhost bruteforcing and directory fuzzing. When it comes to port scanning, there is one thing I can’t wrap my head around.
Let’s say I have sc… Continue reading Web application discovery: Can there be virtual hosts configured even when there is a response without host header?

What is the difference between Dual bootable Kali linux and Virtual environment? [duplicate]

I am new to kali linux and to ethical hacking on general..
And i saw alot of people that have downloaded kali linux as dual bootable with windows 10
And some of them just used a vmware or virtual box to make the virtual environment for kal… Continue reading What is the difference between Dual bootable Kali linux and Virtual environment? [duplicate]

How one can find I am using virtual box Virtual Machine linux through Anydesk remote application?

I recently created a virtualbox virtual machine of Ubuntu 18.04 and installed Anydesk remote desktop app in it. An IT guy accessed my computers desktop via Anydesk app, but he is actually inside the Ubuntu Virtual Machine on Virtualbox. I … Continue reading How one can find I am using virtual box Virtual Machine linux through Anydesk remote application?