Saturday, 24 September 2016

Using WireShark

Use Wireshark to Sniff traffic-

1. Download and install the latest stable version of Wireshark from

Using OPH crack

Use Ophcrack -

1. Download and install ophcrack from

2. Run the ophcrack program and set the number of threads under the


Using netcat-

Download a version of Netcat for your system.

There are many versions of Netcat for all Windows OSs. Also, Netcat

Simple password guessing script

To create a simple automated password-guessing script, perform the following steps:

1.Create a simple username and password file using Windows Notepad.
Automated tools such as the Dictionary Generator are available to create this word list. Save the file on the C: drive as credentials.txt.

Type of NMAP Scans and using them

Nmap scan type Description -

TCP connect -

The attacker makes a full TCP connection to the target system. The most reliable scan type but also the most detectable. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK.

XMAS tree scan-


Hiding Files Using NTFS File Streaming-


This exercise will only work on systems using the NTFS file system. duhhh

To create and test an NTFS file stream:

1. At the command line, enter notepad test.txt.

2. Put some data in the file, save the file, and close Notepad. Step 1 will open Notepad.


This is risky and only for educational reason

Friday, 23 September 2016

Using BRUTUS. Basic tutorial

Here is a tutorial to bruteforcing a login page. It is with step wise step with instructions

Saturday, 17 September 2016

CCTV/IP camera hacking with Shodan

Here is a step by step tutorial on how to hack CCTV cameras within 10 minutes. This is only for educational purpose. 

Sunday, 11 September 2016

Enumeration in Hacking

Enumeration is defined as a process which establishes an active

How TOR works

Many of is use TOR browser and the network.

But how does Tor work?

The Tor network runs through the computer servers of thousands of volunteers (over 4,500 at time of publishing) spread throughout the world. Your data is bundled into an encrypted packet when it enters the Tor network. Then,

Friday, 9 September 2016

MAC changer in Kali Linux

Some times we need to spoof.

So here is a quick tutorial on MAC Address Spoofing in Kali Linux.

First we need to take down the network adapter in order to change the MAC address. This can be done using the following command:

ifconfig wlan1 down

Replace wlan1 with your own network interface.

Port Numbers are very important in Hacking.

Open ports are a fun for hacking monks.

Here are some important ports and their port numbers.

Be sure to memorize them -)


Thursday, 8 September 2016

Banner Grabbing with windows cmd.

Banner Grabbing using Windows Command line. Easy method :

Steps :-

Kali Commands for beginners.

Want to be a pro ???? Dud you really need to get your basics right. 
Start with the terminals.

All commands (A-Z) for Kali Linux here:

apropos Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian/Ubuntu)
aptitude Search for and install software packages (Debian/Ubuntu)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index
basename Strip directory and suffix from filenames

Some Google dorks for you

10000 New Google Dorks



Monday, 5 September 2016

Spy Earpiece Bug

There are many earpiece bugs on the market. But they are not invincible. What i got here will blow your mind.

So its like this, its freaking incredibly small so no one can notice

Friday, 2 September 2016

Parot Security OS installation step by step

I can not differentiate this with Kali Linux. Although its not a clone of Kali. That proves that Kali is the mother of all hacking OS