Friday, 30 September 2016

Hacks - Kali Linux supporting phones and tablets


Thanx to Kali Linux Nethunter we now get a chance to hack with our mobile phones.


Its always Kali on the way right ...

Saturday, 24 September 2016

Using WireShark



Use Wireshark to Sniff traffic-

1. Download and install the latest stable version of Wireshark from www.wireshark.org.

Using OPH crack



Use Ophcrack -

1. Download and install ophcrack from http://ophcrack.sourceforge.net/.

2. Run the ophcrack program and set the number of threads under the

Using NETCAT



Using netcat-

Download a version of Netcat for your system.

There are many versions of Netcat for all Windows OSs. Also, Netcat

Simple password guessing script




To create a simple automated password-guessing script, perform the following steps:

1.Create a simple username and password file using Windows Notepad.
Automated tools such as the Dictionary Generator are available to create this word list. Save the file on the C: drive as credentials.txt.

Type of NMAP Scans and using them



Nmap scan type Description -

TCP connect -

The attacker makes a full TCP connection to the target system. The most reliable scan type but also the most detectable. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK.

XMAS tree scan-

Hide NTFS



Hiding Files Using NTFS File Streaming-

Note:

This exercise will only work on systems using the NTFS file system. duhhh

To create and test an NTFS file stream:

1. At the command line, enter notepad test.txt.

2. Put some data in the file, save the file, and close Notepad. Step 1 will open Notepad.

Access DEEP WEB


This is risky and only for educational reason


Friday, 23 September 2016

Using BRUTUS. Basic tutorial


Here is a tutorial to bruteforcing a login page. It is with step wise step with instructions


Tuesday, 20 September 2016

Hack anything with hardware Key Loggers


Hardware Keyloggers are same as software key loggers. But there is always a catch right.....



The hardware keylogger stores the key strokes (what has typed in the computer or phone). And sends it to you by mail.

Saturday, 17 September 2016

CCTV/IP camera hacking with Shodan


Here is a step by step tutorial on how to hack CCTV cameras within 10 minutes. This is only for educational purpose. 


Sunday, 11 September 2016

Enumeration in Hacking



Enumeration is defined as a process which establishes an active

How TOR works



Many of is use TOR browser and the network.

But how does Tor work?

The Tor network runs through the computer servers of thousands of volunteers (over 4,500 at time of publishing) spread throughout the world. Your data is bundled into an encrypted packet when it enters the Tor network. Then,

Friday, 9 September 2016

MAC changer in Kali Linux



Some times we need to spoof.

So here is a quick tutorial on MAC Address Spoofing in Kali Linux.

First we need to take down the network adapter in order to change the MAC address. This can be done using the following command:

ifconfig wlan1 down

Replace wlan1 with your own network interface.

Port Numbers are very important in Hacking.



Open ports are a fun for hacking monks.

Here are some important ports and their port numbers.

Be sure to memorize them -)

FTP-21
Telnet-23
HTTP-80
SMTP-25

Thursday, 8 September 2016

Banner Grabbing with windows cmd.



Banner Grabbing using Windows Command line. Easy method :


Steps :-

Kali Commands for beginners.



Want to be a pro ???? Dud you really need to get your basics right. 
Start with the terminals.

All commands (A-Z) for Kali Linux here:

a
apropos Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian/Ubuntu)
aptitude Search for and install software packages (Debian/Ubuntu)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index
b
basename Strip directory and suffix from filenames

Some Google dorks for you




10000 New Google Dorks

Enjoy

index.php?id=
trainers.php?id=
buy.php?category=
article.php?ID=
play_old.php?id=
declaration_more.php?decl_id=
pageid=
games.php?id=
page.php?file=
newsDetail.php?id=
gallery.php?id=
show.php?id=
staff_id=
newsitem.php?num=
readnews.php?id=
top10.php?cat=
historialeer.php?num=

Monday, 5 September 2016

Spy Earpiece Bug

There are many earpiece bugs on the market. But they are not invincible. What i got here will blow your mind.



So its like this, its freaking incredibly small so no one can notice

Saturday, 3 September 2016

Power Fuzzer Website Scanning tool


In Kali we have this GUI tool named Power Fuzzer which scans websites for vulnerability. This is amazing guys.



Mr.Robot T-Shirts


If you haven't watched this series then you better watch it now. Mr.Robot is the best Hacking TV series ever. 


Friday, 2 September 2016

Parot Security OS installation step by step


I can not differentiate this with Kali Linux. Although its not a clone of Kali. That proves that Kali is the mother of all hacking OS