wifite – Automated Wireless (wifi) Attack Auditor

Hacking Wifi

Wifite v2 is now available Get the latest version on Github What’s new in this version: support for cracking WPS-encrypted networks (via reaver) 2 new WEP attacks more accurate WPA handshake capture various bug fixes Version 2 does not include … Continue reading

How to Clone Any Website Using HTTrack (Hacking Tutorial)

Computer Hacker Fake Website

I have talked in past posts about how a person might redirect traffic intended for a real website, such as a facebook or maybe a bank site, to your fake website. Of course, to really make this work, you would … Continue reading

17 Actions for Staying Anonymous on the Internet

lawmakers-call-for-an-end-to-internet-anonymity-28d9f678d4

Prerequisites: Physical: Laptop, debian or other Linux install file Software: gcc, g++, make, libncurses5-dev, patch, srm, tor, proxychains, ssh, pidgin, pidgin-otr, wpa_supplicant, mac-address-changer Here, we will discuss a great number of things you can do to keep yourself as anonymous … Continue reading

How to Hack: Disable Antivirus on a Remote Computer

kill-antivirus

If you have been following the site, you know that I have highlighted a number of ways to gain access to a remote computer with rootkits and listeners, buffer overflows of the operating system, getting the victim to click on … Continue reading

Useful Linux WiFi Commands

wifi-hacker-ultimate

NOTE: NOT ALL CARDS/FIRMWARE SUPPORT ALL OF THE COMMANDS LISTED BELOW. Note: To connect your Linux machine to a WLAN using WPA, WPA2 or 802.1X you will need to use WPA Supplicant Connecting to an OPEN / WEP WLAN (DHCP) … Continue reading

How to Hack: Fingerprint Web Servers Using Httprint

server_room (1)

If you are following my site, you have undoubtedly read a few ways to identify what system a server is running. Probably the simplest way is to use netcat and connect to port 80 and pull the webserver banner. The … Continue reading

Find Openings in Firewalls with Firewalk in Linux/UNIX

firewall

Access control lists represent an important first line of defense on most networks, since they are commonly used on routers to limit the protocols allowed to pass to host systems behind the router. Firewalk is an open source tool that … Continue reading

Market Share of Hacking Targets

hacker_659px

My site is dedicated to further exploring the techniques and know-how of hacking the various operating systems and configurations a person might run into among the vast wilderness that is the internet. It has come to my attention that the … Continue reading

Passive Operating System Fingerprinting with p0f

p0f-fingerprinting

Passive fingerprinting works by quietly examining packets for patterns and not  sending data directly to a target host. Due to this passive analysis, the remote system will not be able to detect the packet capture. The process is completely passive … Continue reading

John the Ripper Basics Tutorial

john-1

I wrote this tutorial as best I could to try to explain to the newbie how to operate JTR. Remember, this is a newbie tutorial, so I won’t go into detail with all of the features. JTR is a program … Continue reading

15 Hacking Tools to Start Your Journey

largest-buyer-tools-hacking.si_-618x347

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although … Continue reading

Crack Wifi Encryption with Kali Linux – Fern Wifi Cracker for WEP Hacking

wifi_hack

Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial. First you … Continue reading

Want to Know How the Target Hackers Stole Your Credit Card?

target-2

As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely dampened Target’s Christmas … Continue reading

How to Pivot from Victim System to Owning the Network with Metasploit

cyber-attack

To own a network and retrieve the key data, we only need to find ONE weak link in the network. It makes little sense to beat our heads against heavily fortified systems like the file and database server when we … Continue reading

Tutorial: Crack Private and Public SNMP Passwords Using Onesixtyone on Kali

snmp

In a recent tutorial, I showed how the SNMP protocol can be a gold mine of information for reconnaissance on a potential target. If you haven’t already, I strongly suggest that you read it before progressing here, as little of … Continue reading

Using Netdiscover & ARP to Find LAN IP and MAC Addresses

tumblr_m9zwq9U46G1r5kin3o1_500

Quite often, people will ask me where they should start in Hacking. Oh my gosh! There are soooo many topics, subjects, ideas, things to memorize, things to mess with, etc… It is much too difficult to tell someone where to … Continue reading

Kali Linux: Goohost.sh extracts Hosts, IPs, or Email from Google

ski-mask-hacker-2

Goohost is a simple shell script written by Watakushi that extracts hosts/subdomains, ip or emails for a specific domain with Google search. Installation First create a directory for the installation $ mkdir -p /pentest/enumeration/google/goohost/ Then download the tool and make … Continue reading

Wordlists for Password Cracking and Other Brute Force Resources

Biggest password cracking wordlist

Brute Forcing and Dictionary Attacks are two methods of getting the same result, a password. Dictionary Cracking can mostly rely on the quality of your word list. Quite often, I have people ask me where they can get wordlists. It … Continue reading

How To Hack: Kali Linux Router Password Hack Using Medusa

medusa

Medusa is described as a “speedy, massively parallel, modular, login brute-forcer” with modules available to support almost any service that allows remote authentication using a password, including: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, POP3, PostgreSQL, SMTP-AUTH, Telnet and VNC. Medusa … Continue reading