Compiling the Linux Kernel (on Ubuntu)

This guide may not exactly be relevant to this blog, but as an exercise in getting familiar with Linux, I’ll post it anyways. Here are a few disclaimers- Don’t follow this guide for compiling linux kernel, there are much better … Continue reading

Coleco Adam (1983)

The Coleco Adam is a home computer, and expansion for the ColecoVision (port 3), released in 1983 by American toy and video game manufacturer Coleco Industries, Inc.. It was an attempt to follow on the success of the company’s ColecoVision video game console. The Adam was not very successful, partly … Continue reading

Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less and less viable options for penetration testers as ISPs replace vulnerable routers, there becomes fewer certainties about which tools will work against a particular target. If you don’t have time to crack the … Continue reading

Spoof Your MAC Address on Windows

How to Spoof MAC Address on Windows OS Now I’m sure you know what MAC addresses are and what MAC spoofing is, let us take a look at how we can spoof our MAC address on Windows. (You can also spoof your MAC … Continue reading

Metasploitable 3: Meterpreter Port Forwarding

In this Metasploitable 3 Meterpreter Port forwarding hacking instructional exercise we will figure out how to forward local ports that can’t be gotten to remotely. It is normal and great practice to run particular services on a local machine and … Continue reading

Hack Like a Pro: How to Extract Email Addresses from an SMTP Server

If we are considering a social engineering attack against a target, we are probably going to need email addresses. By having the email addresses of people within an organization, we can tailor our social engineering attack to particular people and … Continue reading

How to Hack Wi-Fi: Evading an Authentication Proxy Using ICMPTX

In previous Wi-Fi hacking tutorials, I have shown you ways to create an Evil Twin, to DoS a wireless AP, and to crack WEP and WPA2 passwords, but in this tutorial, I will show you something a little bit different. … Continue reading

How to Crack WPA / WPA2 with Wifite

Hi there again, aspiring hackers (and veterans as well)! I’m going to explain how to perform a dictionary attack on a WPA/WPA2 protected network with Wifite. Please note that this doesn’t work with WPA Enterprise For that end, you’d have … Continue reading

DNS Spoofing / ARP poisoning for advanced SEToolkit attacks

So, what is DNS spoofing? How can you take advantage of ARP poisoning? Let’s find out! DNS Spoofing/ARP poisoning A couple of weeks ago, we posted an article on  how to acquire a user’s Facebook credentials, using SEToolkit. This article is … Continue reading

wifite – Automated Wireless (wifi) Attack Auditor

Hacking Wifi

Wifite v2 is now available Get the latest version on Github What’s new in this version: support for cracking WPS-encrypted networks (via reaver) 2 new WEP attacks more accurate WPA handshake capture various bug fixes Version 2 does not include … Continue reading

How to Clone Any Website Using HTTrack (Hacking Tutorial)

Computer Hacker Fake Website

I have talked in past posts about how a person might redirect traffic intended for a real website, such as a facebook or maybe a bank site, to your fake website. Of course, to really make this work, you would … Continue reading

17 Actions for Staying Anonymous on the Internet

Prerequisites: Physical: Laptop, debian or other Linux install file Software: gcc, g++, make, libncurses5-dev, patch, srm, tor, proxychains, ssh, pidgin, pidgin-otr, wpa_supplicant, mac-address-changer Here, we will discuss a great number of things you can do to keep yourself as anonymous … Continue reading

How to Hack: Disable Antivirus on a Remote Computer

If you have been following the site, you know that I have highlighted a number of ways to gain access to a remote computer with rootkits and listeners, buffer overflows of the operating system, getting the victim to click on … Continue reading

Useful Linux WiFi Commands

NOTE: NOT ALL CARDS/FIRMWARE SUPPORT ALL OF THE COMMANDS LISTED BELOW. Note: To connect your Linux machine to a WLAN using WPA, WPA2 or 802.1X you will need to use WPA Supplicant Connecting to an OPEN / WEP WLAN (DHCP) … Continue reading

How to Hack: Fingerprint Web Servers Using Httprint

If you are following my site, you have undoubtedly read a few ways to identify what system a server is running. Probably the simplest way is to use netcat and connect to port 80 and pull the webserver banner. The … Continue reading

Find Openings in Firewalls with Firewalk in Linux/UNIX

Access control lists represent an important first line of defense on most networks, since they are commonly used on routers to limit the protocols allowed to pass to host systems behind the router. Firewalk is an open source tool that … Continue reading

Market Share of Hacking Targets

My site is dedicated to further exploring the techniques and know-how of hacking the various operating systems and configurations a person might run into among the vast wilderness that is the internet. It has come to my attention that the … Continue reading