Hacking Wifi: Cracking WEP with Kali Linux

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

How to Hack: Ultimate Metasploit Meterpreter Command Cheat Sheet

Many of you have probably heard about the MetaSploit Meterpreter Shell. A number of you have probably even used it. But some of you are probably wondering, “What are all the commands for Meterpreter?” Well, here we have a comprehensive … Continue reading

Robert Tappan Morris – Creator of the First Internet Worm

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet, and for companies he has founded. Morris … Continue reading

MafiaBoy Brings Down Yahoo, eBay, Amazon, and others…

MafiaBoy was the Internet alias of Michael Demon Calce, a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, … Continue reading

Documentary: Cybercops (2000)

Cybercops is a Channel 4 UK documentary first aired on December 21st 2000. The documentary explores threats to electronic commerce at the turn of the century and the work done by various private companies and law enforcement agencies to defend … Continue reading

How to Hack: Use Wireshark to Capture, Filter, and Inspect Packets

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets. This … Continue reading

Documentary: The Day of the Technopath (1989)

The October 11th, 1989 Dispatches episode – The Day of the Technopath – explores computer security threats of the era. This documentary is particularly interesting because very common problems today are discussed at their infancy: organized crime first experimenting with … Continue reading

How To Hack: Use WhatWeb for Domain and Web Server Reconnaissance

Introduction WhatWeb identifies websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 900 plugins, … Continue reading

How To Hack: Install Kali Linux on Raspberry Pi using Windows or Linux

Today, we are going to take a $40 computer and make a hack-machine out of it! Materials Needed Raspberry Pi Computer: I cannot believe how great the Raspberry Pi computer is! It is truly Ridiculous! This little $40 circuit board … Continue reading

How To Hack: Execute BAT File in the Background Invisibly

What happens when you double-click on a BAT file? Or, you run the BAT file from your commandeered cmd prompt? It pops up and runs! Now, we can’t be having the user see this, can we? A hacker also sometimes … Continue reading

How To Hack: Using dnsdict6 to Enumerate DNS Records (IP, NS, MX, Subdomains, etc)

INTRODUCTION If you want to gather information about a target’s DNS, you should probably use a tool like dnsdict6 to help you to enumerate many of the details which are not easily apparent for your average user or websurfer. With dnsdict6 you … Continue reading

How To Hack: Wafw00f Tutorial – Web Application Firewall Detection Tool

Introduction This is a Web Application Firewall Detection Tool. The tool was written by – Sandro Gauci And G. Henrique. It will help you detect the WAF ( Web Application Firewall )  behind the any domain. Wiffit (Wafw00f ) can … Continue reading

How to Hack: Bypassing Antivirus using Veil on Kali Linux

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux with the goal of: Bypass common AV solutions used. Get the payloads from Metasploit framework, and get the … Continue reading

How To Hack: LazyKali Hacking Script for Updated Kali and Easy Hacks

LazyKali is an awesome script written in bash shell. It can automate the whole update and install new tools in your hack repository. As the name suggests, you can get all the updates on Kali Linux and your repositories in … Continue reading

How To Hack: Using KARMA to Capture Clients as a Rogue Wifi Hotspot

“KARMA is a set of tools for assessing the security of wireless clients at multiple layers. Wireless sniffing tools discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames. From there, individual clients can be targeted … Continue reading

How To Hack: Exploit and Gain Remote Access to Windows XP (Metasploit)

Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean the same thing. When first looking at the Metasploit Framework, it can be a bit overwhelming with the … Continue reading