Passive Operating System Fingerprinting with p0f

Passive fingerprinting works by quietly examining packets for patterns and not  sending data directly to a target host. Due to this passive analysis, the remote system will not be able to detect the packet capture. The process is completely passive … Continue reading

15 Hacking Tools to Start Your Journey

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although … Continue reading

Tutorial: theHarvester – Collect a Company’s Email Addresses, Subdomains, Related Servers

The information gathering steps of footprinting and scanning are of utmost importance. Good information gathering can make the difference between a successful penetration test and one that has failed to provide maximum benefit to the client. We can say that … Continue reading

How To Hack: Install Kali Linux on Raspberry Pi using Windows or Linux

Today, we are going to take a $40 computer and make a hack-machine out of it! Materials Needed Raspberry Pi Computer: I cannot believe how great the Raspberry Pi computer is! It is truly Ridiculous! This little $40 circuit board … Continue reading

How To Hack: Using Netcat

For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it’s virtually unknown outside. It’s so … Continue reading

FOCA: Target Information Gathering with Metadata

Metadata is an interesting and often unrealized problem for anyone who uses office applications, like Microsoft Office, OpenOffice, and Adobe Acrobat. Its impact is often misunderstood both from the publicity and security standpoint. On one hand, metadata provides the necessary … Continue reading

How to setup DarkComet RAT for Easy Access to a Target Computer

Note: In this format, the RAT program will quite easily be detected by anti-virus software. In order to evade such detection you will have to crypto the DarkComet RAT. It must become undetectable in order to use stealthily. Or, the … Continue reading