John the Ripper Basics Tutorial

I wrote this tutorial as best I could to try to explain to the newbie how to operate JTR. Remember, this is a newbie tutorial, so I won’t go into detail with all of the features. JTR is a program … Continue reading

Crack Wifi Encryption with Kali Linux – Fern Wifi Cracker for WEP Hacking

Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial. First you … Continue reading

Wordlists for Password Cracking and Other Brute Force Resources

Brute Forcing and Dictionary Attacks are two methods of getting the same result, a password. Dictionary Cracking can mostly rely on the quality of your word list. Quite often, I have people ask me where they can get wordlists. It … Continue reading

Historical Hacking Philes: Improving the Security of Your Site by Breaking Into it (1993)

Dan Farmer Wietse Venema Sun Microsystems Eindhoven University of Technology 2550 garcia ave MS PAL1-407 P.O. Box 513, 5600 MB Mountain View CA 94043 Eindhoven, NL zen@sun.com wietse@wzv.win.tue.nl Introduction ———— Every day, all over the world, computer networks and hosts … Continue reading

Mimikatz: Windows Powershell Script for Dumping Local and Domain Passwords

clymb3r recently posted a script called “Invoke-Mimikatz.ps1” basically what this does is reflectively injects mimikatz into memory, calls for all the logonPasswords and exits. It even checks the targets architecture (x86/x64) first and injects the correct DLL. This is really … Continue reading

Hacking Wifi: Cracking WEP with Kali Linux

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

How to Hack: Use Wireshark to Capture, Filter, and Inspect Packets

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets. This … Continue reading

How To Hack: Online Dictionary Attack with Hydra

1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading

Four Ways Hackers Crack a Facebook Password and How to Protect Yourself

Everyone is addicted to Facebook. Admit it, your Mom and your Brother are on it and as soon as you turn 13, you will be signing up too! Lol, j/k… This has led Facebook to break record numbers with over … Continue reading

Hack Windows 7 / Windows 8 Password Easily, No extra tool or software!

Video: Check out UltimatePeter’s Facebook! First, you will start up the computer (or restart it). While the computer is coming up and you can see it saying, “Starting Windows,” grab and hold down the power button until it does a … Continue reading