How To Hack: Execute BAT File in the Background Invisibly

What happens when you double-click on a BAT file? Or, you run the BAT file from your commandeered cmd prompt? It pops up and runs! Now, we can’t be having the user see this, can we? A hacker also sometimes … Continue reading

How To Hack: Using dnsdict6 to Enumerate DNS Records (IP, NS, MX, Subdomains, etc)

INTRODUCTION If you want to gather information about a target’s DNS, you should probably use a tool like dnsdict6 to help you to enumerate many of the details which are not easily apparent for your average user or websurfer. With dnsdict6 you … Continue reading

How To Hack: Wafw00f Tutorial – Web Application Firewall Detection Tool

Introduction This is a Web Application Firewall Detection Tool. The tool was written by – Sandro Gauci And G. Henrique. It will help you detect the WAF ( Web Application Firewall )  behind the any domain. Wiffit (Wafw00f ) can … Continue reading

How to Hack: Bypassing Antivirus using Veil on Kali Linux

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux with the goal of: Bypass common AV solutions used. Get the payloads from Metasploit framework, and get the … Continue reading

How To Hack: LazyKali Hacking Script for Updated Kali and Easy Hacks

LazyKali is an awesome script written in bash shell. It can automate the whole update and install new tools in your hack repository. As the name suggests, you can get all the updates on Kali Linux and your repositories in … Continue reading

How To Hack: Using KARMA to Capture Clients as a Rogue Wifi Hotspot

“KARMA is a set of tools for assessing the security of wireless clients at multiple layers. Wireless sniffing tools discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames. From there, individual clients can be targeted … Continue reading

How To Hack: Exploit and Gain Remote Access to Windows XP (Metasploit)

Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean the same thing. When first looking at the Metasploit Framework, it can be a bit overwhelming with the … Continue reading

WiFi Pineapple Mark V Unboxing – Hak5 Portable Hacking Tool

The WiFi Pineapple Mark V is the latest generation wireless network auditing tool from Hak5. With its custom, purpose built hardware and software, the WiFi Pineapple enable users to quickly and easily deploy advanced attacks using our intuitive web interface. … Continue reading

How To Hack: Embed a Backdoor Connection in an Innocent-Looking PDF

While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we’ll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in … Continue reading

How To Hack: Use MS Word to Embed a Listener on a Remote Computer

As web server and OS’s have become hardened and living behind significant perimeter defenses, hackers have migrated to the easiest route to the pot of gold. This is through the often unpatched, unhardened client-side system with little in the way … Continue reading

How To Hack: Online Dictionary Attack with Hydra

1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading

How To Hack: Using Netcat

For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it’s virtually unknown outside. It’s so … Continue reading

Four Ways Hackers Crack a Facebook Password and How to Protect Yourself

Everyone is addicted to Facebook. Admit it, your Mom and your Brother are on it and as soon as you turn 13, you will be signing up too! Lol, j/k… This has led Facebook to break record numbers with over … Continue reading

How to setup DarkComet RAT for Easy Access to a Target Computer

Note: In this format, the RAT program will quite easily be detected by anti-virus software. In order to evade such detection you will have to crypto the DarkComet RAT. It must become undetectable in order to use stealthily. Or, the … Continue reading

How To Use Zenmap in Kali Linux! Scan local network for victims or intruders! Find open ports!

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced … Continue reading

Hack Windows 7 / Windows 8 Password Easily, No extra tool or software!

Video: Check out UltimatePeter’s Facebook! First, you will start up the computer (or restart it). While the computer is coming up and you can see it saying, “Starting Windows,” grab and hold down the power button until it does a … Continue reading

Kevin Mitnick: World’s Most Famous Hacker

Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, convicted criminal, and hacker. In the late 20th century, he was convicted of various computer and communications-related crimes. At the time of his arrest, he … Continue reading

Most Sophisticated Mobile Trojan Ever Found – Android Malware Anatomy Revealed

Android-Virus

Security firm Kaspersky has reported what they claim to be the most sophisticated Trojan ever found targeting a mobile platform. Google has already been informed of the details and a new fix can be swiftly expected. Nicknamed the “Backdoor.AndroidOS.Obad.a” – … Continue reading

[How To] Bypass Win7 Password, Decrypt Win7 Password HASH, & Lift Firefox Passwords

So, this took a while for me to put together, but it worked out good. Refer below for further resource. I will am tryin to get my hands on the v2.2 so I can post another Tut for Win8. Otherwise, … Continue reading

(How To) Kali Linux: Intercept Secure Passwords from HTTPS SSL with Ettercap and sslstrip

Here I will be showing how to setup ettercap settings on Kali Linux, then we will proceed to do a man in the middle attack on a wireless network. I will be using ettercap and sslstrip to do this. The … Continue reading