Spoof Your MAC Address on Windows

How to Spoof MAC Address on Windows OS Now I’m sure you know what MAC addresses are and what MAC spoofing is, let us take a look at how we can spoof our MAC address on Windows. (You can also spoof your MAC … Continue reading

wifite – Automated Wireless (wifi) Attack Auditor

Hacking Wifi

Wifite v2 is now available Get the latest version on Github What’s new in this version: support for cracking WPS-encrypted networks (via reaver) 2 new WEP attacks more accurate WPA handshake capture various bug fixes Version 2 does not include … Continue reading

How to Clone Any Website Using HTTrack (Hacking Tutorial)

Computer Hacker Fake Website

I have talked in past posts about how a person might redirect traffic intended for a real website, such as a facebook or maybe a bank site, to your fake website. Of course, to really make this work, you would … Continue reading

17 Actions for Staying Anonymous on the Internet

Prerequisites: Physical: Laptop, debian or other Linux install file Software: gcc, g++, make, libncurses5-dev, patch, srm, tor, proxychains, ssh, pidgin, pidgin-otr, wpa_supplicant, mac-address-changer Here, we will discuss a great number of things you can do to keep yourself as anonymous … Continue reading

How to Hack: Fingerprint Web Servers Using Httprint

If you are following my site, you have undoubtedly read a few ways to identify what system a server is running. Probably the simplest way is to use netcat and connect to port 80 and pull the webserver banner. The … Continue reading

Find Openings in Firewalls with Firewalk in Linux/UNIX

Access control lists represent an important first line of defense on most networks, since they are commonly used on routers to limit the protocols allowed to pass to host systems behind the router. Firewalk is an open source tool that … Continue reading

Passive Operating System Fingerprinting with p0f

Passive fingerprinting works by quietly examining packets for patterns and not  sending data directly to a target host. Due to this passive analysis, the remote system will not be able to detect the packet capture. The process is completely passive … Continue reading

John the Ripper Basics Tutorial

I wrote this tutorial as best I could to try to explain to the newbie how to operate JTR. Remember, this is a newbie tutorial, so I won’t go into detail with all of the features. JTR is a program … Continue reading

Crack Wifi Encryption with Kali Linux – Fern Wifi Cracker for WEP Hacking

Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial. First you … Continue reading

How to Pivot from Victim System to Owning the Network with Metasploit

To own a network and retrieve the key data, we only need to find ONE weak link in the network. It makes little sense to beat our heads against heavily fortified systems like the file and database server when we … Continue reading

Using Netdiscover & ARP to Find LAN IP and MAC Addresses

Quite often, people will ask me where they should start in Hacking. Oh my gosh! There are soooo many topics, subjects, ideas, things to memorize, things to mess with, etc… It is much too difficult to tell someone where to … Continue reading

Kali Linux: Goohost.sh extracts Hosts, IPs, or Email from Google

Goohost is a simple shell script written by Watakushi that extracts hosts/subdomains, ip or emails for a specific domain with Google search. Installation First create a directory for the installation $ mkdir -p /pentest/enumeration/google/goohost/ Then download the tool and make … Continue reading

Wordlists for Password Cracking and Other Brute Force Resources

Brute Forcing and Dictionary Attacks are two methods of getting the same result, a password. Dictionary Cracking can mostly rely on the quality of your word list. Quite often, I have people ask me where they can get wordlists. It … Continue reading

How To Bypass Antivirus Detection – Making An Executable FUD

So in this tutorial we will show you step by step on how to make a virus Fully Undetectable from all the antiviruses. Their are lots of approaches, however here we will take a look at how to make an executable FUD … Continue reading

Mimikatz: Windows Powershell Script for Dumping Local and Domain Passwords

clymb3r recently posted a script called “Invoke-Mimikatz.ps1” basically what this does is reflectively injects mimikatz into memory, calls for all the logonPasswords and exits. It even checks the targets architecture (x86/x64) first and injects the correct DLL. This is really … Continue reading

How To Hack: Creating an iOS7 Application Pentesting Environment

Now that you have your shiny new Evasion7 jailbreak running it’s time to set up the environment for application testing! Getting in Since mobile substrate is not working yet we will focus on getting our idevice up and running as … Continue reading

How To Hack: Exploit SNMP for Reconnaissance

The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). … Continue reading

How to Hack: Snatch the Sysadmin Password from Remote Desktop Protocol (RDP)

One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack … Continue reading

Kali Linux on Android Using Linux Deploy

Kali Linux on any Android Phone or Tablet Getting Kali Linux to run on ARM hardware has been a major goal since day one. So far, there have been native images built for the Samsung Chromebook, Odroid U2, Raspberry Pi, … Continue reading

Historical Hacking Philes: A Beginners Guide to Hacking Unix by Jester Sluggo (1985)

************************************** * A beginners guide to: * * H A C K I N G * * * * U N I X * * * * By Jester Sluggo * * Written 10/08/85 * ************************************** In the following file, … Continue reading