Mimikatz: Windows Powershell Script for Dumping Local and Domain Passwords

powershell_2

clymb3r recently posted a script called “Invoke-Mimikatz.ps1” basically what this does is reflectively injects mimikatz into memory, calls for all the logonPasswords and exits. It even checks the targets architecture (x86/x64) first and injects the correct DLL. This is really … Continue reading

How to Hack: Snatch the Sysadmin Password from Remote Desktop Protocol (RDP)

cain-rdp

One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack … Continue reading

Kali Linux on Android Using Linux Deploy

kali-android-deploy

Kali Linux on any Android Phone or Tablet Getting Kali Linux to run on ARM hardware has been a major goal since day one. So far, there have been native images built for the Samsung Chromebook, Odroid U2, Raspberry Pi, … Continue reading

All About Dos Attacks – Hacking Tutorials And Lessons

distributed-denial-of-service

The effects of a ping flood attack A person can get all excited when they learned to ping flood (Denial of Service) someone for the first time. The thought of having the power to slow someone’s network speed down might … Continue reading

Historical Hacking Philes: A Beginners Guide to Hacking Unix by Jester Sluggo (1985)

A-BEGINNERS-GUIDE-TO-Hacking-Unix-740x230

************************************** * A beginners guide to: * * H A C K I N G * * * * U N I X * * * * By Jester Sluggo * * Written 10/08/85 * ************************************** In the following file, … Continue reading

Wireless Security: Everything you ever needed to know about Wifi Hacking

71zv9N8F-qL._SL500_AA300_

The following is a very thorough and concise overview of Wifi Security. I think it will be very important for my fellow Security Hacker / Pen Testers to have this knowledge stored away somewhere in the back of their head. … Continue reading

Hacking Tricks: LANs.py – Packet Parsing/Injecting ARP Poisoner

One_Byte_at_a_Time

LANs.py: (Download at Github) Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can … Continue reading

Book: Hacking, 2nd Edition by No Starch Press

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really … Continue reading

Hacking Wifi: Cracking WEP with Kali Linux

wifi-hacking

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

How to Hack: Use Wireshark to Capture, Filter, and Inspect Packets

wireshark-logo

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets. This … Continue reading

How To Hack: Execute BAT File in the Background Invisibly

Batch coading

What happens when you double-click on a BAT file? Or, you run the BAT file from your commandeered cmd prompt? It pops up and runs! Now, we can’t be having the user see this, can we? A hacker also sometimes … Continue reading

How To Hack: Online Dictionary Attack with Hydra

xhydra09132013-293x150

1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading

Armitage Tutorial – Cyber Attack Super Tool

armitage

1. About Armitage 1.1 What is Armitage? Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework. Through one Metasploit instance, your team will: Use the … Continue reading