How To Hack: Exploit SNMP for Reconnaissance

The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). … Continue reading

Kali Linux on Android Using Linux Deploy

Kali Linux on any Android Phone or Tablet Getting Kali Linux to run on ARM hardware has been a major goal since day one. So far, there have been native images built for the Samsung Chromebook, Odroid U2, Raspberry Pi, … Continue reading

Historical Hacking Philes: A Beginners Guide to Hacking Unix by Jester Sluggo (1985)

************************************** * A beginners guide to: * * H A C K I N G * * * * U N I X * * * * By Jester Sluggo * * Written 10/08/85 * ************************************** In the following file, … Continue reading

How To Hack: Change the Signature of Payloads to Evade Antivirus

I’ve written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these … Continue reading

Hacking Wifi: Cracking WEP with Kali Linux

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

How to Hack: Ultimate Metasploit Meterpreter Command Cheat Sheet

Many of you have probably heard about the MetaSploit Meterpreter Shell. A number of you have probably even used it. But some of you are probably wondering, “What are all the commands for Meterpreter?” Well, here we have a comprehensive … Continue reading

How To Hack: Execute BAT File in the Background Invisibly

What happens when you double-click on a BAT file? Or, you run the BAT file from your commandeered cmd prompt? It pops up and runs! Now, we can’t be having the user see this, can we? A hacker also sometimes … Continue reading

How To Hack: Wafw00f Tutorial – Web Application Firewall Detection Tool

Introduction This is a Web Application Firewall Detection Tool. The tool was written by – Sandro Gauci And G. Henrique. It will help you detect the WAF ( Web Application Firewall )  behind the any domain. Wiffit (Wafw00f ) can … Continue reading

How to Hack: Bypassing Antivirus using Veil on Kali Linux

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux with the goal of: Bypass common AV solutions used. Get the payloads from Metasploit framework, and get the … Continue reading

How To Hack: LazyKali Hacking Script for Updated Kali and Easy Hacks

LazyKali is an awesome script written in bash shell. It can automate the whole update and install new tools in your hack repository. As the name suggests, you can get all the updates on Kali Linux and your repositories in … Continue reading

How To Hack: Using KARMA to Capture Clients as a Rogue Wifi Hotspot

“KARMA is a set of tools for assessing the security of wireless clients at multiple layers. Wireless sniffing tools discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames. From there, individual clients can be targeted … Continue reading

How To Hack: Exploit and Gain Remote Access to Windows XP (Metasploit)

Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean the same thing. When first looking at the Metasploit Framework, it can be a bit overwhelming with the … Continue reading

WiFi Pineapple Mark V Unboxing – Hak5 Portable Hacking Tool

The WiFi Pineapple Mark V is the latest generation wireless network auditing tool from Hak5. With its custom, purpose built hardware and software, the WiFi Pineapple enable users to quickly and easily deploy advanced attacks using our intuitive web interface. … Continue reading

How To Hack: Embed a Backdoor Connection in an Innocent-Looking PDF

While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we’ll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in … Continue reading

How To Hack: Use MS Word to Embed a Listener on a Remote Computer

As web server and OS’s have become hardened and living behind significant perimeter defenses, hackers have migrated to the easiest route to the pot of gold. This is through the often unpatched, unhardened client-side system with little in the way … Continue reading

How To Hack: Using Netcat

For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it’s virtually unknown outside. It’s so … Continue reading

Armitage Tutorial – Cyber Attack Super Tool

1. About Armitage 1.1 What is Armitage? Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework. Through one Metasploit instance, your team will: Use the … Continue reading