Hacking Wifi: Cracking WEP with Kali Linux

wifi-hacking

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

How to Hack: Ultimate Metasploit Meterpreter Command Cheat Sheet

metasploit

Many of you have probably heard about the MetaSploit Meterpreter Shell. A number of you have probably even used it. But some of you are probably wondering, “What are all the commands for Meterpreter?” Well, here we have a comprehensive … Continue reading

Documentary: The Day of the Technopath (1989)

The October 11th, 1989 Dispatches episode – The Day of the Technopath – explores computer security threats of the era. This documentary is particularly interesting because very common problems today are discussed at their infancy: organized crime first experimenting with … Continue reading

How To Hack: Online Dictionary Attack with Hydra

xhydra09132013-293x150

1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading

Microsoft Office Exploit 2003, 2007, 2010, 2013 – Embed EXE in DOC or XLS

infected

So, have you gone to school and studied up on all of your classes? Do you ever send or receive Microsoft Office documents in your daily life? I be sometimes you get so many different things in your email, there … Continue reading

Some Interesting Google Dorks

Google Dorks

Evidence has been found of certain documents around the web holding passwords and other vital information that many probably don’t want revealed. Here is a list of interesting Google Dorks that uncover some of these documents. This is for purposes … Continue reading