Spoof Your MAC Address on Windows

How to Spoof MAC Address on Windows OS Now I’m sure you know what MAC addresses are and what MAC spoofing is, let us take a look at how we can spoof our MAC address on Windows. (You can also spoof your MAC … Continue reading

Want to Know How the Target Hackers Stole Your Credit Card?

As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely dampened Target’s Christmas … Continue reading

How to Pivot from Victim System to Owning the Network with Metasploit

To own a network and retrieve the key data, we only need to find ONE weak link in the network. It makes little sense to beat our heads against heavily fortified systems like the file and database server when we … Continue reading

Mimikatz: Windows Powershell Script for Dumping Local and Domain Passwords

clymb3r recently posted a script called “Invoke-Mimikatz.ps1” basically what this does is reflectively injects mimikatz into memory, calls for all the logonPasswords and exits. It even checks the targets architecture (x86/x64) first and injects the correct DLL. This is really … Continue reading

How to Hack: Snatch the Sysadmin Password from Remote Desktop Protocol (RDP)

One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack … Continue reading

How to Hack: Use Wireshark to Capture, Filter, and Inspect Packets

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets. This … Continue reading

How To Hack: Execute BAT File in the Background Invisibly

What happens when you double-click on a BAT file? Or, you run the BAT file from your commandeered cmd prompt? It pops up and runs! Now, we can’t be having the user see this, can we? A hacker also sometimes … Continue reading

How to setup DarkComet RAT for Easy Access to a Target Computer

Note: In this format, the RAT program will quite easily be detected by anti-virus software. In order to evade such detection you will have to crypto the DarkComet RAT. It must become undetectable in order to use stealthily. Or, the … Continue reading

Hack Windows 7 / Windows 8 Password Easily, No extra tool or software!

Video: Check out UltimatePeter’s Facebook! First, you will start up the computer (or restart it). While the computer is coming up and you can see it saying, “Starting Windows,” grab and hold down the power button until it does a … Continue reading

[How To] Bypass Win7 Password, Decrypt Win7 Password HASH, & Lift Firefox Passwords

So, this took a while for me to put together, but it worked out good. Refer below for further resource. I will am tryin to get my hands on the v2.2 so I can post another Tut for Win8. Otherwise, … Continue reading