How To Hack – Use SET on Kali to Create Backdoor EXE Meterpreter Session with Persistence

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over … Continue reading

How To Hack: Online Dictionary Attack with Hydra

1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading

How To Hack: Map Someone’s Whereabouts by Public Photo Geo-location Data with

What is Creepy? So what is Creepy actually and how does it come into the “Geolocation” picture? Creepy is a geolocation information aggregation tool. It allows users to gather already published and made publicly available geolocation information from a number … Continue reading