John the Ripper Basics Tutorial

I wrote this tutorial as best I could to try to explain to the newbie how to operate JTR. Remember, this is a newbie tutorial, so I won’t go into detail with all of the features. JTR is a program … Continue reading
I wrote this tutorial as best I could to try to explain to the newbie how to operate JTR. Remember, this is a newbie tutorial, so I won’t go into detail with all of the features. JTR is a program … Continue reading
Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial. First you … Continue reading
Brute Forcing and Dictionary Attacks are two methods of getting the same result, a password. Dictionary Cracking can mostly rely on the quality of your word list. Quite often, I have people ask me where they can get wordlists. It … Continue reading
Medusa is described as a “speedy, massively parallel, modular, login brute-forcer” with modules available to support almost any service that allows remote authentication using a password, including: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, POP3, PostgreSQL, SMTP-AUTH, Telnet and VNC. Medusa … Continue reading
clymb3r recently posted a script called “Invoke-Mimikatz.ps1” basically what this does is reflectively injects mimikatz into memory, calls for all the logonPasswords and exits. It even checks the targets architecture (x86/x64) first and injects the correct DLL. This is really … Continue reading
One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack … Continue reading
1. Introduction When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of attack and explains how to launch an online dictionary attack using … Continue reading
Everyone is addicted to Facebook. Admit it, your Mom and your Brother are on it and as soon as you turn 13, you will be signing up too! Lol, j/k… This has led Facebook to break record numbers with over … Continue reading
Evidence has been found of certain documents around the web holding passwords and other vital information that many probably don’t want revealed. Here is a list of interesting Google Dorks that uncover some of these documents. This is for purposes … Continue reading
Here I will be showing how to setup ettercap settings on Kali Linux, then we will proceed to do a man in the middle attack on a wireless network. I will be using ettercap and sslstrip to do this. The … Continue reading