Friday, June 20, 2014
Real Life Phishing Scenario : Zero Day google bug
By
Shashwat
June 20, 2014
bug, gmail, google bug, google drive bug, hacking, phishing, tutorial, windows, zero day
- Disclaimer - TLDR; some stuff here can be used to carry out illegal activity, our intention is, however, to educate
Labels:
bug,
gmail,
google bug,
google drive bug,
hacking,
phishing,
tutorial,
windows,
zero day
Tuesday, June 17, 2014
So You Want To Be A Hacker
By
Shashwat
June 17, 2014
beginner, hacking, hacking with kali linux, kali, Kali Basics Tutorials, kali tutorials, newbie, noob, tutorial
- Disclaimer - TLDR; some stuff here can be used to carry out illegal activity, our intention is, however, to educate
Ah! The world of hackers. It has changed much from the fabled green black terminal operated by guys with spectacles on their eyes and a serious look on their face. Now even a script kiddie who types a few lines on a Kali Linux calls himself a hacker. The terminal is still there, but the colors have changed. It's black terminal with text of all colors. But who cares about the colors. It's the new Operating Systems : The likes of Kali Linux,
Backtrack, BackBox Linux, Node Zero, Blackbuntu, and many more, which have made hacking much easier. However, has it got easy enough? No. Not at all.
Backtrack, BackBox Linux, Node Zero, Blackbuntu, and many more, which have made hacking much easier. However, has it got easy enough? No. Not at all.
Labels:
beginner,
hacking,
hacking with kali linux,
kali,
Kali Basics Tutorials,
kali tutorials,
newbie,
noob,
tutorial
Friday, June 13, 2014
Hack WPA/WPA2 PSK Capturing the Handshake
By
Shashwat
June 13, 2014
aircrack-ng, aireplay-ng, airodump-ng, hacking, tutorial, wifi, wifite, wireless hacking tutorials, wpa, wpa2
- Disclaimer - TLDR; some stuff here can be used to carry out illegal activity, our intention is, however, to educate
WPA password hacking
Okay, so hacking WPA-2 PSK involves 2 main steps-
- Getting a handshake (it contains the hash of password, i.e. encrypted password)
- Cracking the hash.
Labels:
aircrack-ng,
aireplay-ng,
airodump-ng,
hacking,
tutorial,
wifi,
wifite,
wireless hacking tutorials,
wpa,
wpa2
Monday, June 9, 2014
Add new exploits to Metasploit from Exploit-db
By
Shashwat
June 09, 2014
cli, command line, denial of service, exploit, exploit-db, hacking, linux, metasploit, Penetration Testing Tutorials, tutorial
- Disclaimer - TLDR; some stuff here can be used to carry out illegal activity, our intention is, however, to educate
All this time you were just using mainstream exploits which were famous but old. They worked well, but only with old unpatched operating systems, not the updated ones. Now it's time to move on to the next step. Our poor experience against Windows 8 and Java 7u60 left us shattered, and we realized that fully patched and updated machines with strong antivirus and firewall can be pretty hard to break into. Now we will move into the world of real pentesting, and the first step would be introduction to exploit-db.
Thursday, June 5, 2014
Remotely Access Kali Terminal Using Putty
By
Shashwat
June 05, 2014
hacking, kali, Kali Basics Tutorials, networking, puTTy, remote, ssh, telnet, terminal, tutorial
- Disclaimer - TLDR; some stuff here can be used to carry out illegal activity, our intention is, however, to educate
In this post we will use PuTTy to remotely or locally access Kali terminal with root priveleges. We will use SSH for this tutorial, though you can use Telnet or any other mode too.
Putty
Some theoretical inforamtion about putty for your digestion.
PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers. (putty.org)
Labels:
hacking,
kali,
Kali Basics Tutorials,
networking,
puTTy,
remote,
ssh,
telnet,
terminal,
tutorial