All | New 1AugCommands Crash CoursePractice is everything Learn about the most commonly used commands in the Metasploit framework and how to use them in your journey to become a successful penetration tester. 29JulIntroduction to MetasploitOur very own manhattan project.. Metasploit is a tool developed by HD Moore in 2003. In a nutshell, it is used to exploit vulnerabilities in daemons(background) running on an open port. It is extremely powerful... 25JulGoing ProSuit up Are you considering a career in the field of cyber security? Do you have what it takes to be a professional penetration tester? Let's find out. 22JulCreating Wordlists With CrunchYou can hide, but you cannot escape Sometimes life leaves us with no options. You’ve tried all the other methods of cracking open an encrypted file or gaining access to a WPA Wi-Fi network but nothing seems... 18JulTHC HydraYou think your passwords are safe? Let's see... One of the biggest security holes in any seemingly secure networks or systems are passwords. Install a $500 anti-virus, specifically hire a cyber security team, do anything and everything you... 13JulHow to Hack Wi-Fi (WEP) - IIWith time, every system can be hacked into For this tutorial you need external WiFi adapter or have Kali installed in your Hard Drive, not a virtual machine. Otherwise, look for the method using normal windows OS in... 10JulInstalling KaliWelcome to your new home Around April 2014, backtrack-linux.org officially stopped supporting backtrack downloads. This was mainly due to the release of Kali 1.0.6 which fixed majority of the bugs in the OS. Although Backtrack... 1JulInstalling BacktrackHacker's paradise How to Install BackTrack 5(contents) ►Download the BackTrack 5 ISO ►Setting up a Virtual Machine ►Installing BackTrack 5 ►BackTrack Login ►(Optional) Creating a Bootable USB Drive ►Download the BackTrack 5... 27JunLimits Of LegalityDancing with the devil As you become a better hacker, staying on the right side of the legal lines can mean the difference between freedom and a lifetime behind bars. 25JunMore On Hacking WiFiThe final touches... Learn the inner workings of how WiFi hacking tools work, and how to use them to own wireless networks anytime and anywhere. 23JunHow to Hack Wi-Fi (WPA/WPA2)Breaking the unbreakable WPA/WPA2 supports many types of authentication beyond pre-shared keys. aircrack-ng can ONLY crack pre-shared keys. So make sure airodump-ng shows the network as having the authentication type of PSK, otherwise,... 21JunHow to Hack Wi-Fi (WEP)Preying on the hopelessly weak Tools Required: CommView for WiFi: http://tamos.com/download/main/ca.php Aircarck-NG GUI: http://aircrack-ng.org/ Install CommView. While installation you maybe asked whether you want to install the application in VoIP mode or Standard mode. Both... 19JunR.A.T'sIf only this was a website on cuddly creatures.. Here is an introduction to Remote administration tools. These are generally called RATs, and yes they have a vicious bite. although this page doesn’t teach you how to blast open... 17JunProgramming - IIIf you rely on other's code, you'll always be a noob Programming is a vast field. Even after years of experience a programmer is always bumping into new things. That’s part of what makes it so exciting, you can always find... 16JunProgramming - IDon't be a script kiddie When it comes to computers and everything related to them, programming is the mind and body, heart and soul. Without software, any piece of hardware is nothing but a random... 11JunPracticing For DDOSHow do you defend against a nuclear bomb? What we’ll attempt to do in this article is similar to testing a nuclear bomb (okay, not really). But still, there’s no way to tell exactly what will happen, other... 9JunProtecting Against DDoSHow do you protect against a nuke? Learn about the various defenses against distributed denial of service (or DDoS) attacks to protect your systems. 7JunHow To Launch a DDoS AttackAll systems are go Learn how to launch your very own distributed denial of service (DDoS) attack and bring down a website for fun and profit (and jail time). 12MayOverloading MemoryThe thing about machines is that they all have a limit This virus combines the best of the fork bomb and the application flooder. It creates a new batch file in the same directory and then copies itself onto this new... 11MayPhishing (Old)The ultimate gullibility test Learn how phishing works and how you can perform a phishing attack yourself to obtain the password to your victim's account. 29AprUSB StealerJust like those unrealistic movies and TV shows, except this one's real. There’s a lot of people in the world and even more online accounts. Every security system has a flaw and what we’re going to discuss here is just that. Most... ← Previous Next →+1 143k Pin 86k Tweet 309kShare 252kReddit 117kShares 907k