Basic Lab Setup for Penetration Testing
In this tutorial we are going to see how we can setup a basic pentest lab and perform port scanning. (I feel this should have been the first post as I encourage every reader here to create a personal pentest …
In this tutorial we are going to see how we can setup a basic pentest lab and perform port scanning. (I feel this should have been the first post as I encourage every reader here to create a personal pentest …
In the previous tutorials we saw how to hide text message inside an image file. In this tutorial we are going to see how we can save our secret text file inside an audio file. Tools DeepSound. Steps Go and …
Steganography is the method of hiding a text message inside an image. In this tutorial we are going to see how we can use the tool. Tools needed. Stegosuite(used for stegnography). Image (to hide the message). Steps. First go to …
Hello readers, during our previous tutorial we saw how we can use lazagne and see the saved WiFi and browser password In this tutorial we are going to see how we can view stored WiFi passwords using cmd and also …
Hey guys, for this tutorial we shall need to have a physical access to a victims machine. We shall use a popular software tool to be able to retrieve and view passwords of the user. Tools needed Lazagne 2.4 Steps …
Most times we find ourselves having zip files that are password protected. In this tutorial, I am going to show you how we can use python to crack the password. Steps First we are going encrypt the sample file “test.txt” …
In this tutorial we are going to see how we can add our payload to the executable files in windows. Tools needed Kali linux Shellter – this tool has proved most effective in creating AV evading payloads. The re-encoding capabilities …
In the previous tutorial we learnt how to use a payload pre-loaded in kali linux using msfvenom. In this part of the tutorial we shall see how to create a listener. Steps Open terminal and type msfconsole Type use exploit/multi/handler …
Hello friends in this tutorial we are going to learn how we to crack a WiFi password Note: for this tutorial we need wireless WiFi adapter with monitor mode Tools Kali Linux Wireless WiFi adapter with monitor mode Steps First …
With the increase of mobile device users and the penetration of smartphones to the population, hackers have found a new playing field for exploiting victims. In this tutorial, we are going to see how easily a hacker can gain access …