Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

Kali Linux 2022.3 released: test lab and new tools added

The developers of Kali Linux have released a new release of the popular penetration testing distribution. The press release turned out to be quite voluminous due to the versatility of this distribution and the activity of the community. You can find the full list of news here: Kali Linux 2022.3Read More

The complete guide to Wine: from installation to advanced usage

Table of contents 1. Why Wine 2. Features and limitations of Wine 3. 64-bit or 32-bit Wine? 4. How to install Wine 4.1 Installing Wine on Debian, Kali Linux, Linux Mint, Ubuntu, and their derivatives 4.2 Installing Wine on Arch Linux 5. How to run a program in Wine 5.1 Launch by doubleRead More

What to do if Linux does not boot

Table of contents 1. Linux Live burned on a USB flash drive does not boot 1.1 Enable quick boot and/or secure boot options 1.2 Do not use Rufus 1.3 Update BIOS 1.4 A start job is running for live-config contains the components that configure a live system during the bootRead More

Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 2)

Table of contents: Computer networks 1. How computer networks work 2. IP address 3. IPv6 address Part I: 3.1 Can routers and computers work simultaneously with IP and IPv6? 3.2 IPv6 Address Structure 3.3 How do I know if I have an IPv6 address or not? How to find outRead More

Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 1)

Table of contents: Computer networks 1. How computer networks work 2. IP address 3. IPv6 address Part I: 3.1 Can routers and computers work simultaneously with IP and IPv6? 3.2 IPv6 Address Structure 3.3 How do I know if I have an IPv6 address or not? How to find outRead More

Security audit of the SKYWORTH GN542VF router – how to hack the admin panel password without leaving the web browser!

Factory passwords (default passwords) are a big security hole in the Internet of things (IoT), including routers, surveillance cameras and other network equipment. If devices from the same manufacturer have the same passwords, then everyone knows these passwords. An attack on network devices can lead to data leakage and expansionRead More

How to use .hcmask files in Hashcat for the most flexible character replacement

A rule-based attack is the flexible generation and filtering of password candidates. Despite all its capabilities, this attack is not omnipotent. Consider the following example. There is a word seesaw and ones need to replace the character “s” with the character “$”. For example, in John the Ripper you canRead More

Email analysis

Electronic mail (e-mail) is ubiquitous. Regular communication takes place through mail, spam is sent through mail, phishing attacks are carried out through mail, and scammers send letters. In addition to the information displayed (the text of the letter, the To and From fields), emails also contain headers with technical andRead More

How to create or enlarge a Swap file in Kali Linux

How to add Swap file in Kali Linux If you do not have enough RAM, you can add a Swap file. If you do not have enough RAM with the existing swap file/partition, you can create a larger swap file and use only it create an additional swap file andRead More

Wi-Fi security audit with Hashcat and hcxdumptool

Table of contents 1. New Wi-Fi security audit guide 2. Up-to-date Wi-Fi security audit tools 3. Command summary for Wi-Fi security audit 4. Stop processes that might interfere with handshake and PMKID capturing 5. Manage with wireless network interfaces 6. Handshakes and PMKID capture 6.1 Attack all APs 6.2 Attack a specific AP 7. Convert captured data to hashRead More

Posts navigation

OLDER ENTRIES
© 2022: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress