Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

How to set up Tor hidden service in Debian (Kali Linux, Linux Mint, Ubuntu)

What is Tor Hidden Service and How to Do It If you are already using hidden TOR services, then make sure you have the address and keys of the third version. That is, earlier the addresses were something like this: hacktoolseqoqaqn.onion And now they have become something like this: hacking5xcj4mtc63mfjqbshn3c5oa2ns7xgpiyrg2fenl2jd4lgooad.onionRead More

How to get a custom domain name for Tor hidden service

Anyone can create their own Tor hidden service. You can find detailed instructions on how to do this by following the links How to set up Tor hidden service in Debian (Kali Linux, Linux Mint, Ubuntu) How to install Tor and create Tor hidden service on Windows The hidden serviceRead More

Reverse engineering of network traffic

Reverse engineering is the study of a device or the operation of something not based on documentation, drawings, etc., but through disassembly, analysis of components, analysis of work. The same principles apply to software. For example, if the network protocol is proprietary and there is no documentation or source codeRead More

How to manage cameras via DVR-IP, NetSurveillance, Sofia protocol (NETsurveillance ActiveX plugin XMeye SDK)

DVR-IP, NetSurveillance, Sofia The NETSurveillance ActiveX plugin uses a TCP based protocol called just as the “Digital Video Recorder Interface Protocol” by the “Hangzhou male Mai Information Co”. There is very little software or documentation that supports it other than the tools provided by the manufacturers of these cameras, makingRead More

Camera control software (watching video, downloading video to PC, task schedule)

Surveillance camera manufacturers are currently focusing on mobile camera control clients and cloud storage, in the same time universal desktop clients either missing or not working. This manual will tell you about a program that can work with many IP surveillance cameras, especially those made in China. Unfortunately, not everythingRead More

How to speed up the generation of dictionaries with passwords

In one of the comments under the article on creating dictionaries, I was asked how to make the program use GPU in order to create passwords even faster. But this is the wrong question, the fact is that the speed of creating passwords is primarily limited by the speed ofRead More

How to create dictionaries that comply with specific password strength policies

Dictionaries that contain all groups of characters Nowadays, many services, operating systems and websites have requirements for the complexity of the password that you want to use for your account. As a rule, it must be a password of at least a certain length and containing various groups of charactersRead More

Guide to GPS Metadata in Photos

1. Programs for manipulating metainformation in images 1.1 How to install ExifTool on Windows and Linux 1.2 How to install Exiv2 on Windows and Linux 1.3 How to install Geotag on Windows and Linux 2. How to understand, extract and convert geographic coordinates 2.1 Metadata editing software for Windows and Linux 2.2 What isRead More

Bless manual (hex editor)

Table of contents 1. Introduction 2. Building and Installing Bless 3. Getting Started 4. Using Bless 5. Customizing Bless 6. Frequently Asked Questions 7. About Bless Note: This tutorial for Bless (a great hex editor) was written by Alexandros Frantzis. This tutorial is already available online at https://github.com/afrantzis/bless/tree/master/doc/user/C. But itRead More

Guide to GPS Metadata in Photos (Part 4): How to build motion tracks based on a group of photos

Table of Contents: Guide to GPS Metadata in Photos 1. Programs for manipulating metainformation in images 2. How to understand, extract and convert geographic coordinates 3. How to spoof GPS and other metadata in photos 4. How to build motion tracks based on a group of photos 4.1 Reconstruction of movementsRead More

Posts navigation

OLDER ENTRIES
© 2021: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress