Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

Month: August 2018

 

Error “E: Could not access the lock file /var/lib/dpkg/lock” in Kali Linux (SOLVED)

Alex August 31, 2018 apt, errors, Kali Linux, problem solving, system administration Work Environment No Comments »

Setting up network routes: the choice of connection used for the Internet; simultaneous use of multiple connections for different purposes

Alex August 30, 2018 computer networks, default route, IP, iproute2, Linux, Metric, traffic routing Work Environment No Comments »

Comprehensive step by step guide to install Arch Linux

Alex August 29, 2018 Arch Linux, BlackArch, cfdisk, Cinnamon, drivers, NetworkManager, system recovery Work Environment One Comment »

CPU Undervolting in Linux

Alex August 28, 2018 CPU, Linux, Undervolting Hardware 14 Comments »

How to change Linux boot parameters in UEFI

Alex August 28, 2018 GRUB, Linux, UEFI / EFI Work Environment No Comments »

Brute-Force Router Web Forms

Alex August 28, 2018 brute-force, hacking, passwords, Patator, routers, web-sites, webapps Web Applications One Comment »

How to run Armitage in Arch Linux and BlackArch

Alex August 20, 2018 Armitage, Metasploit, PostgreSQL Exploitation, Work Environment No Comments »

WiFi-autopwner 2: user manual and overview of new features

Alex August 14, 2018 3WiFi, automation, create_ap, hacking, passwords, TX-Power, WEP, WiFi-autopwner, WPA / WPA2, wpa_supplicant, WPS Wireless Attacks 7 Comments »

Subscribe to new articles

Loading

Join us in telegram

Telegram notifications about new articles on Miloserdov.org: t.me/miloserdov_org

Also recommended



Search

Categories

  • Anonymity, data encryption and anti-forensics
  • Exploitation
  • Hardware
  • Improving security
  • Information Gathering
  • IT Forensics
  • Kali Linux
  • Maintaining Access
  • Online books
  • Password Attacks
  • Reverse Engineering
  • Sniffing & Spoofing
  • Web Applications
  • Website news
  • Wireless Attacks
  • Work Environment

Recent Posts

  • What to do if Linux does not boot
  • Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 2)
  • Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 1)
  • Security audit of the SKYWORTH GN542VF router – how to hack the admin panel password without leaving the web browser!
  • How to use .hcmask files in Hashcat for the most flexible character replacement

Recent Comments

  • Pippa on How to add Kali Linux repositories to another Linux distribution
  • Amr Elsagaei on How to install OWASP Mutillidae II and Damn Vulnerable Web Application (DVWA) in Kali Linux
  • William on How to add Kali Linux repositories to another Linux distribution
  • Anonymous on How to generate candidate passwords that match password strength policies (filtering words with grep)
  • Paul Gottgens on Web Server on Windows 11 (Apache, MySQL, PHP and phpMyAdmin): step-by-step installation guide

New Penetration Testing Tools

  • hcxdumptool
    Source: New Penetration Testing Tools Published on 2022-02-15
  • hcxtools
    Source: New Penetration Testing Tools Published on 2022-02-14
  • nbtscan-unixwiz
    Source: New Penetration Testing Tools Published on 2022-01-20
  • NMBscan
    Source: New Penetration Testing Tools Published on 2022-01-18
  • NetBIOS Share Scanner
    Source: New Penetration Testing Tools Published on 2022-01-16
  • NBTscan
    Source: New Penetration Testing Tools Published on 2022-01-15

Recent Posts

  • What to do if Linux does not boot
  • Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 2)
  • Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 1)
  • Security audit of the SKYWORTH GN542VF router – how to hack the admin panel password without leaving the web browser!
  • How to use .hcmask files in Hashcat for the most flexible character replacement

Recent Comments

  • Pippa on How to add Kali Linux repositories to another Linux distribution
  • Amr Elsagaei on How to install OWASP Mutillidae II and Damn Vulnerable Web Application (DVWA) in Kali Linux
  • William on How to add Kali Linux repositories to another Linux distribution
  • Anonymous on How to generate candidate passwords that match password strength policies (filtering words with grep)
  • Paul Gottgens on Web Server on Windows 11 (Apache, MySQL, PHP and phpMyAdmin): step-by-step installation guide

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • September 2017
  • August 2017
  • July 2017
  • March 2017
  • January 2017
  • December 2016

Categories

  • Anonymity, data encryption and anti-forensics
  • Exploitation
  • Hardware
  • Improving security
  • Information Gathering
  • IT Forensics
  • Kali Linux
  • Maintaining Access
  • Online books
  • Password Attacks
  • Reverse Engineering
  • Sniffing & Spoofing
  • Web Applications
  • Website news
  • Wireless Attacks
  • Work Environment
© 2022: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress