Site Tree
Pages
Posts by category
- Category: Anonymity, data encryption and anti-forensics
- How to enable DNS over HTTPS and what it is for
- Error “E: Unable to locate package dnscrypt-proxy” in Kali Linux and Debian (SOLVED)
- How to install and use VeraCrypt in Tails
- How to install VeraCrypt on Linux
- How to connect to OpenVPN via proxy or Tor
- OpenVPN advanced usage examples
- How to install Kali Linux with full disk encryption or encrypted user’s home folder
- How to create and configure a Squid proxy server
- How to save and open website pages in Tails in a web browser
- Configuring programs and operating systems to work through a proxy
- How to change MAC address in Linux, how to enable and disable automatic MAC change (spoofing) in Linux
- autovpn2 and autovpn3 - scripts to automatically connect to a free VPNs
- How to set up Tor hidden service in Debian (Kali Linux, Linux Mint, Ubuntu)
- How to get a custom domain name for Tor hidden service
- Guide to GPS Metadata in Photos
- Guide to GPS Metadata in Photos (Part 3): How to spoof GPS and other metadata in photos
- How to detect IP cameras
- Examples of using HTTP headers for “hidden” data transfer
- Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 2)
- Kodachi (OS for anonymity, security and anti-forensics) – is questionable!
- How to obfuscate JavaScript code
- How NOT to Do Phishing Attacks (Part 2)
- How NOT to do phishing attacks (CASE)
- Errors in Kali Linux ‘W: Failed to fetch’ and ‘W: Some index files failed to download. They have been ignored, or old ones used instead.’ (SOLVED)
- Tor tips and usage examples
- How to manage Tor service on Linux
- What to select: Tor, VPN, or proxy?
- How to redirect all traffic through the Tor network
- Proxy types, how to use proxy, how to check the quality of proxies
- Program for removing sensitive information from a document
- How to extract, delete and edit metadata in LibreOffice files
- How to view metadata in MS Word files. How to remove and edit Word metadata
- How to see and change timestamps in Linux. How to perform timestamps-based searching
- How to create a proxy on shared hosting
- How to parse proxy lists
- Why in Tails the history of the entered commands is not saved. How to make so that the history of the last Bash commands are saved
- How to upgrade Tails on an internal HDD
- How to configure programs to access the Internet in Tails. Internet connection settings for command line utilities
- How to install Tails on (internal or external) hard disk. How to install Tails in VirtualBox
- How to make proxy with Tor in Windows
- How to install Tor and create Tor hidden service on Windows
- How to install and run Tor Browser on Kali Linux
- Free easy way to hide IP in Linux
- Anonymous scanning through Tor with Nmap, sqlmap or WPScan
- Category: Exploitation
- SMB and Samba Security Audit Tools
- IP camera security audit
- What is HNAP, how to find and exploit routers with HNAP
- How to speed up the scanning of large networks ranges
- Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 1)
- How to exploit blind command injection vulnerability
- Command injection: exploitation and automated vulnerability search
- How to make changes in browser Developer Tools persist after page reload
- sshprank: SSH mass-scanner, login cracker and banner grabber
- RDP Security Audit
- How to make a local web server accessible from the Internet without a white IP
- Pass-the-hash attack (how to use NTLM without cracking a password)
- How to find and analyze information in RAM
- How to open and exploit .DS_Store
- Attack on devices in the local network through a vulnerable router
- How to bypass two-factor authentication with evilginx2
- Network pivoting: concept, examples, techniques, tools
- How to control computers via backdoor
- Pupy manual: how to create a backdoor
- How to install Pupy
- How to use netcat (nc), ncat
- How to run Armitage in Arch Linux and BlackArch
- RouterSploit User Manual
- Concealed control of a Windows-based computer (using Metasploit)
- How to use sqlmap for injection in address of a web site page (URI). Arbitrary injection points
- How to hack routers in Windows (Router Scan by Stas’M manual)
- Category: Hardware
- How to unbrick HackRF. How to restore HackRF after failed device flashing
- How to create or enlarge a Swap file in Kali Linux
- An easy way to increase TX Power for Wi-Fi in Kali Linux and BlackArch
- How to find the MAC address and How to find the manufacturer by MAC address
- What attacks are old Wi-Fi adapters suitable for?
- How to install the Realtek RTL8821CE driver
- Wi-Fi adapter Qualcomm Atheros QCA9377 does not capture data packets in monitor mode (SOLVED)
- Linux Wi-Fi Cheat Sheet: Tips and Troubleshooting
- Linux kernel modules
- How to brute-force passwords using GPU and CPU in Linux
- How to install NVIDIA drivers, CUDA and Bumblebee on Arch Linux / BlackArch
- How to use Android phone as GPS sensor in Linux
- USB Wi-Fi Adapters with monitor mode and wireless injection (100% compatible with Kali Linux) 2022
- CPU Undervolting in Linux
- How in Windows view the contents of a Linux disk and copy files from it
- How to increase TX-Power of Wi-Fi adapters in Kali Linux
- Best Kali Linux Compatible USB Wi-Fi adapters 2018
- Alfa AWUS052NH – Kali Linux Compatible USB Adapter
- Category: Improving security
- Category: Information Gathering
- Email analysis
- Port scanner for Windows
- Guide to GPS Metadata in Photos (Part 4): How to build motion tracks based on a group of photos
- Guide to GPS Metadata in Photos (Part 2): How to understand, extract and convert geographic coordinates
- GUI Port Scanner for Windows and Linux (Angry IP Scanner)
- Revealing the perimeter (CASE)
- How to find out the exact location of users
- FinalRecon: a simple and fast tool to gather information about web sites, works on Windows
- How to find usernames on social media using Sherlock
- IP addresses databases of organizations and geographical places (continents, countries, provinces and cities)
- Internet archives: how to retrieve deleted information. How to restore sites from Internet archives
- Utilities for information gathering, OSINT and network analysis in Windows and Linux
- How to save all information from Facebook profiles
- Tracerouting networks with complex topology. How to detect NAT
- Perimeter analysis for website security audit
- The fastest subdomains enumeration and monitoring (also works on Windows!)
- Nmap usage tips
- Wi-Fi device tracking
- How to scan wireless networks with a regular Wi-Fi adapter
- How to search for information by phone number
- How to install ꓘamerka (kamerka)
- How to find out what the site works on
- Text sniffing by the sound of the pressed buttons
- How to find out the Autonomous system on the IP and how to find out all the Autonomous System IPs
- Tracerouting tools and methods
- How to find out local IP addresses of ISP
- Danger-zone tutorial (tool to visualize relationships between domains, IPs and email addresses)
- How to discover subdomains without brute-force
- How to bypass Cloudflare, Incapsula, SUCURI and another WAF
- How to install Social Mapper in Kali Linux
- How to find out hostnames for many IP addresses
- How to search and brute force services on non-standard ports
- Dissection of the scammer site (case)
- How to see locked HTML code, how to bypass social content lockers and other website info gathering countermeasures
- How to check websites for AdSense ban in 2019
- How to search subdomains and build graphs of network structure with Amass
- TIDoS-Framework: Web Application Information Gathering and Manual Scanning Platform
- badKarma: Advanced Network Reconnaissance Assistant
- Shared hosting security audit
- How to find out the real IP of a site in Cloudflare
- How to find out if a site is behind CloudFlare or not
- Automatic search the database of hacked access points
- Open source research with OSRFramework (search by mail, nickname, domain)
- 3WiFi: open database of Wi-Fi Access Points passwords
- How to hack Wi-Fi in Windows
- Online Kali Linux programs (FREE)
- How to detect all Wi-Fi devices in the area?
- How to find out the exact model of a router (wireless access point)
- How to lookup MAC-address to find device manufacturer in Kali Linux
- How to find out all sites at an IP
- How to collect Location, Country or ISP IP Ranges
- Category: IT Forensics
- Analysis of a Linux virus written in Bash
- Bless manual (hex editor)
- How to mount disk images for viewing and editing files (SOLVED)
- Programs for extracting information from the Windows registry
- How to open disks of virtual machines and download and upload files to them (SOLVED)
- How to find out which USB devices were plugged to Linux
- How to install and run Apache Real Time Logs Analyzer System (ARTLAS)
- How to trace a Bitcoin wallet transaction. Bitcoin transaction visualization
- How to find out to which Wi-Fi networks a computer were connected to and stored Wi-Fi passwords
- Indicators of Man-in-the-middle attacks
- How to find all passwords (web browsers, email programs, etc.) in Windows and Linux
- How to extract all web site passwords stored in web bowser
- Category: Kali Linux
- Kali Linux 2022.3 released: test lab and new tools added
- Kali Linux post-installation tips and settings
- How to configure Kali Linux to use a static IP address
- How to protect web server on Kali Linux from unauthorized access
- How to install Kali Linux (step by step tutorial)
- How to enable SSH in Kali Linux. How to connect to Kali Linux via SSH
- How to boot without a graphical interface in Kali Linux
- How to install normal Firefox in Kali Linux
- How to upgrade all Python packages in Kali Linux
- Kali Linux updating troubleshooting
- How to install snap in Kali Linux
- Docker on Kali Linux
- Solving the problem with ‘error: attempt to read or write outside of disk “hd0″’
- Where to download Kali Linux. What is the difference between Kali Linux versions
- VirtualBox Guest Additions do not work in Kali Linux anymore (small screen, no shared clipboard) (SOLVED)
- In Kali Linux, the default user will be a normal (not root) user
- Error in Kali Linux ‘The following signatures were invalid’ (SOLVED)
- Kali Linux web server shows blank pages (SOLVED)
- How to install Intercepter-NG in Linux
- How to install Kali Linux in VirtualBox
- Where to download Kali Linux and how to verify the integrity of Kali Linux images
- How to install Router Scan
- How to Install Total Commander Counterpart in Kali Linux
- How to install Guake in Kali Linux
- How to replace Default Desktop Environment with Cinnamon in Kali Linux
- How to update Kali Linux
- How to install all Patator dependencies
- Rogue Wi-Fi AP with mitmAP: setting up and data analysis
- Three ways to set wireless interface to Monitor mode and Managed mode
- How to check / restore Kali Linux Rolling Repository
- Category: Maintaining Access
- Category: Online books
- Category: Password Attacks
- How to use .hcmask files in Hashcat for the most flexible character replacement
- How to Install Drivers for Hashcat on Windows
- How to decrypt NS3 passwords from ZyXEL config file (NDMS V2)
- Hashcat doesn’t detect AMD CPUs (SOLVED)
- How to identify hash types – new tools with modern hashes support
- Comprehensive Guide to John the Ripper. Part 7: Johnny – GUI for John the Ripper
- How to generate dictionaries by any parameters with pydictor
- Advanced wordlist generating techniques
- Programs for generating wordlists
- Generation and modification of dictionaries according to the specified rules
- Comprehensive Guide to John the Ripper. Part 6: How to brute force non-standard hashes
- How to generate candidate passwords that match password strength policies (filtering words with grep)
- How to speed up the generation of dictionaries with passwords
- How to create dictionaries that comply with specific password strength policies (using Rule-based attack)
- Comprehensive Guide to John the Ripper. Part 5: Rule-based attack
- Practical examples of Hashcat usage
- How to hack HTTP Basic and Digest Authentication
- Comprehensive Guide to John the Ripper. Part 4: Practical examples of John the Ripper usage
- How to use precomputed tables to crack Wi-Fi passwords in Hashcat and John the Ripper
- Comprehensive Guide to John the Ripper. Part 3: How to start cracking passwords in John the Ripper (how to specify masks, dictionaries, hashes, formats, modes)
- Comprehensive Guide to John the Ripper. Part 2: Utilities for extracting hashes
- Comprehensive Guide to John the Ripper. Part 1: Introducing and Installing John the Ripper
- How to crack VNC password from captured traffic (challenge response)
- How to reset a Windows password
- How to install evilginx2 (and how to fix ‘urn: acme: error: unauthorized - Account creation on ACMEv1 is disabled’)
- How to decrypt stored Windows passwords using mimikatz and DAPA
- How to hack a Windows password
- Windows Network Authentication Hacking
- How to use Hashcat to crack passwords containing non-Latin characters
- How to find all passwords and keys in a large number of files
- Generation and modification of word lists according to the given rules
- Word lists for brute-force
- Hacking WPA/WPA2 passwords with Aircrack-ng: dictionary attack, cooperation with Hashcat, maskprocessor, statsprocessor, John the Ripper, Crunch, hacking in Windows
- How to continue brute-force from the hashcat restore point (hashcat sessions)
- Hash-generation software
- How to identify hash types
- Hashcat manual: how to use the program for cracking passwords
- Cracking WPA / WPA2 handshakes using GPU on Windows
- Category: Reverse Engineering
- Category: Sniffing & Spoofing
- How to intercept SSH password. Man-in-the-middle attack on SSH
- Wireshark Filters
- Ettercap user manual: man-in-the-middle attack (MitM), password interception, HSTS bypass, data modification on the fly, custom filters and plug-ins usage, BeEF hooks, infection with backdoors
- Sniffer for Windows: Intercepter-NG manual
- bettercap 2.x: how to install and use in Kali Linux
- Category: Web Applications
- Security audit of the SKYWORTH GN542VF router – how to hack the admin panel password without leaving the web browser!
- How to detect and identify the type of Web Application Firewall (WAF)
- Attacks targeting proxy servers
- Monitoring the emergence of new subdomains in real time
- How to run PHP script without a web server
- Basics of working with a web server for a pentester
- How to use User Agent to attack websites
- JavaScript Attacks: how to bypass Social Locker for WordPress (CASE)
- JavaScript Attacks
- lulzbuster: a tool for quick enumeration of hidden files and folders on sites
- How to Install and run WPScan on Windows
- How to find out where the link with redirects leads: all intermediate sites and cookies
- How to speed up the scanning of numerous web sites with Interlace
- Reconnoitre: Web Application Analysis Assistant
- How to find web server virtual host
- How to analyze POST requests in web browsers
- How to hack websites (part 2)
- How to hack websites
- Hacking websites training in Windows
- Brute-Force Router Web Forms
- Brute force website login page using patator
- jSQL Injection usage guide: a multifunctional tool for scanning and exploiting SQL injection in Kali Linux
- Web site parsing in command line
- 5 free and simple steps to secure WordPress web sites
- sqlmap usage guide. Part 2: Advanced scanning technics (POST, as a logged user, AJAX/jQuery)
- sqlmap usage guide. Part 1: Basic web-site checks (GET)
- Searching for admin pages of websites
- testssl.sh: No cipher mapping file found and No TLS data file found (SOLVED)
- How to check WordPress sites for vulnerabilities (WPScan)
- Category: Website news
- Category: Wireless Attacks
- Wi-Fi security audit with Hashcat and hcxdumptool
- Wi-Fi security audit improved: new tools, hash, and techniques
- How to install driver for Wi-Fi Mediatek MT7921 and Mediatek MT7961 in Linux
- Virtual Wi-Fi interfaces for simultaneous use of a Wi-Fi adapter in different modes
- Automatic capturing of handshakes with Besside-ng
- How to install the driver for W-Fi for cards with RTL8812AU/RTL8821AU chipsets (Alfa AWUS036ACH, Alfa AWUS036AC)
- How to install driver for Wi-Fi for adapters with RTL8814AU chipset (Alfa AWUS1900)
- How to start with HackRF and gqrx
- How to hack Wi-Fi in 2022
- How to capture a Wi-Fi handshake in tcpdump
- How to get passwords of Wi-Fi hot-spots nearby (without monitor mode)
- Automatic handshake and PMKID capture from all access points
- How to capture handshakes of Wi-Fi networks automatically
- What is Bluetooth Low Energy (BLE) and how to hack it
- How to hack Wi-Fi with a regular adapter without monitor mode
- New Kismet version
- How to decrypt WPA traffic in Wireshark
- How to intercept and analyze traffic in open Wi-Fi
- Hacking Wi-Fi without clients on Windows (using Wireshark and Npcap to capture PMKID)
- New in attacks on wireless networks
- Hacking Wi-Fi without users in Aircrack-ng
- Hacking Wi-Fi without users
- WiFi-autopwner 2: user manual and overview of new features
- WiFi-Pumpkin: Rogue Wi-Fi Access Point Attack with GUI and rich functionality
- How to create a Rogue Access Point (connected to the Internet through Tor)
- Fluxion 4 Usage Guide
- Fast and simple method to bypass Captive Portal (hotspot with authorization on the web-interface)
- How to extract all handshakes from a capture file with several handshakes
- How to Improve Wi-Fi Signal
- How to install WiFi-Pumpkin in Linux Mint or Ubuntu
- Programs for hacking Wi-Fi
- How to hack Wi-Fi
- How to install the latest aircrack-ng release in Linux Mint or Ubuntu
- How to increase TX-Power of Wi-Fi adapters in BlackArch in 2022
- The easiest and fastest ways to hack Wi-Fi (using airgeddon)
- All Airgeddon Hints
- How to hack Wi-Fi using Reaver
- New Wash and Reaver Features
- Effective WPS PINs attack based on known PIN and PIN generation algorithms
- Automated Pixie Dust Attack: receiving WPS PINs and Wi-Fi passwords without input any commands
- BoopSuite is an alternative to Airodump-ng, Airmon-ng and Aireplay-ng
- How to install Fluxion in Linux Mint or Ubuntu
- How to perform selective jamming of Wi-Fi networks and clients (DoS attack on individual access points / clients)
- Mass and endless handshake capture from all Access Points in a range
- Reaver cracked WPS PIN but does not reveal WPA-PSK password (SOLVED)
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak security
- Fix for Reaver Errors: WARNING: Failed to associate with and WPS transaction failed (code: 0x03), re-trying last pin
- How to install airgeddon on Linux Mint or Ubuntu
- Category: Work Environment
- Comprehensive step by step guide to install Arch Linux
- The complete guide to Wine: from installation to advanced usage
- What to do if Linux does not boot
- Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 2)
- Introduction to IPv6 Addresses: How to Use and How to Explore the Network (Part 1)
- NetBIOS: what it is, how it works and how to use in information security
- How to install OWASP Mutillidae II and Damn Vulnerable Web Application (DVWA) in Kali Linux
- Web Server on Windows 11 (Apache, MySQL, PHP and phpMyAdmin): step-by-step installation guide
- How to install Windows 11 and Kali Linux on the same flash drive
- How to recover USB drive/flash drive after flashing an ISO image or installing OS (SOLVED)
- How to make Kali Linux 2022 Live USB with Persistence and optional encryption (on Windows)
- How to install Windows on a USB storage
- How to check open ports on my computer. What do 0.0.0.0, :*, [::], 127.0.0.1 mean. How to understand NETSTAT output
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 7: Understanding the AD infrastructure
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 6: Active Directory configuration tools and snap-ins
- How to find the fastest Arch Linux and BlackArch mirrors
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 5: Join computers to Active Directory. Check and unjoin from Active Directory
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 4: Install Active Directory Domain Services in Windows Server 2022
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 3: Windows Server 2022 and Windows Server Core 2022 configuration tools
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 2: Install Windows Server 2022 and Windows Server Core 2022
- Active Directory comprehensive guide, from installation and configuration to security auditing. Part 1: Introduction to Active Directory (concepts, usage, difference from Workgroup)
- Windows Computer name: how to change and use
- How to change the desktop environment in Kali Linux without reinstalling the operating system
- How to get started with Linux commands on Windows: Cygwin
- How to install Greenbone Vulnerability Management (GVM) (formerly OpenVAS) on Kali Linux
- Installing and configuring MySQL and phpMyAdmin on Kali Linux
- Configuring and starting network services on Kali Linux (Apache, MySQL, SSH, PostgreSQL, NetworkManager and Bluetooth)
- How to change Kali Linux language without reinstalling the system
- What is the MySQL root password in Kali Linux. How to change/reset MySQL root password in Kali Linux
- How to try Linux: install to USB, virtual machine, or something else?
- How to run terminal as root in Kali Linux? How to run a GUI program as root
- How to manage cameras via DVR-IP, NetSurveillance, Sofia protocol (NETsurveillance ActiveX plugin XMeye SDK)
- Camera control software (watching video, downloading video to PC, task schedule)
- Guide to GPS Metadata in Photos (Part 1): Programs for manipulating metainformation in images
- How to install Kali Linux on a flash drive or external drive as a full-fledged OS
- Arch Linux does not boot: how to fix it
- Script for installing BlackArch in a VirtualBox
- Package management in Kali Linux and other Debian-based distributions (searching, installing and removing programs, troubleshooting)
- Kali Linux Meta-packages
- WSL (Windows Subsystem for Linux): Hints, How-Tos, Troubleshooting
- How to install Kali Linux with Win-KeX (GUI) in WSL2 (Windows Subsystem for Linux)
- How to install Java (JDK) on Windows and Linux
- Automatic installation and update of AUR packages
- How to protect GRUB bootloader with password
- VNC Security Audit
- Default passwords in Kali Linux
- How to reset MySQL or MariaDB root password on Windows
- How to connect to Windows remote desktop from Linux
- How to install and configure RDP server on Linux
- IP calculators
- How to set up the PowerShell environment on Windows and Linux
- How to install and use Ruby on Windows
- How to install Python and PIP on Windows 10. How to set up Python as a web server module
- How to install Kali Linux on DigitalOcean
- How to add Kali Linux repositories to another Linux distribution
- w-e-b.site is a mirror of SuIP.biz
- How to transfer files via SSH
- What files can be deleted if there is not enough disk space on Linux
- Live USB flash drive with Linux does not boot, error ‘A start job is running for live-config contains the components that configure a live system during the boot process (late userspace)’ (SOLVED)
- Linux directory structure. Important Linux files
- Why 404 errors are not saved in Apache error log
- Quick way to decode unknown encoding
- How to install Go (compiler and tools) on Linux
- Commando VM: Windows for Hackers
- How to test email sending in PHP on Windows
- How to protect the Apache web server from hacking in Windows
- How to install a package for which there is no dependency of the required version (in Kali Linux, Debian)
- How to use zcat to concatenate compressed and plain text files
- How to set up OpenVPN server and clients
- Web server installation guide on Windows: Apache, PHP, MariaDB and phpMyAdmin. How to provide local web server security
- How to install Apache, PHP, MySQL, and phpMyAdmin on Windows XP
- How to switch between Internet connections in Windows
- Error “E: Could not access the lock file /var/lib/dpkg/lock” in Kali Linux (SOLVED)
- Setting up network routes: the choice of connection used for the Internet; simultaneous use of multiple connections for different purposes
- How to change Linux boot parameters in UEFI
- How to install MariaDB on Windows. How to upgrade from MySQL to MariaDB on Windows
- How to reset a forgotten login password in Linux
- How to install bWAPP in Web Security Dojo. How to run bee-box in VirtualBox (SOLVED)
- How to upgrade Damn Vulnerable Web Application (DVWA) to the latest release in Samurai Web Testing Framework or Web Security Dojo (SOLVED)
- How to upgrade OWASP Mutillidae II to the latest release in Samurai Web Testing Framework or Web Security Dojo (SOLVED)
- Creating Apache Virtual Hosts on Windows
- How to upgrade from MySQL 5 to MySQL 8
- BackBox Linux Usage Tips and Tricks
- How to make a web-server on Windows accessible to others
- How to install BeEF on Linux Mint or Ubuntu. ERROR: invalid username or password (SOLVED)
- How to install Bettercap on Linux Mint or Ubuntu
- How to install NetBeans 9 for JDK 9 development
- How to install Java 9 (JDK 9, JRE 9) on Linux
- How to install WordPress on Windows
- How to install and run VLC, Google Chrome, and Chromium on Kali Linux
- How to install AMD / ATI Catalyst drivers AKA Crimson 15.12 in BlackArch / Arch Linux with kernel 4.7, 4.8, 4.9, 4.10, 4.11
- Kali Linux Rolling post install tips
- How to install web server on Windows 10 (Apache 2.4, PHP 8, MySQL 8.0 and phpMyAdmin)