Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

How to change Kali Linux language without reinstalling the system

Locale When installing Linux, you can select the system language (locale) - and in the future this language will be used in Linux programs and windows (except for those applications for which no translation has been made). If you decide to change the Linux language, then you do not needRead More

What is the MySQL root password in Kali Linux. How to change/reset MySQL root password in Kali Linux

How to set root password to start using MySQL For a newly installed MySQL, the root user password is empty.  You can log into MySQL (MariaDB) with the following command without even entering your password: sudo mysql -u root To set the root password run and follow the instructions: sudoRead More

autovpn2 and autovpn3 - scripts to automatically connect to a free VPNs

Free VPNs with easy setup I already talked about the autovpn program in the article “Free easy way to hide IP in Linux”. The essence of its work is as follows: it downloads a list of free VPN servers, searches them for VPN servers from the country you specified, andRead More

How to try Linux: install to USB, virtual machine, or something else?

Will Kali work better installed on USB or virtual machine? I would install it on the HDD, but I still need Windows as my primary OS. Or suggest your own version. All variants have pros and cons. 1. Typical installation in a virtual machine Advantages: Safe (do not harm theRead More

How to run terminal as root in Kali Linux? How to run a GUI program as root

What needs to be done to make the terminal run as root? Let's consider several options 1. Switch to root user In recent versions of Kali Linux, the default user has changed: before it was root, and now it is a regular user. If you want to revert to theRead More

How to set up Tor hidden service in Debian (Kali Linux, Linux Mint, Ubuntu)

What is Tor Hidden Service and How to Do It If you are already using hidden TOR services, then make sure you have the address and keys of the third version. That is, earlier the addresses were something like this: hacktoolseqoqaqn.onion And now they have become something like this: hacking5xcj4mtc63mfjqbshn3c5oa2ns7xgpiyrg2fenl2jd4lgooad.onionRead More

How to get a custom domain name for Tor hidden service

Anyone can create their own Tor hidden service. You can find detailed instructions on how to do this by following the links How to set up Tor hidden service in Debian (Kali Linux, Linux Mint, Ubuntu) How to install Tor and create Tor hidden service on Windows The hidden serviceRead More

Reverse engineering of network traffic

Reverse engineering is the study of a device or the operation of something not based on documentation, drawings, etc., but through disassembly, analysis of components, analysis of work. The same principles apply to software. For example, if the network protocol is proprietary and there is no documentation or source codeRead More

How to manage cameras via DVR-IP, NetSurveillance, Sofia protocol (NETsurveillance ActiveX plugin XMeye SDK)

DVR-IP, NetSurveillance, Sofia The NETSurveillance ActiveX plugin uses a TCP based protocol called just as the “Digital Video Recorder Interface Protocol” by the “Hangzhou male Mai Information Co”. There is very little software or documentation that supports it other than the tools provided by the manufacturers of these cameras, makingRead More

Camera control software (watching video, downloading video to PC, task schedule)

Surveillance camera manufacturers are currently focusing on mobile camera control clients and cloud storage, in the same time universal desktop clients either missing or not working. This manual will tell you about a program that can work with many IP surveillance cameras, especially those made in China. Unfortunately, not everythingRead More

Posts navigation

OLDER ENTRIES
NEWER ENTRIES
© 2021: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress