Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

Programs for extracting information from the Windows registry

mimikatz Program mimikatz has many features related to Windows security and stored passwords. Among other things, the program can extract passwords, secrets and hashes both from the system it is running on and from the saved files of the registry hives. Instructions: How to hack a Windows password How toRead More

How to open disks of virtual machines and download and upload files to them (SOLVED)

libguestfs for working with virtual machine disks The libguestfs (libguestfs.org) package is required to work with virtual machine images. libguestfs is a set of tools for accessing and modifying virtual machine (VM) disk images. You can use this for viewing and editing files inside guests, scripting changes to VMs, monitoringRead More

Practical examples of Hashcat usage

Table of contents 1. Hashcat command structure 2. Examples of Hashcat masks 3. Frequently used Hashcat options 4. How to extract hashes and find out their numbers for cracking in Hashcat 5. How to hack Wi-Fi password in Hashcat 5.1 Capturing Wi-Fi handshake for password cracking 5.2 How to extract hash for Wi-Fi hacking 6. HowRead More

Examples of using HTTP headers for “hidden” data transfer

How to view HTTP headers How to see HTTP headers in a web browser This is the easiest method available on any operating system. Press F12 in your web browser and open the page of interest. Go to the Network tab and select the connection you are interested in. GoogleRead More

Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 2)

This is the second collection of Kali Linux tools that work great in WSL (Windows Subsystem for Linux), yet are simple enough to be used by any Windows user, regardless of their Linux skills. Of course, it is recommended to start with the “Best Kali Linux tools in WSL (WindowsRead More

How to hack HTTP Basic and Digest Authentication

Table of contents 1. What is HTTP Basic and Digest Authentication 2. How Relevant are HTTP Basic and Digest Authentication 3. How to enable password protection with HTTP Basic and Digest authentication 3.1 How to enable HTTP Basic Authentication in Apache (Kali Linux, Ubuntu, Debian, Linux Mint) 3.2 How to enable HTTP Digest AuthenticationRead More

How to use User Agent to attack websites

What Is a Browser's User Agent? The User Agent is a string of text that identifies the browser and operating system for the web server. User Agent is passed in the HTTP header when the browser makes a request to the web server. You can view the transmitted HTTP headers, includingRead More

How to install Kali Linux on a flash drive or external drive as a full-fledged OS

Table of contents 1. Installing Kali Linux on a memory card or external USB drive: what is different? 2. USB flash drive for Kali Linux 3. Erasing the USB memory stick to install the operating system 4. Instructions for installing Kali Linux on a USB memory stick 5. Booting Kali Linux from a USBRead More

What is HNAP, how to find and exploit routers with HNAP

Among the Router Scan modules, you can see “Use HNAP 1.0”. Among the scan results, on the very right side of the table, in the Comments column, you can find “HNAP bypass auth”. That is, this protocol is used to bypass authentication. In this article, we will learn what HNAPRead More

How to speed up the scanning of large networks ranges

The article “How to find out local IP addresses of ISP” discusses scanning ISP users on local networks such as 10.0.0.0/8, 172.16.0.0/12, 100.64.0.0/10. This is the only possible way to scan for hosts that are behind NAT. But the problem is that these networks are large – they have aRead More

Posts navigation

OLDER ENTRIES
NEWER ENTRIES
© 2021: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress