Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

How to speed up the generation of dictionaries with passwords

In one of the comments under the article on creating dictionaries, I was asked how to make the program use GPU in order to create passwords even faster. But this is the wrong question, the fact is that the speed of creating passwords is primarily limited by the speed ofRead More

How to create dictionaries that comply with specific password strength policies

Dictionaries that contain all groups of characters Nowadays, many services, operating systems and websites have requirements for the complexity of the password that you want to use for your account. As a rule, it must be a password of at least a certain length and containing various groups of charactersRead More

Guide to GPS Metadata in Photos

1. Programs for manipulating metainformation in images 1.1 How to install ExifTool on Windows and Linux 1.2 How to install Exiv2 on Windows and Linux 1.3 How to install Geotag on Windows and Linux 2. How to understand, extract and convert geographic coordinates 2.1 Metadata editing software for Windows and Linux 2.2 What isRead More

Bless manual (hex editor)

Table of contents 1. Introduction 2. Building and Installing Bless 3. Getting Started 4. Using Bless 5. Customizing Bless 6. Frequently Asked Questions 7. About Bless Note: This tutorial for Bless (a great hex editor) was written by Alexandros Frantzis. This tutorial is already available online at https://github.com/afrantzis/bless/tree/master/doc/user/C. But itRead More

Guide to GPS Metadata in Photos (Part 4): How to build motion tracks based on a group of photos

Table of Contents: Guide to GPS Metadata in Photos 1. Programs for manipulating metainformation in images 2. How to understand, extract and convert geographic coordinates 3. How to spoof GPS and other metadata in photos 4. How to build motion tracks based on a group of photos 4.1 Reconstruction of movementsRead More

Guide to GPS Metadata in Photos (Part 3): How to spoof GPS and other metadata in photos

Table of Contents: Guide to GPS Metadata in Photos 1. Programs for manipulating metainformation in images 2. How to understand, extract and convert geographic coordinates 3. How to spoof GPS and other metadata in photos 3.1 How to find out the coordinates of any place 3.2 Metadata tag names. Tag groups 3.3 Programs displayRead More

Guide to GPS Metadata in Photos (Part 2): How to understand, extract and convert geographic coordinates

Table of Contents: Guide to GPS Metadata in Photos 1. Programs for manipulating metainformation in images 2. How to understand, extract and convert geographic coordinates 2.1 Metadata editing software for Windows and Linux 2.2 What is geographical coordinates 2.3 Geographic coordinate formats 2.4 How to output coordinates in decimal numbers from GPS metadata 2.5 How toRead More

Guide to GPS Metadata in Photos (Part 1): Programs for manipulating metainformation in images

Table of Contents: Guide to GPS Metadata in Photos 1. Programs for manipulating metainformation in images 1.1 How to install ExifTool on Windows and Linux 1.2 How to install Exiv2 on Windows and Linux 1.3 How to install Geotag on Windows and Linux 2. How to understand, extract and convert geographic coordinates 3.Read More

IP camera security audit

How to hack an IP camera? I helped a friend to set up the camera and I got a lot of wonderful observations. A camera with the latest firmware from this year, there is a modern application for mobile phones for it, to register in the application you need toRead More

Wi-Fi adapter Qualcomm Atheros QCA9377 does not capture data packets in monitor mode (SOLVED)

Description of the problem: airodump-ng and similar programs for auditing Wi-Fi security do not capture data in monitor mode when using a Wi-Fi adapter with Qualcomm Atheros QCA9377 chipset. This problem is discussed on the forum in these threads: https://forum.aircrack-ng.org/index.php?topic=2554.0 https://forum.aircrack-ng.org/index.php/topic,2545.0.html That is, monitor mode works, but the wireless adapterRead More

Posts navigation

OLDER ENTRIES
NEWER ENTRIES
© 2021: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress