Hey Guys , I am back , in todays tutorial I’ll be showing you how to crack/brute-force password protected files using a tool called Zydra. Requirements: 1.Python 3.3 or higher 2.Operating System Preferbally Debian Based Installation: 1.sudo apt-get update …
Hey Guys , in this video we’ll be talking about Malware Analysis. We’re gonna introduce you to the basics so you can expand more and learn more about this topic if you’re interested in it. Resources: The Slides Shown : …
Previously we covered how to use Hashcat to crack WPA/WPA2 passwords using the GPU. Hashcat can be used to crack so many different types of hashes though and it can actually use both the CPU and GPU for cracking. The …
Previously we covered how to steal the login password using a fake login prompt, but what if you can’t ask the user to enter the password? In this video you’ll learn how to bypass Windows and OS X login screens …
CSRF or Cross Site Request Forgery is a very common vulnerability that allows attackers to forge requests and get users to execute them ultimately resulting in the user submitting unwanted requests which could change their password or purchase items! In …
Nmap or the Network Mapper is a great tool to discover hosts, open ports and running services. This information is very important at the information gathering stage to get a clear understanding of your target and can greatly improve the …