Hello guys, back with another video, in his video I’m going to give you an introduction to encryption, hashing and salting, watch it and feel free to ask 🙂 Resources: Lecture slides.
This video shows how to manually create an evil twin network to steal WiFi password / key of a target network. The same method can be used to start a normal fake AP / honeypot for other uses. Resources: Commands. …
We all know the concept of shared hosting (if you don’t know you can read it here) , in this case gaining access to one website could allow us to take control of the complete server and then reach other …
Hello everyone! As you know information gathering is vital for every pentest, therefore in this video I’m going to introduce you to a really cool open source intelligence framework. You’ll learn how to install it and use to gather information …
Hello everyone, this article is going to be a very interesting topic not only to the ethical hackers/cybersecurity researchers but also towards the other people as here we will learn how can we make our own search engine. While there …
In this video we’ll have a look on a tool program that allows us to interact with the Metasploit framewor, generate backdoors and interact with them using a nice and easy-to-use graphical interface. Resources: Kage github repo.