Previously we covered how to use Hashcat to crack WPA/WPA2 passwords using the GPU. Hashcat can be used to crack so many different types of hashes though and it can actually use both the CPU and GPU for cracking. The …
Previously we covered how to steal the login password using a fake login prompt, but what if you can’t ask the user to enter the password? In this video you’ll learn how to bypass Windows and OS X login screens …
CSRF or Cross Site Request Forgery is a very common vulnerability that allows attackers to forge requests and get users to execute them ultimately resulting in the user submitting unwanted requests which could change their password or purchase items! In …
Nmap or the Network Mapper is a great tool to discover hosts, open ports and running services. This information is very important at the information gathering stage to get a clear understanding of your target and can greatly improve the …
Hello guys, back with another video, in his video I’m going to give you an introduction to encryption, hashing and salting, watch it and feel free to ask 🙂 Resources: Lecture slides.
This video shows how to manually create an evil twin network to steal WiFi password / key of a target network. The same method can be used to start a normal fake AP / honeypot for other uses. Resources: Commands. …