Ninja KeyLogger and Analysis Console Synopsis: This KeyLogger was written as a passive penetration testing tool as a ‘plug and forget payload’. It is used essentially to spy on compromised machines as a part of Post Exploitation attacks. It can also …
Two days ago the newest version of Kali 2018.1 was released, as usual this brought a bunch of update, upgrades, patches and bug fixes. One of the major components that got updated in this release is the kernel, Kali 2018.1 …
One of the most common questions that I get in my courses if not the most common questions is “I imported virtual box image, started the machine and got a blank black screen”, this is basically just a black screen …
Hello, today I’m gonna share my knowledge about how to gather information of a website before you attack it or discover any vulnerabilities. Commonly, hackers they call this phase as Reconnaissance. Which means you are going to collect useful information …
We all used a captive portal at some stage, these are open networks that you can connect to without a password, but then it would ask you to sign in to access the internet, captive portals are usually used in …
Its been a while, sorry about that but I’ve been very busy with a number of projects. I made this video here to end the confusion once and for all, one of the most common questions that I get is …