This video answers a very common question in regards to hacking, is hacking legal? or is it illegal? check it out and let me know what you think.
This video shows how to manually create an evil twin network to steal WiFi password / key of a target network. The same method can be used to start a normal fake AP / honeypot for other uses. Resources: Commands. …
Ever wondered how printers get hacked ? if so then this is the right video for you ! In this video I’ll be discussing the a number of methods to hack printers . Tools Needed : https://www.shodan.io Framework : https://github.com/RUB-NDS/PRET …
Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent …
Previously LordVordex published a post on using Servio to forward ports without router access, Serveo.net is great for port forwarding but due to some issues the service sometimes gets temporarily disabled. Luckily serveo.net isn’t the only port forwarding / tunnelling …
Two days ago the newest version of Kali 2018.1 was released, as usual this brought a bunch of update, upgrades, patches and bug fixes. One of the major components that got updated in this release is the kernel, Kali 2018.1 …