Stream

Join this community to post or comment

Md Mehedi Hasan

Training / Tutorials  - 
 
Information Gathering with Kali Linux Tools & Techniques.
Information Gathering
One of the most important stages of an attack is information gathering. To be able to launch an attack, we need to gather basic information about our target. So, the more information we get, the higher the probability of a successful attack.

In this session we are going to cover bellow topics
Service enumeration
Determining network range
Identifying active machines
Finding open ports
Operating system fingerprinting
Service fingerprinting
Threat assessment with Maltego
Mapping the network
Service enumeration
In this session, we will perform a few service enumeration tricks. Enumeration is a process that allows us to gather information from a network. We will examine
DNS enumeration
technique.
DNS enumeration is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us to gather information about the organization such as usernames, computer names, IP addresses, and so on.
This Playlist All About Gathering Information by Using Kali Linux Information Gathering Tools On Kali Linux 2016.1
You Will Get Video Tutorials About All Information Gathering Tools Which Using On Kali Linux For Penetrtation Testing
If any questions Ask me on Comment or Contact :
Facebook : https://www.facebook.com/5h4k33lDcr4k3r
Twitter : https://www.twitter.com/mehedi_shakeel
DON'T FORGET TO SUBSCRIBE!!!
Thank You!!!
5
2
Add a comment...

Deborah P

Training / Tutorials  - 
 
Pentesting in #Linux with #Bash has never been easier with this eBook - http://bit.ly/Free-Tech-Learning (free today only).

• Utilize the command line to create, run, and execute tests
• Learn useful command line based information processing utilities and unlock the problem solving power of a Linux terminal
• Practical demonstrations using in-depth explanations and screenshots to help you use the Linux Bash terminal to tackle a collection of common security-related problems.

51
11
Martin Mato's profile photoarkansawdave74's profile photo
14 comments
 
Me too. 
Add a comment...

Dark c0d3r

Training / Tutorials  - 
 
A great tool for manual and static code analysis. Codewarrior (auth @coolervoid) supports all the 'common' use languages.

Just git clone the source. No compile needed, (please see the README below for features and install ... enjoy! ; )
-----------------
https://github.com/CoolerVoid/codewarrior

..please see 'install' notes in the README.md....
https://github.com/CoolerVoid/codewarrior/blob/master/README.md
codewarrior - Just another manual code analysis tool and static analysis tool
6
1
Add a comment...

Ravi Saive

Training / Tutorials  - 
 
 
Deal: Become an #Hacker with ‘Ethical Hacking for Beginners’ Course (54% Off)
The demand for online security experts is always on high, and the Ethical Hacking for Beginners course will enable you to build expertise in an exciting IT
7
4
Add a comment...

tkjcyber id

Training / Tutorials  - 
1
Add a comment...

Mary Topiwala

Training / Tutorials  - 
6
Add a comment...

Dark c0d3r

Training / Tutorials  - 
 
Node.js Vs. Angular2.js
I don't mean to leave y'all with two full users menus for learning the scripts . But one is are book style titis that cover the entire language.

Node.ja 6.5., newer
https://nodejs.org/dist/latest-v6.x/docs/api/

Angular2.js. - skat at #2 down
https://material.angularjs.org/latest/getting-started
Assertion Testing · Buffer · C/C++ Addons · Child Processes · Cluster · Command Line Options · Console · Crypto · Debugger · DNS · Domain · Errors · Events · File System · Globals · HTTP · HTTPS · Modules · Net · OS · Path · Process · Punycode · Query Strings · Readline · REPL · Stream ...
7
Dark c0d3r's profile photo
 
I see they put in a new 'decoder' :class

('string_decoder').StringDecoder ;

Maybe they created an api from the scripts in the "official" site of utf8, they have an online engine::
http://utf-8.jp/public/jjencode.html
Add a comment...

Dark c0d3r

Training / Tutorials  - 
 
A good simplified setup and use the Volatility tool in Kali. Scan your ram for malware or suspicious apps. I admit I haven't used it much but I'm sure I need a good analysis. O_o

Thanks to the "LinOxide team" for the another great tuto... Enjoy … /; >

http://linoxide.com/linux-how-to/setup-volatility-memory-analysis/
This article is about volatility, open source tool for volatile memory analysis. It features include a plugin to detect malicious code in the process.
12
5
Add a comment...

Tech Boom

Training / Tutorials  - 
 
HOW TO HACK/SEE ANY WIFI PASSWORD IN YOUR CITY | 100% WORKING! ( EASY HACK ) WIFI HACK.
6
3
Add a comment...

TecMint Linux

Training / Tutorials  - 
 
 
Kali Linux – Fresh Installation Guide

#linux #sysadmin #tecmint
The focus of this guide and future articles is to help individuals become more familiar with Kali Linux and several of the tools available within the
34
4
Spanish WhiteHat's profile photo
 
Nice!!!
Add a comment...

Ephraim Mwongereza

Training / Tutorials  - 
 
How to use Firewalk in Kali Linux
#Pentesting #Hacking 
Today, we’re going to be running through a Firewalk tutorial using Kali Linux. But first, we need to understand what Firewalk does and why it’s important for hackers
11
4
Alan Olsen's profile photo
 
"Through the darkness of future past / The magician longs to see / One chants out between two worlds / Fire walk with me."
imdb.com
Add a comment...

JJ Hsu

Training / Tutorials  - 
 
The last time I tried... The Air-ng somehow doesn't detect the Raspberry Pi WiFi driver...

Any advise? 
2
More Styles's profile photo
 
Its airmon-ng
Add a comment...

Deborah P

Training / Tutorials  - 
 
Exploit human weakness for #infosec with this free eBook - http://bit.ly/Free-Tech-Learning (available only today).

What You Will Learn:
• Clone websites to gain a victim's passwords and security information
• Undertake credential harvester attacks through spear-phishing and web jacking
• Perform client-side attacks through SET
• Get hands on with practical advice on eliciting identity details
• Counteract these techniques if they are being used against you

21
1
Add a comment...

Null Zero

Training / Tutorials  - 
 
Recon phase to find clients before cloning target access point. Load wifiphisher and scan targets. Once at target list, find a target and remember or copy its MAC address. Then open another terminal and create a file:- nano...
3
Add a comment...

Ephraim Mwongereza

Training / Tutorials  - 
 
Snagging creds from locked machines.
This trick tested on all windows computer except win 8. It work also on Mac computers
#Hacking


First off, this is dead simple and shouldn't work, but it does. Also, there is no possible way that I'm the first one that has identified this, but here it is (trust me, I tested it so many ways to confirm it because I couldn't believe it was true). TL;DR USB Ethernet + DHCP + Responder == Creds ...
25
8
Null Zero's profile photoChandra Majumdar's profile photo
Add a comment...

Werner Diedericks

Training / Tutorials  - 
 
HI Does anyone know where I can get a copy of the ransomware virus,?I like to run it in a lab environment for some testing.
1
Archer Sterling's profile photoWerner Diedericks's profile photo
9 comments
 
Can you send me some of the source code, I will compile it and then use it.?
Add a comment...

Dark c0d3r

Training / Tutorials  - 
 
Linux and MSF fans::
How to use the Reverse Shell payload in Metasploit with your perspective Meterpreter ''clients' …

#Metasploit #Kali #ReversShell

https://github.com/rapid7/metasploit-framework/wiki/How-to-use-a-reverse-shell-in-Metasploit
10
Dark c0d3r's profile photo
5 comments
 
+Ian Grody. Sorry, I completely misinterpreted that when you asked who was buying them..

I believe it was Fire Eye, the holy grail of IDS. I can see how they would benefit from Metasploit's RnD. They are ruthless about finding new vulz. They would make a good team.
Add a comment...

Dark c0d3r

Training / Tutorials  - 
 
The esteemed "Violent Python" scripts...

A WHOLE 7 chapters, each full of some mean py scripts ready to deploy.!! A good set to DL an have around when u need them...

https://github.com/shadow-box/Violent-Python-Examples?files=1
11
4
Dark c0d3r's profile photoJohn Cater's profile photo
9 comments
 
Thz for shareing +Dark c0d3r​
Add a comment...

Tech Boom

Training / Tutorials  - 
 
How To Hack Wifi Password In Your Android Device | 100% Working ( 2016 )
7
Gavin Grant's profile photo
 
But what type of encryption, this only uses WPS - i only see bcmon as the only option

Add a comment...