Skip to main content

Posts

Showing posts from 2017

Xerosploit- An Advance MITM attack tool ✓

Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Powered by bettercap and nmap. Dependencies nmap hping3 build-essential ruby-dev libpcap-dev libgmp3-dev tabulate terminaltables Installation Dependencies will be automatically installed. git clone https://github.com/LionSec/xerosploit cd xerosploit && sudo python install.py sudo xerosploit features Port Scanning Network mapping Dos attack HTML code injection Javascript code injection Download intercaption and replacement Sniffing DNS Spoofing Background audio reproduction Images replacement Driftnet Webpage defacement and more...

Kali Linux basic commands for beginners

Wifite

To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool. Features: sorts targets by signal strength (in dB); cracks closest access points first automatically de-authenticates clients of hidden networks to reveal SSIDs numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) customizable settings (timeouts, packets/sec, etc) “anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete all captured WPA handshakes are backed up to wifite.py’s current directory smart WPA de-authentication; cycles between all clients and broadcast deauths stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit displays session summary at exit; shows any cracked keys all passwords saved to cr...

Is Marianas Web A Myth Or A Frightening Reality?

If you’ve been on the Internet for a long time, chances are that you’d be inclined to say you’ve seen it all. Well, let’s just say that you haven’t really seen it all until you’ve seen Marianas Web. Don’t get your keyboard and mouse ready just yet, though – that might prove a bit more difficult than you think. This is because it doesn’t even exist. … Or does it? The Internet Is Like An Onion Just like ogres, the Internet is like an onion: it has many layers. At first glance, conducting a basic Google search and seeing about 168,000,000 distinct results show up is pretty freaking overwhelming. Can you really imagine hundreds of millions of results for ONE keyword alone? In that regard, we suppose, the Internet has grown to be about as vast as the universe itself. Just like there are billions upon trillions of stars, there are billions upon trillions of web pages. However, at the end of the day, the Internet is classified as finite. Because of this, there’s this infamous hierarchy...

Cracking WPA/WPA2 password 40 times faster using hashcat

Linux Basics- Locate files and commands

CyberScan- To find ip location of someone

CyberScan- An information Gathering tool ✔

How list Directory Contents- ✔ (Linux Basics Commands)

Linux Basics Commands for Beginners.

How to Trace anyone's mobile and find their location ✔

Hack Like a Pro (Driftnet – Tool used to sniff your friend's images) ✔

Man In The Middle Attack (MITM) to capture someone's browser data using ...

How to captures someone's data using Websploit- MITM ✔

Websploit WebSploit Is An Open Source Project For: Social Engineering Works Scan,Crawler & Analysis Web Automatic Exploiter Support Network Attacks Autopwn – Used From Metasploit For Scan and Exploit Target Service wmap – Scan,Crawler Target Used From Metasploit wmap plugin format infector – inject reverse & bind payload into file format phpmyadmin Scanner CloudFlare resolver LFI Bypasser Apache Users Scanner Dir Bruter admin finder MLITM Attack – Man Left In The Middle, XSS Phishing Attacks MITM – Man In The Middle Attack Java Applet Attack MFOD Attack Vector USB Infection Attack ARP Dos Attack Web Killer Attack Fake Update Attack Fake Access point Attack Wifi Honeypot Wifi Jammer Wifi Dos Bluetooth POD Attack

RecongDog (All in One) new information Gathering Tool in Kali Linux 2017...

Trity- Email Bombing (Send unlimited emails to the victim) usink Kali Li...

Trity- Make Hacking easier than Ever in Kali Linux ✔

Trace someone's IP Location using Kali Linux

Linux basic commands (Everyone should know)

How to use Ettercap with Driftnet in Kali Linux

How to Dos Attack using Ettercap in Kali Linux

How to download and install Netattack2 tool in Kali Linux.

Sniffing Credentials using Wireshark in Kali Linux

How to Spoof using Ettercap- DNS spoof in Kali Linux

How to hack wifi router password (step by step)

Hack a router login password in Kali Linux using Hydra tool. What is Hydra? Hydra is a password cracking tool which can support many different services. As a password cracking tool- Hydra has been tested on the following Protocols: afp cisco cisco-enable cvs firebird ftp http-get http-head http-proxy https-get https-head https-form-get https-form-post icq imap imap-ntlm ldap2 ldap3 mssql mysql ncp nntp oracle-listener pcanywhere pcnfs pop3 pop3-ntlm postgres rexec rlogin rsh sapr3 sip smb smbnt smtp-auth smtp-auth-ntlm snmp socks5 ssh2 teamspeak telnet vmauthd vnc How to hack router login in Kali Linux Step1: Make a password list and save it as pass.lst or pass.txt using cruch. Open a terminal and type "crunch 3 4 01234567891abcd -o /root/Desktop/pass.lst. Step2: Now start hydra by typing this command: "hydra -s 80 -l admin -P /root/Desktop/pass.txt 192.168.1.1 http-get". Hit Enter. Now wait u...

How to hack (sniff) Instagram pictures using SSLstrip in Kali Linux

How to install VMWare Tools in Kali Linux 2017.1 part 2

How to download and install kali linux 2017.1 in VMWare Workstation Part 1

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper password cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners. Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.

How to scan multiple websites using nmap tool in kali linux using single...

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat),...

How to scan a website using nmap tool in kali linux.

Nmap (Network Mapper) is a security scanner, used to discover hosts and services on a computer network, thus building a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host(s) and then analyzes the responses.

How to download and install tor browser in kali linux.