Skip to main content

Posts

Showing posts from April 2, 2017

what is the best programming language

what is the best programming language   or what is the  programming language that you should  learn  it first ومن يريد جميع الكتب المذكوره بالصوره فهذه هي روابط الكتب 1--python https://www.up-4ever.com/55xukx3vfkgb 2--java https://www.up-4ever.com/yjquk2d7tnrh 3--java script https://www.up-4ever.com/o10zu39zc4fy 4--ruby https://www.up-4ever.com/ogumny86ju6s 5--c# https://www.up-4ever.com/7ghg4guzb06q 6--c++ https://www.up-4ever.com/7f2mbsu6td73 7--php https://www.up-4ever.com/m8ec1mm7z74w 8--c https://www.up-4ever.com/xw8zcus5wxqd 9--c{opjective} https://www.up-4ever.com/8ee2xwstdnlz

Creating an Evil Twin Wireless Access Point to Eavesdrop on Data

Creating an Evil Twin Wireless Access Point to Eavesdrop on Data Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point . Many new hackers are anxious to crack Wi-Fi passwords to gain some free bandwidth (don't worry, we'll get to that), but there are so many other Wi-Fi hacks that are far more powerful and put so much more at risk than a bit of bandwidth. What's an Evil Twin AP? The evil twin AP is an access point that looks and acts just like a legitimate AP and entices the end-user to connect to our access point. Our aircrack-ng suite has a tool, airbase-ng , that can be used to convert our wireless adapter into an access point. This is a powerful client-side hack that will enable us to see all ...

passing the hash

passing the hash  expert metasploit penetration testing course 

Set Up an Eviltwin

Set Up an Eviltwin When I tried to set up an eviltwin for a MitM-constelation in kali 2.0, I couldn't provide internet to the victim. The origin was the brctl bridging. I have read many tutorials but all of them where explained in backtrack and older versions of kali. So i was searching for a solution without using brctl and this solution will be explained now. This will just work on unencrypted wireless-environments. Step 1 Sniff the Air First victims AP information must be observerd set wifi-adpater in monitor mode there are two options to do so, I prefer this commands "ifconfig wlan0 down" "iwconfig wlan0 mode monitor" "ifconfig wlan0 up" this is the second one "airmon-ng start wlan0" if you have trouble with this type "airmon-ng check" and maybe kill some of the PIDS, but be aware...

How to Remotely Install a Keylogger onto Your Girlfriend's Computer

How to Remotely Install a Keylogger onto Your Girlfriend's Computer Welcome back, my greenhorn hackers! Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES"! So, by popular request, in this guide I'll show you how to install a keylogger on your girlfriend's, boyfriend's, wife's, or husband's computer. For those of you wondering what a keylogger is, the simple answer is that it's a piece of software or hardware that captures every keystroke and saves them for retrieval by you, the attacker. These types of devices have long been used by hackers to capture logins, passwords, social security numbers, etc. Here we will use it to capture the keystrokes of a cheating girlfriend. S...