Skip to main content

Posts

Showing posts from 2019

Find Identifying Information from a Phone Number Using OSINT Tools

Find Identifying Information from a Phone Number Using OSINT Tools Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. It can include the carrier, the owner's name and address, and even connected online accounts. While a phone number may not seem like much information to give out, an OSINT researcher can quickly discover information that ties a phone number to a variety of other clues. The data can be used to detect whether a phone number is a throwaway VoIP number used to hide the owner's identity or a cell phone belonging to a real person. In the event of buying something online or replying to an apartment ad,

How to exploit android device with FatRat on kali linux

 How to exploit android device with FatRat on kali linux  in this video we will learn how can we use fatrat to exploit android lets get the trust ;)

Ethical Hacking with Metasploit: Exploit & Post Exploit

Ethical Hacking with Metasploit: Exploit & Post Exploit Learn Ethical Hacking from scratch with Metasploit , exploit vulnerabilities and become a white hat hacker Ethical Hacking with Metasploit: Exploit & Post Exploit Download What you’ll learn You will become an expert in using Metasploit for ethical hacking and network security. Set up a lab environment to practice hacking Install Kali Linux – a penetration testing operating system Install Windows & vulnerable operating systems as virtual machines for testing Learn Linux commands and how to interact with the terminal Discover vulnerable applications Vulnerability scanning, Exploit, Post Exploit, Payload Gain control over computer systems using server side attacks Exploit vulnerabilities to gain control over systems Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc. Using backdoors to persist on the victim machine The very latest up-to-date information a

The Complete Ethical Hacking Course For 2019!

The Complete Ethical Hacking Course For 2019! Learn how to get started as a professional hacker with this complete course for 2019! The Complete Ethical Hacking Course for 2019! Download What you’ll learn Think like a hacker. Perform effective reconnaissance. Thoroughly scan public networks. Monitor and intercept network traffic. Attack Windows and Linux systems. Penetrate web security. Hack humans using social engineering attacks. Requirements A basic understanding of computer systems. Various open source pentesting applications. Description Would you like to get started as an ethical hacker? Do you want to become a professional penetration tester? Enroll now in The Complete Ethical Hacking Course for 2019 and learn how to  think  like a hacker, and become familiar with the toolkit of a professional pentester. This course covers a wide range of topics relating to network security: Introduction to ethical hacking Rec

SQLmap GUI

SQLmap GUI  download link

drAFL: fuzzing binaries with no source code on Linux

drAFL Original AFL supports black-box coverage-guided  fuzzing  using QEMU mode. Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software; it is responsible for the vast majority of remote code execution and privilege escalation bugs found to date in security-critical software. Unfortunately, fuzzing is also relatively shallow; blind, random mutations make it very unlikely to reach certain code paths in the tested code, leaving some vulnerabilities firmly outside the reach of this technique. There have been numerous attempts to solve this problem. One of the early approaches – pioneered by Tavis Ormandy – is corpus distillation. The method relies on coverage signals to select a subset of interesting seeds from a massive, high-quality corpus of candidate files, and then fuzz them by traditional means. The approach works exceptionally well, but requires such a corpus to be readily available. In addition, block coverage

Learn Network Hacking From Scratch (WiFi & Wired)

Learn Network Hacking From Scratch (WiFi & Wired)   Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks. What you’ll learn 60+ detailed videos about practical networks attacks Control connections of clients around you without knowing the password. Crack WEP/WPA/WPA2 using a number of methods. Hack any computer on the same network. Intercept data and spy on all on the network Gather detailed information about clients and networks like their OS, opened ports …etc. A number of practical attacks that can be used without knowing the key to the target network ARP Spoofing/ARP Poisonning Launch Various Man In The Middle attacks. Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc. Detect ARP poisoning and protect your self and your network against it. You will be able to use more than 20 penetration testing too