Hide Files Inside Images

Hiding in plain sight is sometimes the best tactic.   For instance, this lovely young lady   Rather unassuming, right? Well, read on and you’ll learn how to extract a hidden message from that picture!   Steganography is “the practice of concealing a file, message, image, or video within another file, message, image, or video.” (Source: Wikipedia) In Linux, the ever-so-handy Steghide allows us to do just that. I know that you and your imagination will come up with all sorts of creative ways to utilize this awesome little program.…

Cracking Passwords With Hashcat

Cracking Passwords With Hashcat

Hashcat is praised as one of the most advanced, thorough, and powerful password cracking programs available today. It’s also a personal favorite of mine, and we will be going over the basics so you can get started. By the end of this guide, you will attempt to crack as many passwords as you can from a list of many, many hashes created for this tutorial. When you’re done, post a comment below to tell us how many you got, and see how many passwords other people were able to find!…

Tips on staying anonymous online – VPN | TOR | Security

Tips on staying anonymous online

On this post, you will learn some tips on staying anonymous online. Staying anonymous online has become a lot harder than we could imagine, your every step is being tracked and logged. Your personal data is been collected all the time by the big companies and governments. Well, here is some tips that can help you prevent that. Let me remind you that all our posts are only made for testing / educational purposes. Do not do anything illegal or you may end up in jail. You and only yourself,…

Create bootable USB on Linux terminal

create bootable usb on linux terminal

On this tutorial we will create bootable USB on Linux terminal. Distribution I will be using is Debian 9, but this method should work on almost any distro. Stick in your USB drive and make sure it has enough space to extract your .iso file whatever it is. I’m going to use debian.iso as example. Then you will need to find the path to your .iso file. In my case it’s /home/h/Downloads/debian.iso Then find your USB device path by executing the following command in your terminal as root or sudo…

Hiring authors, write for us, get paid in bitcoins!

Hello everyone! As you see in the post title, we are hiring authors! You can start writing for us if you fill the following terms. Requirements You’re interested in IT. Your english grammar is as good as mine or better. Computer Bitcoin address(You can make one for free at blockchain.info) You know how to use WordPress or willing to self-learn Working internet connection What you’re not required Any experience at all To even tell your personal information, just nickname and bitcoin address I think that’s about it. Sounds good right?…

Parrot OS Installation on VMWare Workstation Player

Parrot OS Installation on VMWare Workstation Player

Hello my friends, on this tutorial, I will show Parrot OS Installation process on VMWare Workstation Player. This tutorial assumes that you have got VMWare Workstation installed either on Windows or on Linux. Check out the first step of this tutorial if you don’t have VMWare installed. Please remember to share on social media! You can also consider donating, my BTC and Ether address are in the footer. So, let’s get to the process. Parrot OS Installation Step one, downloading: Download the Parrot OS .iso image from their website. I…

Hack SSH Server with Nmap and Hydra – Pentest guide

hack ssh server

Hello guys, this time I’m going to tell you how to hack SSH Server connection with Nmap and Hydra. Before we get started, let me remind of something: Pengs.WIN penetration testing tutorials are only meant for educational purposes. Harming anyones machines but your own, is illegal. Requirements for this tutorial: Hydra Nmap – Nmap installation guide Wordlist Your own machine or virtual environments to test on The first three are found in Kali Linux, you can use that if you’d like, I’m using Debian with Nmap and Hydra installed. Now…

Customize your GNOME 3 desktop looks

customize your gnome 3 desktop

Customize your GNOME 3 desktop to look fabulous Hello everybody! In this article, I am going to show to many ways ways to customize your GNOME 3 desktop. You are able to modify any Linux operating system desktop looks with Gnome 3 desktop environment. How ever in this tutorial I will be using Debian 9 Strecth. This doesn’t mean that you have to be using the exact same distribution, but some modifications in commands may have to be made for our customizations to work, or certain files may be in…

Upgrading Debian 8 “Jessie ” to Debian 9 “Stretch”

Upgrading Debian 8 "Jessie " to Debian 9 "Stretch"

Upgrading Debian 8 “Jessie ” to Debian 9 “Stretch” In this article, we will be upgrading Debian 8 “Jessie ” to Debian 9 “Stretch” by Linux command line. Method will work both, desktop and server systems. You might also want to read Debians “Whats new on Debian 9” article to make sure you really wanna do it. For example, in the update, Debian 9 will replace MySQL with MariaDB, there is more details about that and other stuff in this article. Now we should get to work and go for…

Configure sudo and add user to sudoers group on Debian

Configure sudo and add user to sudoers group on Debian

Configure sudo and add user to sudoers group on Debian In this article you will learn how to configure sudo and add user to sudoers group on Debian. This method will work both desktop and server versions of Debian. About sudo sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user, by default the superuser. It originally stood for “superuser do” as the older versions of sudo were designed to run commands only as the superuser. Source: Wikipedia…