Cracking Passwords With Hashcat

Cracking Passwords With Hashcat

Hashcat is praised as one of the most advanced, thorough, and powerful password cracking programs available today. It’s also a personal favorite of mine, and we will be going over the basics so you can get started. By the end of this guide, you will attempt to crack as many passwords as you can from a list of many, many hashes created for this tutorial. When you’re done, post a comment below to tell us how many you got, and see how many passwords other people were able to find!…

Best websites to learn hacking | Penetration testing | Ethical

best websites to learn hacking

Hi guys, in this post, I’m willing to give you my list of best websites to learn hacking. Only the freemium ones. So let’s get started, I hope you enjoy! NOTE: ALL OUR TUTORIALS ARE ONLY MEANT FOR EDUCATIONAL PURPOSES. DO NOT BREAK THE LAW. Best websites to learn hacking 1. Hack This Site! This will be always be my personal favorite, it contains awesome challenges from easy to very hard. If you want to start using your brains, try it, it’s worth it. All you need is to do…

How to use the Snort IDS – Part 1

how to use snort

When the defense of your device against attack is at stake, the name of antiviruses and IDSs must come up. And IDS, or an intrusion detection system, tries to detect malicious activity on your computer andinforms you about it. Snort is one of the most well-known IDSs today. In this tutorial,  I will show you how to use it to protect your system against intrusion. Let’s forgo the disclaimer, because this is constructive. Step 1: Snort is a Linux application. If you use Ubuntu,  the repositories for installing Snort should…

How to make a persistent Android backdoor using Metasploit

How to make a persistent android backdoor using Metasploit

Metasploit is one of the most powerful pentesting and exploitation tools out there,  and in this tutorial,  I’ll show you how to use it to create an access backdoor on any android phone and gain control over it. DISCLAIMER: All the information in this article is intended for educational purposes only. I am not responsible for any misuse.  Step 0: Fire up Metasploit If you’re using Kali Linux/BackBox/BackTrack, metasploit comes pre-installed with the system. Otherwise,  you can download it from: https://www.metasploit.com To start it,  go to your terminal and type: msfconsole…

Hiring authors, write for us, get paid in bitcoins!

Hello everyone! As you see in the post title, we are hiring authors! You can start writing for us if you fill the following terms. Requirements You’re interested in IT. Your english grammar is as good as mine or better. Computer Bitcoin address(You can make one for free at blockchain.info) You know how to use WordPress or willing to self-learn Working internet connection What you’re not required Any experience at all To even tell your personal information, just nickname and bitcoin address I think that’s about it. Sounds good right?…

Parrot OS Installation on VMWare Workstation Player

Parrot OS Installation on VMWare Workstation Player

Hello my friends, on this tutorial, I will show Parrot OS Installation process on VMWare Workstation Player. This tutorial assumes that you have got VMWare Workstation installed either on Windows or on Linux. Check out the first step of this tutorial if you don’t have VMWare installed. Please remember to share on social media! You can also consider donating, my BTC and Ether address are in the footer. So, let’s get to the process. Parrot OS Installation Step one, downloading: Download the Parrot OS .iso image from their website. I…

Hack SSH Server with Nmap and Hydra – Pentest guide

hack ssh server

Hello guys, this time I’m going to tell you how to hack SSH Server connection with Nmap and Hydra. Before we get started, let me remind of something: Pengs.WIN penetration testing tutorials are only meant for educational purposes. Harming anyones machines but your own, is illegal. Requirements for this tutorial: Hydra Nmap – Nmap installation guide Wordlist Your own machine or virtual environments to test on The first three are found in Kali Linux, you can use that if you’d like, I’m using Debian with Nmap and Hydra installed. Now…

Scan open ports with Nmap and install latest version of Nmap

scan open ports with nmap

Install latest version of Nmap and scan for open ports with Nmap Hello guys, in this tutorial I will explain how to install latest version of Nmap and scan open ports with nmap of a remote server or computer. Requirements – Linux – A Remote server or machine for scanning, I will be using Nmaps test server scanme.nmap.org Let’s do it. Installing latest Nmap version Head to Nmap download page and download the latest stable tarball. While writing this, the version is 7.50. Remember to change the version to command…

Hack wifi with Kali Linux and Wifite – How To Tutorial

How to hack wifi

Ethical hacking or penetration testing tutorial about how to hack WiFi with Kali Linux using automated wireless auditor called wifite. About Wifite Wifite is an automated wireless hacking script, and very easy to use. It can do all types of most common WiFi attacks. So, let’s fire up Kali Linux, where Wifite is pre-installed. You might also want to check out this guide: How to install Kali Linux on VMWare Player How to hack wifi with kali linux and wifite If you want to attack with WPA/WPA2 attack and try…

How to install Kali Linux on VMWare Player

How to install kali linux on vmware player

This is a simple step by step guide. You will learn “How to install kali linux on VMWare Workstation Player” About VMWare Workstation Player It is free only for personal purposes. There is also available more advanced version called “VMWare Workstation. VMWare Workstation Player install on linux (Debian based, ubuntu etc.) Download it, Click here Open your downloads folder with terminal cd ~/Downloads Then we need to change file permissions to make it executable, find the file with your file manager and copy the name. chmod a+x VMware-Player-yourversionhere.bundle Execute it…