Install Hydra on Linux | Debian | Mint | Ubuntu | Latest version

install hydra on linux debian ubuntu mint

Today I am going to show how to install Hydra on Linux. Hydra is a powerful penetration testing tool. It allows you to brute force almost anything. Please note that all of the tutorials here regarded on penetration testing and ethical hacking are only meant for testing and/or educational purposes. Do not harm anyone’s devices without their permission. Do not break the law. All the credits from this tool goes to van Hauser / THC on GitHub. You will learn how to install Hydra on Linux, Debian based systems, like…

Android Remote Administration Tool for Linux & Windows | AhMyth

Android Remote Administration Tool

This is a tutorial about AhMyth Android Remote Administration Tool for Linux and Windows. Here you will learn how to install it and use it. This could be a good tool for monitoring your minor child movements and actions with his/her mobile device. Note that even monitoring your kid might be illegal in your country. Be sure to check the laws first! All credits go to AhMyth’s developers on GitHub. Disclaimer: You can only use this tool to target your own devices. This websites admin(s) are not responsible for any…

Hide Files Inside Images

Hiding in plain sight is sometimes the best tactic.   For instance, this lovely young lady   Rather unassuming, right? Well, read on and you’ll learn how to extract a hidden message from that picture!   Steganography is “the practice of concealing a file, message, image, or video within another file, message, image, or video.” (Source: Wikipedia) In Linux, the ever-so-handy Steghide allows us to do just that. I know that you and your imagination will come up with all sorts of creative ways to utilize this awesome little program.…

Cracking Passwords With Hashcat

Cracking Passwords With Hashcat

Hashcat is praised as one of the most advanced, thorough, and powerful password cracking programs available today. It’s also a personal favorite of mine, and we will be going over the basics so you can get started. By the end of this guide, you will attempt to crack as many passwords as you can from a list of many, many hashes created for this tutorial. When you’re done, post a comment below to tell us how many you got, and see how many passwords other people were able to find!…

Why you need to secure your Linux Servers

Do you need security for a linux server?

Whats the problem? In the current day and age anyone can build a Linux server. A Google search and a YouTube tutorial and suddenly you have a device that hosts a webpage. It is honestly amazing and it is wonderful to live in a time where anyone can learn about Linux and host a server within minutes. Do any of these tutorials tell you how to secure your server?   Very few of the tutorials I found  warned of the risk of not securing your device. Therefore I set out…

Best encrypted email providers | Only free ones | Security

best encrypted email providers

Hello everyone, today I will share you the best encrypted email providers. I will share only those which have free plans. I hope you enjoy! 1. Tutanota Tutanota is a great German made encrypted email provider. It works perfectly and also has Android and iOS apps available to download. I’ve used the android app for a few months now and can’t complain. Tutanota also offers paid business version. Tutanota automatically encrypts all your data on your device. Your mails as well as your contacts stay private. You can easily communicate…

Best websites to learn hacking | Penetration testing | Ethical

best websites to learn hacking

Hi guys, in this post, I’m willing to give you my list of best websites to learn hacking. Only the freemium ones. So let’s get started, I hope you enjoy! NOTE: ALL OUR TUTORIALS ARE ONLY MEANT FOR EDUCATIONAL PURPOSES. DO NOT BREAK THE LAW. Best websites to learn hacking 1. Hack This Site! This will be always be my personal favorite, it contains awesome challenges from easy to very hard. If you want to start using your brains, try it, it’s worth it. All you need is to do…

The Fact of Ransomware

Ransomware

This article addresses some brief explanation about Ransomware type malware, common prevention suggestions, and possible effective solutions. Ransomware is a special type of malware. The majority of Ransomware relies on some kind of social engineering such as luring the user of the system to perform some form of action. It could be anything from visiting a web page to executing programs that come as deceptive attachments in emails. The strategy is convincing the target that paying necessary fees a solution. Crypto ransomware is the version of Ransomware that encrypts as…

Tips on staying anonymous online – VPN | TOR | Security

Tips on staying anonymous online

On this post, you will learn some tips on staying anonymous online. Staying anonymous online has become a lot harder than we could imagine, your every step is being tracked and logged. Your personal data is been collected all the time by the big companies and governments. Well, here is some tips that can help you prevent that. Let me remind you that all our posts are only made for testing / educational purposes. Do not do anything illegal or you may end up in jail. You and only yourself,…

How to use the Snort IDS – Part 1

snort ids

How to use the Snort IDS? When the defense of your device against attack is at stake, the name of antiviruses and IDS’s must come up. And IDS, or an intrusion detection system, tries to detect malicious activity on your computer andinforms you about it. How to use the Snort IDS Snort is one of the most well-known IDSs today. In this tutorial,  I will show you how to use it to protect your system against intrusion. Let’s forgo the disclaimer, because this is constructive. Step 1: Snort is a…