Posts

Showing posts from March, 2020

Ethical Hacking Part 4 - Install Kali Linux On Your Computer As Single Boot

Image
Install Kali Linux On Your Computer As  Single Boot Installing Kali Linux on your computer is an easy process. First, you’ll need compatible computer  hardware. Kali is supported on i386, amd64, and ARM (both armel and armhf) platforms.  The hardware requirements are minimal as listed below, although better hardware will naturally provide better performance. The i386 images have a default PAE kernel, so you can run them on systems with over 4GB of RAM. Download Kali Linux and either burn the ISO to DVD, or   prepare a USB stick with Kali Linux Live as the installation medium. If you do not have a DVD  drive or USB port on your computer, check out the Kali Linux Network Install . Installation Prerequisites A minimum of 20 GB disk space for the Kali Linux install. RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more. CD-DVD Drive / USB boot support Preparing for the Installation Download Kali Linux . Burn The Kali Linux ISO

Ethical Hacking Part 2 - How To Install & Run Kali Linux as a Windows Subsystem

How To Install & Run Kali Linux As A   Windows Subsystem Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there's another option: installing a Kali subsystem on your Windows computer as a convenient compromise.  Microsoft has introduced Windows Subsystem for Linux, or WSL, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. Thanks to the efforts of Offensive Security and the WSL team at Microsoft, Kali Linux is now the most recent addition to the Microsoft Store. Those familiar with running Kali virtual machines understand the frustration of attempting to use Wi-Fi and Wi-Fi adapters, which is what makes the Windows subsystem so nice. you have no such problems. Additionally, yo

How To Send Free Spoofing Sms To Any Mobile Number Using Metasploit

How To Send Free Spoofing Sms To Any Mobile Number Using Metasploit STEP 1 In your terminal type in                  diago@Diago-Dpoison:~$ sudo service postgresql start         [sudo] password for diago:          Starting PostgreSQL 12 database server: main.          diago@Diago-Dpoison:~$ sudo service ssh start          Starting OpenBSD Secure Shell server: sshd.          diago@Diago-Dpoison:~$ msfconsole          msf5 > search auxiliary/client/sms/send_text          msf5 > use auxiliary/client/sms/send_text               auxiliary(client/sms/send_text          msf5 > auxiliary(client/sms/send_text) > show options    Module options (auxiliary/client/sms/send_text):    Name          Current Setting  Required  Description    ----          ---------------  --------  -----------    CELLNUMBERS                    yes       The phone numbers to send to    SMSCARRIER                        yes       The targeted SMS service provider (Accepted: allt

Ethical Hacking 3 - How To Install Kali Linux Tools In Ubuntu Terminal Using Katoolin

Katoolin is a Python script that allows the installation of Kali Linux tools at once automatically or manually one by one. In this tutorial, we are going to show you how to install Kali Linux Tools using Katoolin on Ubuntu. Installing Kali Linux Tools using Katoolin on Ubuntu Prerequisites In order to install Kali Linux Tools, we first need to install the following one by one:     Git     Python 2.7     Katoolin Step 1 – Install Git Launch the Terminal and enter the following command to install Git. sudo apt-get install git Check the Git version. As of today, it’s version 2.17.1. sudo git --version Git Version Step 2 – Install Python Check for available Python version. sudo apt-cache policy python Available Python Version Start install Python 2.7. sudo apt-get install python Now check for installed version: sudo python -V Installed Python 2.7 Step 3 – Install Katoolin Before installing Katoolin, clone git repository to our current loc

Tools That You Will Need To Start Bug Bounty Hunting & Earn Money By Hacking

Best Tools You Will Need To Start Bug Bounty Hunting & Earn Money By Hacking Below is a must have list of tools which are useful for vulnerability hunting,in no particular order. While some automate the process of searching for vulnerabilities, these should not replace manual work, keen observation and intuitive thinking. Michiel Prins,Co-Founder of Hackerone,deserves a huge thanks for helping to contribute to the list and providing advice on how to effectively use the tools. Burp Suite https://portswigger.net/burp Burp Suite is an integrated platform for security testing and pretty much a must when you are starting out.It has a variety of tools which are helpful, including: • An intercepting proxy which lets you inspect and modify traffic to a site • AnapplicationawareSpiderforcrawlingcontentandfunctionality(either passively or actively) • A web scanner for automating the detection of vulnerabilities • A repeater for manipulating and resending individual requests • A sequ

Ethical Hacking Part 1 - How To Hack Computer System, Web, API ,IOT, Android/iOS

HACK ALL THE THINGS: WEB, ANDROID/IOS, APIS, IOT,  AND MORE. Hackers are securing the products we use every single day. Utilize these resources to expand your knowledge about the fascinating field of cyber security and begin your hacker journey.Want to learn how to hack? Join thousands of others who have developed in-demand cyber security skills and who are earning cash from hacking.  You too can become a hacker. In fact, many people don't realize that they often have a hacker skill set already! Hackers are curious and find clever ways around obstacles in systems.So in this article we will discuss about tools, application and repositories, plugins and more.So we will start our journey by knowing Kali Linux. What is Kali Linux? Kali Linux  is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security res

How To Use WMAP Web Scanner In Metasploit For Scanning Web Server Vulnerability

Image
What WMAP is a feature-rich web application vulnerability scanner that was originally created from a tool named SQLMap . This tool is integrated with Metasploit and allows us to conduct web application scanning from within the Metasploit Framework. Vulnerability Scanning with WMAP We begin by first creating a new database to store our WMAP  scan results in, load the wmap plugin, and run  help to see what new commands are available to us.   msf >load wmap   Prior to running a web app scan, we first need to add a new target URL by passing the -a switch to wmap_sites . Afterwards, running wmap_sites -l will print out the available targets. 0 172.16.194.172 172.16.194.172 80 http 0 0 Next, we add the site as a target with wmap_targets . Once added, we can view our list of targets by using the -l switch from the console. Using the wmap_run command will scan the target system.