Posts

Showing posts with the label Bug

Ethical Hacking Part 4 - Install Kali Linux On Your Computer As Single Boot

Image
Install Kali Linux On Your Computer As  Single Boot Installing Kali Linux on your computer is an easy process. First, you’ll need compatible computer  hardware. Kali is supported on i386, amd64, and ARM (both armel and armhf) platforms.  The hardware requirements are minimal as listed below, although better hardware will naturally provide better performance. The i386 images have a default PAE kernel, so you can run them on systems with over 4GB of RAM. Download Kali Linux and either burn the ISO to DVD, or   prepare a USB stick with Kali Linux Live as the installation medium. If you do not have a DVD  drive or USB port on your computer, check out the Kali Linux Network Install . Installation Prerequisites A minimum of 20 GB disk space for the Kali Linux install. RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more. CD-DVD Drive / USB boot support Preparing for the Installation Download Kali Linux . Burn The Kali Linux ISO

Tools That You Will Need To Start Bug Bounty Hunting & Earn Money By Hacking

Best Tools You Will Need To Start Bug Bounty Hunting & Earn Money By Hacking Below is a must have list of tools which are useful for vulnerability hunting,in no particular order. While some automate the process of searching for vulnerabilities, these should not replace manual work, keen observation and intuitive thinking. Michiel Prins,Co-Founder of Hackerone,deserves a huge thanks for helping to contribute to the list and providing advice on how to effectively use the tools. Burp Suite https://portswigger.net/burp Burp Suite is an integrated platform for security testing and pretty much a must when you are starting out.It has a variety of tools which are helpful, including: • An intercepting proxy which lets you inspect and modify traffic to a site • AnapplicationawareSpiderforcrawlingcontentandfunctionality(either passively or actively) • A web scanner for automating the detection of vulnerabilities • A repeater for manipulating and resending individual requests • A sequ