Posts

Dark Academy - Kali Linux Information Gathering Tools WIRESHARK

Image
Wireshark Package Description Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998. Wireshark has a rich feature set which includes the following: Deep inspection of hundreds of protocols, with more being added all the time Live capture and offline analysis Standard three-pane packet browser Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility The most powerful display filters in the industry Rich VoIP analysis Capture files compressed with gzip can be decompressed on the fly Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM,

Dark Academy - Kali Linux Information Gathering Tools NMAP

Understanding Cross-site Scripting Vulnerability - DARK ACADEMY ( Academy of darkness)

Image
Cross-site scripting In this section, we'll explain what cross-site scripting is, describe the different varieties of cross-site scripting vulnerabilities, and spell out how to find and prevent cross-site scripting. What is cross-site scripting (XSS)? Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. It allows an attacker to circumvent the same origin policy, which is designed to segregate different websites from each other. Cross-site scripting vulnerabilities normally allow an attacker to masquerade as a victim user, t

Dark Academy - How to hack with SQL injection attack

Image
SQL injection In this section, we'll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. What is SQL injection (SQLi)? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is abl

Ethical Hacking Part 4 - Install Kali Linux On Your Computer As Single Boot

Image
Install Kali Linux On Your Computer As  Single Boot Installing Kali Linux on your computer is an easy process. First, you’ll need compatible computer  hardware. Kali is supported on i386, amd64, and ARM (both armel and armhf) platforms.  The hardware requirements are minimal as listed below, although better hardware will naturally provide better performance. The i386 images have a default PAE kernel, so you can run them on systems with over 4GB of RAM. Download Kali Linux and either burn the ISO to DVD, or   prepare a USB stick with Kali Linux Live as the installation medium. If you do not have a DVD  drive or USB port on your computer, check out the Kali Linux Network Install . Installation Prerequisites A minimum of 20 GB disk space for the Kali Linux install. RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more. CD-DVD Drive / USB boot support Preparing for the Installation Download Kali Linux . Burn The Kali Linux ISO

Ethical Hacking Part 2 - How To Install & Run Kali Linux as a Windows Subsystem

How To Install & Run Kali Linux As A   Windows Subsystem Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there's another option: installing a Kali subsystem on your Windows computer as a convenient compromise.  Microsoft has introduced Windows Subsystem for Linux, or WSL, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. Thanks to the efforts of Offensive Security and the WSL team at Microsoft, Kali Linux is now the most recent addition to the Microsoft Store. Those familiar with running Kali virtual machines understand the frustration of attempting to use Wi-Fi and Wi-Fi adapters, which is what makes the Windows subsystem so nice. you have no such problems. Additionally, yo