from Pocket https://ift.tt/pd8eDCj via IFTTT
Posts
Multiple Ways to Embed a Payload in an Original APK File
- Get link
- X
- Other Apps
How to change hostname in Kali Linux?
- Get link
- X
- Other Apps
Kali Linux is becoming popular and more and more users are using it to try out different things. When installing kali, you get to choose a hostname, but in case you accepted the default hostname (kali) and later want to change it, here’s a How to guide to change hostname in Kali Linux. from Pocket https://ift.tt/j7gyAdL via IFTTT
Giving the computer an IP address
- Get link
- X
- Other Apps
There are two ways that a computer can obtain those details. Either automatically, or via manual configuration. In a home network, the router usually decides how the LAN should work. The router will forward traffic between the clients on the LAN and also between the LAN and the Internet. from Pocket https://ift.tt/UT8c6S3 via IFTTT
Windows: Configure Static Host Name to IP Address Mappings
- Get link
- X
- Other Apps
Using the hosts file, ip addresses can be mapped to hostnames. This is useful to access systems that do not have a DNS entry and for test and development purposes. The hosts file exists in the SYSTEM32\DRIVERS\ETC directory under the Windows root directory (i.e., \WINDOWS or \WINNT). from Pocket https://ift.tt/bVNkAuo via IFTTT
Locator : Geolocator, IP Tracker, Device Info by URL (Serveo & Ngrok)
- Get link
- X
- Other Apps
The Real way to get geo-location of any device with Kali Linux
- Get link
- X
- Other Apps
Brute force against SSH and FTP services
- Get link
- X
- Other Apps
Bruteforce is among the oldest hacking techniques, it is also one of the simplest automated attacks requiring minimum knowledge and intervention by the attacker. The attack consists in multiple login attempts using a database of possible usernames and passwords until matching. from Pocket https://ift.tt/YO9hieu via IFTTT
Hacking Tools for Penetration Testing – Fsociety in Kali Linux
- Get link
- X
- Other Apps
How to attack Windows 10 machine with metasploit on Kali Linux [updated 2021]
- Get link
- X
- Other Apps
How to DDOS an IP using HOIC
- Get link
- X
- Other Apps
Disclaimer : This post is only for the educational purpose. How to DDOS an IP using HOIC: A distributed denial of service (DDOS) attack involves a group of compromised systems usually infected with Trojans used to perform a DoS attack on a target system or network. from Pocket https://ift.tt/TQbkDp3 via IFTTT
SSH Brute Force Attack Tool using PuTTY / Plink (ssh-putty-brute.ps1)
- Get link
- X
- Other Apps
This blog post introduces our newest addition to our pentesting arsenal, the ssh-putty-brute.ps1. This tool can turn the well-known PuTTY SSH client (putty.exe or plink.exe) into a reliable SSH login brute force tool which in addition also evades any Antivirus or endpoint protection solution. from Pocket https://ift.tt/hIuM7At via IFTTT
SFTP File Transfer Protocol - get SFTP client & server
- Get link
- X
- Other Apps
SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the SSH protocol. It supports the full security and authentication functionality of SSH. SFTP has pretty much replaced legacy FTP as a file transfer protocol, and is quickly replacing FTP/S. from Pocket https://ift.tt/vp45zDQ via IFTTT
How to Troubleshoot "SSH Connection Refused" : 5 Easy Fixes!
- Get link
- X
- Other Apps
OpenSSH is an open-source version of the Secure Shell (SSH) protocol that can be used to login remotely to a server and to control remote Linux-based systems. OpenSSH provides secure encrypted communication between two untrusted hosts over an insecure network. from Pocket https://ift.tt/olYwXFc via IFTTT