Windows: A Guide to Live Triage
windows 1

Windows: A Guide to Live Triage

Unveiling the Art of Real-Time Digital Investigation and Incident Response In this comprehensive guide, we embark on a journey through the world of Windows Live Triage. We will unravel the intricacies of this practice, exploring the tools, techniques, and best practices employed by forensic analysts to collect real-time evidence from a running Windows system. Whether you're a seasoned digital investigator, a cybersecurity enthusiast, or someone looking to demystify the world of Live Triage, you'll find a wealth of knowledge within…

0 Comments
Windows: A Guide to Optimizing Windows
windowsKeyboard

Windows: A Guide to Optimizing Windows

How to Keep Your Windows System Running Smoothly In the fast-paced digital age we live in, our computers have become indispensable tools, powering everything from work to leisure. Yet, over time, the nimbleness of your once-speedy Windows machine can gradually wane, leaving you with frustration rather than efficiency. The good news is that you don't need to purchase a brand-new computer to rejuvenate your computing experience. Instead, with the right tweaks and strategies, you can unleash the hidden potential of…

0 Comments
Blackhat Python: The Social Engineering App
Ethical Hacking-Blackhat Python

Blackhat Python: The Social Engineering App

The Social Engineering App In this Blackhat Python guide I will be talking about "The Social Engineering App". It's a password list generator used for dictionary attacks. I will explain in brief about password lists and dictionary attacks, but you can read my in-depth guide on these subjects here: Dictionary Attacks.Passwords Lists A password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for…

0 Comments
Blackhat Python: The IP Stalker
Ethical Hacking-Blackhat Python

Blackhat Python: The IP Stalker

Quickly see if Your Targets are Online with The IP Stalker In this Blackhat Python project I have utilized the power of the ping command to monitor and quickly check if certain target systems are online. I then used TKinter to give the script a nice-looking and interactive GUI. This is my second and final version of this project as I feel it doesn't need any more time spent on it, it does what it is supposed to and looks…

0 Comments
Arduino Hacking Tools: Duckduino
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Duckduino

How to Build Your own Rubber Ducky with Arduino In this Arduino Hacking Tools guide, we will learn how to create your own "Rubber Ducky" style tool with Arduino. Thanks to the great Duckduino project created by Seytonic and Spacehuhn we can have the power of a "Rubber Ducky" for a fraction of the cost.What is the Rubber Ducky? The USB Rubber Ducky is a product created and sold by Hak5, a company specializing in network penetration testing equipment. It's…

0 Comments
Blackhat Python: How to Build a Port Scanner
Ethical Hacking-Blackhat Python

Blackhat Python: How to Build a Port Scanner

Building Your own Port Scanner with Python In this Blackhat Python guide we are going to learn about port scanners and how to build your own port scanner tool with Python. Scanning with a network mapper tool like Nmap is the best way to scan a system. This guide will help you better understand the basics of what network mappers are doing in the background.What are Port Scanners? Port scanners are cybersecurity tools or software applications designed to scan and…

0 Comments
Port Scanners and Nmap: Network Analysis
Ethical Hacking-Nmap

Port Scanners and Nmap: Network Analysis

Scanning for Ports Access In the ever-evolving landscape of ethical hacking and cybersecurity, vigilance and preparation are paramount. To defend against threats, one must first understand them. This is where port scanners like Nmap (Network Mapper) step into the spotlight. These powerful tools are the sentinels of network security, enabling professionals to uncover vulnerabilities, strengthen defenses, and maintain the integrity of their digital domains.What are Port Scanners? Port scanners are cybersecurity tools or software applications designed to scan and analyze…

0 Comments
Dictionary Attacks: Password Lists and Attacks
Man wearing Anonymous mask in a server room

Dictionary Attacks: Password Lists and Attacks

Password Lists and Dictionary Attacks In this Ethical Hacking guide, we are going to talk about password lists, dictionary attacks, and password cracking with tools like Hydra. Passwords ListsA password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for various purposes in the realm of cybersecurity, particularly in password-related activities. These lists can serve different functions, and their contents can vary, but their primary…

0 Comments
Blackhat Python: Creating Malware with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating Malware with Python

How to Create Malware with Python In this Ethical Hacking Blackhat Python guide we are going to learn about malware. Then we will create some fake malware using Python.What is Malware? Malware is a broad term that refers to any software or code that is specifically designed to damage, disrupt, or gain unauthorized access to computer systems, networks, or devices. The term "malware" is a contraction of "malicious software," and it encompasses various types of harmful software programs created by…

0 Comments
Blackhat Python: Creating a Keylogger with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating a Keylogger with Python

How to create a Keylogger with Python In this Ethical hacking guide about Blackhat Python, we will learn about "Keyloggers". Then we will use Python to create our own "Keylogger" script.What is a Keylogger? A keylogger, short for "keystroke logger," is a type of software or hardware device designed to record and monitor the keystrokes made on a computer or mobile device's keyboard. The primary purpose of a keylogger is to capture the keys pressed by a user, including letters,…

0 Comments
Blackhat Python: How to do a Basic Ping
Ethical Hacking-Blackhat Python

Blackhat Python: How to do a Basic Ping

Using Python to Ping an IP Address In this Ethical Hacking guide about Blackhat Python, we are going to learn about the Ping command, what it is and what it does. Then we will cover how to send a simple Ping using Python.What is Ping? The ping command is a network utility available in most operating systems, including Windows, macOS, and various Linux distributions. It is used to test the reachability of a host (typically a computer or network device)…

0 Comments
Blackhat Python: The Ping of Death
Ethical Hacking-Blackhat Python

Blackhat Python: The Ping of Death

The Infamous Ping of Death In this Ethical hacking guide about Blackhat Python, we will learn about the "Ping of Death". Then we will discuss a little about the Scapy Python library. Finally, we will cover how to use Python to create a "Ping of Death" attack.What is the Ping of Death? The "Ping of Death" is a computer network attack or a software bug that can lead to a denial of service (DoS) or crash of a computer system.…

0 Comments
Arduino Hacking Tools: Packet Monitor
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Packet Monitor

How to Build your own Packet Monitor Device with Arduino In this Arduino Hacking Tools guide, we are going to learn about internet packets. Then we will use Spacehuhn's Packet Monitor project to monitor all the network traffic around you.What is an Internet Packet?An internet packet, often simply referred to as a "packet," is a fundamental unit of data that is transmitted over a computer network. These packets are used to convey information across the Internet and other networks, such…

0 Comments
Arduino Hacking Tools: Beacon Spammer
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Beacon Spammer

How to Build your own Beacon Spammer Device with Arduino In this Arduino Hacking Tools guide, we are going to learn about beacon frames and fake access points. Then we will use Spacehuhn's beacon spammer project to create fake access points.What is a Beacon Spammer?A "beacon spammer" is a device or software tool that is used to flood a Wi-Fi network with a large number of fake or malicious beacon frames. Beacon frames are a fundamental part of Wi-Fi network…

0 Comments
Arduino Hacking Tools: Deauther
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: Deauther

How to Build your own Wi-Fi Deauther Device with Arduino In this Arduino Hacking Tools guide, we are going to learn about internet packets, deauthentication attacks, and beacon spammers. Then we will make our own deauther device using a D1-Mini, Mini-OLED and some Push buttons. We are going to use Spacehuhn's deauther code for this project. It is a beacon spammer, a packet monitor, and a deauther all rolled into one tidy project.You can upload the code to an ESP8266…

0 Comments
Arduino Hacking Tools: War Driving
Ethical Hacking - Arduino Logo

Arduino Hacking Tools: War Driving

How to Build your own War Driving Device with Arduino War Driving with ArduinoIn this Arduino Hacking Tools guide, we are going to learn about war driving. Then we will make our own war driving device using a D1-Mini, GPS module, and an SD Card module to log the captured data.Components Needed:D1-Mini ESP8266GPS ModuleD1-Mini SD Card ShieldSD CardWhat is War Driving? War driving is the act of using a vehicle to search for and exploit vulnerable wireless networks, such as…

0 Comments
Kali 2022.3 Installation Guide
Ethical Hacking-Kali

Kali 2022.3 Installation Guide

How to Install Kali 2022.3 Kali Linux, the go-to ethical hacking operating system for cybersecurity professionals, is back with its latest iteration, Kali Linux 2022.3. Whether you're a seasoned ethical hacker or just venturing into the world of cybersecurity, this step-by-step guide will help you download the latest version and install Kali Linux and have it up and running in no time.What is Kali? Kali Linux is a popular and widely used open-source Linux distribution specifically designed for penetration testing,…

0 Comments
Raspberry Pi Nature Camera 2022 Highlights
natCam 4

Raspberry Pi Nature Camera 2022 Highlights

The Best Captures for 2022 In 2022, our trusty Raspberry Pi nature camera was again our window into the mesmerizing world of wildlife. From playful squirrels to graceful birds, we've captured some unforgettable moments in the heart of nature. Join us in revisiting the year's most captivating video captures and celebrating the beauty of the great outdoors.Nature Camera 2022-05-17Well, today was just for the Squirrels, and they really love our bird feeder.https://youtu.be/MHmn2Vpqw2Yhttps://youtu.be/NthjnYjXoeIhttps://youtu.be/MxrG6Zcmm50Nature Camera 2022-05-16Unfortunately, today was a really quiet day…

0 Comments