Ethical Hacking: Basic Penetration Testing
Network Ninja Breaking into someone's network

Ethical Hacking: Basic Penetration Testing

Hack Like a Pro! Picture this: you’re a cybersecurity tester, staring down a target’s public IP address from the wilds of the internet. Your mission? Break into their network ethically, then leapfrog to other machines inside, all with permission, of course! This guide dives into basic penetration testing, using a public IP to crack the outer shell and pivot across the internal network. It’s like knocking on a castle gate, sneaking in, and exploring the halls, only with code, not…

0 Comments
Using Sherlock for Open-Source Intelligence
Learn how to use Sherlock for Osint

Using Sherlock for Open-Source Intelligence

Welcome to Sherlock: Your OSINT Sidekick! Ever wondered how detectives track people online? Meet Sherlock, a free, open-source tool that makes finding usernames across the web as easy as a few clicks (well, keystrokes!). Whether you’re a curious beginner, a researcher, or just someone who loves techy adventures, Sherlock is your ticket to exploring the world of OSINT (Open-Source Intelligence)—no spy gadgets required! It searches hundreds of social media platforms, forums, and websites to see where a username pops up,…

0 Comments
Ethical Hacking: How to use Nmap
Ethical Hacking-Nmap

Ethical Hacking: How to use Nmap

A Basic Guide to Using Nmap! Nmap, short for "Network Mapper," is a widely used open-source network scanning tool and security scanner. It's primarily used for network discovery and security auditing but has many other features and use cases. In this Ethical Hacking guide, we will show you how to be a network mapping pro.Here is an in-depth explanation of what Nmap is and how it works:Network Discovery:Nmap is primarily used to discover devices and hosts on a network. It…

0 Comments
HackRF One: Introduction to the HackRF One
hackrf

HackRF One: Introduction to the HackRF One

A Revolution in Software-Defined Radio (SDR) Journey through the evolution of software-defined radio with the HackRF One. This groundbreaking creation has redefined the possibilities of wireless communication. In this exploration, we uncover the history, the ingenious mind behind it, and the myriad of applications that make the HackRF One a game-changer.The Genesis of HackRF One:Conceived by the brilliant mind of Michael Ossmann. The HackRF has emerged as an open-source SDR platform. It's designed to empower enthusiasts, hackers, and researchers alike.…

0 Comments
Ethical Hacking: Replay Attacks
Man wearing Anonymous mask in a server room

Ethical Hacking: Replay Attacks

Understanding Replay Attacks Replay Attacks are a type of security threat that ethical hackers often encounter when testing the security of systems. These attacks are a fundamental concept in the realm of cybersecurity and can have serious consequences if not addressed. In this ethical hacking guide, we'll explore what replay attacks are, how they work, and how you can protect against them.What is a Replay Attack?A replay attack is a malicious act in which an attacker intercepts and records data…

0 Comments
Ethical hacking: Understanding Botnets
Man wearing Anonymous mask in a server room

Ethical hacking: Understanding Botnets

What is a Botnet? A Botnet is a network of computers or devices that have been infected with malicious software, known as bots or zombies, and are under the control of a central entity, often referred to as the botmaster or bot herder. These infected computers or devices, collectively called "botnet nodes," typically become part of the botnet without the knowledge or consent of their owners. In this Ethical Hacking guide, we will talk about who is responsible for these…

0 Comments
Advent of Cyber 4: Christmas 2022
aoc2022

Advent of Cyber 4: Christmas 2022

Unwrapping Advent of Cyber 4! Merry Christmas, everyone! As the year nears its end and the festive spirit fills the air, it's the perfect moment to dive into the world of cybersecurity once more. December brings not only joy and merriment but also the much-anticipated return of TryHackMe's 'Advent of Cyber.' This year's journey has been nothing short of incredible, with daily challenges that have kept us all on our toes. With our virtual advent calendar in hand, each day's…

0 Comments
Radio: Unboxing my HackRF One Transceiver
hackrf

Radio: Unboxing my HackRF One Transceiver

Exciting Day! My HackRF One Has Arrived! Hey there, fellow tech enthusiasts! Today is a day I've been eagerly waiting for, as my HackRF One has finally arrived. It's my most expensive hacking tool yet. For those of you who might not be familiar, the HackRF One is a software defined radio (SDR). It opens up a world of possibilities for exploring and experimenting with wireless communication, signals, and much more. It's a versatile tool that allows us to delve…

0 Comments
Ethical Hacking: Penetration Test Reports
Man wearing Anonymous mask in a server room

Ethical Hacking: Penetration Test Reports

How to Write Better Penetration Test Reports Good penetration test reports are very important. It's what the client is paying you for and it's the product you're selling. As a penetration tester, you will be required to communicate your findings to clients and all relevant parties in the form of a detailed report that highlights the assessment process and the results obtained from the process (vulnerabilities, misconfigurations etc.) The report must be easily understood by a wide range of audiences…

0 Comments
Ethical Hacking: A Guide to Password Cracking
Ethical Hacking-Kali

Ethical Hacking: A Guide to Password Cracking

Add Your Heading Text Here Welcome to the world of ethical hacking and password security testing. In our journey to fortify digital defenses and protect sensitive data, we delve into the powerful tool known as 'John the Ripper.' This guide will equip you with the knowledge and techniques to responsibly and legally assess the strength of passwords, helping you identify vulnerabilities and safeguard systems against unauthorized access. Get ready to unlock the secrets of password cracking and bolster your cybersecurity…

0 Comments
Blackhat Python: The Social Engineering App
Ethical Hacking-Blackhat Python

Blackhat Python: The Social Engineering App

The Social Engineering App In this Blackhat Python guide I will be talking about "The Social Engineering App". It's a password list generator used for dictionary attacks. I will explain in brief about password lists and dictionary attacks, but you can read my in-depth guide on these subjects here: Dictionary Attacks.Passwords Lists A password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for…

0 Comments
Blackhat Python: The IP Stalker
Ethical Hacking-Blackhat Python

Blackhat Python: The IP Stalker

Quickly see if Your Targets are Online with The IP Stalker In this Blackhat Python project I have utilized the power of the ping command to monitor and quickly check if certain target systems are online. I then used TKinter to give the script a nice-looking and interactive GUI. This is my second and final version of this project as I feel it doesn't need any more time spent on it, it does what it is supposed to and looks…

0 Comments
Blackhat Python: How to Build a Port Scanner
Ethical Hacking-Blackhat Python

Blackhat Python: How to Build a Port Scanner

Building Your own Port Scanner with Python In this Blackhat Python guide we are going to learn about port scanners and how to build your own port scanner tool with Python. Scanning with a network mapper tool like Nmap is the best way to scan a system. This guide will help you better understand the basics of what network mappers are doing in the background.What are Port Scanners? Port scanners are cybersecurity tools or software applications designed to scan and…

0 Comments
Port Scanners and Nmap: Network Analysis
Ethical Hacking-Nmap

Port Scanners and Nmap: Network Analysis

Scanning for Ports Access In the ever-evolving landscape of ethical hacking and cybersecurity, vigilance and preparation are paramount. To defend against threats, one must first understand them. This is where port scanners like Nmap (Network Mapper) step into the spotlight. These powerful tools are the sentinels of network security, enabling professionals to uncover vulnerabilities, strengthen defenses, and maintain the integrity of their digital domains.What are Port Scanners? Port scanners are cybersecurity tools or software applications designed to scan and analyze…

0 Comments
Dictionary Attacks: Password Lists and Attacks
Man wearing Anonymous mask in a server room

Dictionary Attacks: Password Lists and Attacks

Password Lists and Dictionary Attacks In this Ethical Hacking guide, we are going to talk about password lists, dictionary attacks, and password cracking with tools like Hydra. Passwords ListsA password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for various purposes in the realm of cybersecurity, particularly in password-related activities. These lists can serve different functions, and their contents can vary, but their primary…

0 Comments
Blackhat Python: Creating Malware with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating Malware with Python

How to Create Malware with Python In this Ethical Hacking Blackhat Python guide we are going to learn about malware. Then we will create some fake malware using Python.What is Malware? Malware is a broad term that refers to any software or code that is specifically designed to damage, disrupt, or gain unauthorized access to computer systems, networks, or devices. The term "malware" is a contraction of "malicious software," and it encompasses various types of harmful software programs created by…

0 Comments
Blackhat Python: Creating a Keylogger with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating a Keylogger with Python

How to create a Keylogger with Python In this Ethical hacking guide about Blackhat Python, we will learn about "Keyloggers". Then we will use Python to create our own "Keylogger" script.What is a Keylogger? A keylogger, short for "keystroke logger," is a type of software or hardware device designed to record and monitor the keystrokes made on a computer or mobile device's keyboard. The primary purpose of a keylogger is to capture the keys pressed by a user, including letters,…

0 Comments
Blackhat Python: The Ping of Death
Ethical Hacking-Blackhat Python

Blackhat Python: The Ping of Death

The Infamous Ping of Death In this Ethical hacking guide about Blackhat Python, we will learn about the "Ping of Death". Then we will discuss a little about the Scapy Python library. Finally, we will cover how to use Python to create a "Ping of Death" attack.What is the Ping of Death? The "Ping of Death" is a computer network attack or a software bug that can lead to a denial of service (DoS) or crash of a computer system.…

0 Comments