RN-QQHFzQYtPGkUCfyu8eve2qf0

Friday, 20 June 2014

Real Life Phishing Scenario : Zero Day google bug

0 comments
A reader on my blog tried to hack my accountNow all this time I've been teaching people how to hack Wireless networks, Windows machines, Websites and Social Networking accounts. All this we did in Kali Linux. For once, I'm moving away from the operating system and narrating a real life incidence of...

Tuesday, 17 June 2014

So You Want To Be A Hacker

0 comments
Ah! The world of hackers. It has changed much from the fabled green black terminal operated by guys with spectacles on their eyes and a serious look on their face. Now even a script kiddie who types a few lines on a Kali Linux calls himself a hacker. The terminal is still there, but the colors have...

Friday, 13 June 2014

Hack WPA-2 PSK Capturing the Handshake

0 comments
 WPA password hackingOkay, so hacking WPA-2 PSK involves 2 main steps-Getting a handshake (it contains the hash of password, i.e. encrypted password)Cracking the hash.Now the first step is conceptually easy. What you need is you, the attacker, a client who'll connect to the wireless network, and...

Monday, 9 June 2014

Add new exploits to Metasploit from Exploit-db

0 comments
All this time you were just using mainstream exploits which were famous but old. They worked well, but only with old unpatched operating systems, not the updated ones. Now it's time to move on to the next step. Our poor experience against Windows 8 and Java 7u60 left us shattered, and we realized that...

Thursday, 5 June 2014

Remotely Access Kali Terminal Using Putty

0 comments
In this post we will use PuTTy to remotely or locally access Kali terminal with root priveleges. We will use SSH for this tutorial, though you can use Telnet or any other mode too.PuttySome theoretical inforamtion about putty for your digestion.PuTTY is an SSH and telnet client, developed originally...