Today, if I want to arpspoof a physical machine form a VM, I have to arpspoof from the physical adapter (wlan0), not from the virtual eth0.
The goal is to build the cheapest PC based on multiple GPUs that will be used for cracking passwords. I guess one of the most sophisticated questions here is what graphic cards to use. Would be nice to understand what technologies these card should support, like cuda, opencl, sli/crossfire. Also, what other hardware should be used to support multiple graphics configuration?
I've been digging around and found dozens of forums related to pentesting, hacking, etc but a majority of them are inactive, have few posts, or the last post was like 2 years ago.
Code: ------------------------ despareser icons ------------------
This year we talked a lot about the famous rasonware, cyber attack worldwide that suffered many companies and others, ps well, first understand that it is a rasonware and how it operates. According to wikipedia:
I suspect my wife is cheating on me and I want to find out how much she's not telling me. I know she uses Facebook and Twitter to message him. She's locked everything up, her laptop, droid phone (via fingerprint), email accounts, etc. She does have a Guest account open on her laptop and leaves it home when she goes to work so I have all the time I need on it. I think she may have a keylogger or other antispyware on her laptop so I don't want to tip my hand that I have hacked her password.
Well, the bluetooth is f#cked. There will be a chance that we get the script on Github or in Kali repo to test it on our home devices?
Can anyone please spare some time to tell me how to install Metasploit from this github link? https://github.com/AnwarMohamed/metasploit-framework/tree/android_whatsapp
Hello today I bring you a little toy that can help a lot to perform some tasks of a pentesting. This toy can be purchased for a small fee in specialized stores, but thanks to this homemade DIY tutorial, we will learn how to do it ourselves. So let's make a tax sniffer, a Tap!
today we will touch on "SHODAN" in its Pentesting mode, using functional Exploits that will help them understand and audit vulnerable servers that exist.
i need help plz help me
Hello! I have installed the driver: RTL8188EU for the TP-Link TL WN722N V2 network adapter. The wifi works, but when I'm trying to run the command airmon-ng there is no PHY and no Chipset and when I try to run the command airodump-ng mon0 i get an error. It should work because the adapter supports monitoring networks. I'm running Kali Linux in VirtualBox on a Mac Book Air 2015. Here is the pictures of the terminal: Keep in mind that I'm new here on the forum and in Kali Linux and thanks in ad...
i am Savath , a student at bachelor degree in year 3 . this topic , i want to learn deeply .
Hi all, I am desperately in need of help with my daughter. Recently she's been very disobedient towards me and my husband, she would yell back at us if something we said upset her; sometimes she would even push or throw stuffs on the floor in front of our faces! The other day I was able to spy on her phone. She has been texting with some strange people and seems they've met several times too! I and my husband are very worried, we'd tried talking some sense into her but it was pointless and of...
Dear master hackers,if i creates a RAT, am i able to spy on a android phone?basically everything in the phones inside messages,photos,calls,sms..which would be the best hacks?i'm unable to install any apps into that phone,is it possible for me to bind it in a link so once he/she opens the link,the RAT or anything will be in her phone.
This is from a pastebin link basically the information given is Software Loopback Interface 1
It is possible to crack a telegram bot? How does work a telegram bot? There is a game bot with the game points..it is possible to crack the bot for adding points?
Then that i read this: https://null-byte.wonderhowto.com/forum/kali-linux-tp-link-tl-wn722n-v2-driver-not-working-0177837/
Surely on occasion you have used Wireshark (network traffic analyzer: sniffer) . the traffic between servers is protected via MTLS and from client to server via TLS
i have been searching for the best free vpn service now for a while, but i guess the asnwear is pretty unclear. i were wondering what you guys personal think is the best free vpn for hacking with kali linux?
I will teach you how we can audit systems worldwide by the ranges that the ISP give to each country, this POST I wanted to elaborate it about 1 year ago, but reasons of time and occupations do not make it easy for me , but today I have the pleasure of doing it public, since the tool "Masscan" have already published in some videos or forums but with a poor content, clear without discrediting my colleagues in the "ordinary" sense, what I will do to innovate the researches in attaching the tools...
Forum Thread: If I Installed Metasploit on a Computer Not on the Same Wifi How Do I Get Their Ip Address?
I have installed metasploit on a victims computer that is not connected to internet but how do I get their ip? Do I need his ip to enable webcam or something on Metasploit? I know I need it for Armitage.
Hi!!! In this thread, I want to describe Xss in detail from A to Z. for beginners....
While Working on Windows Xp sp2 if the Ports 445 and 139 Are Closed. Can We Somehow Open the Ports Remotely from Our Kali Machine ?
If it's possible at least. I do have root access on my device but I would like to share my game progress with someone who does not have root access on his device.
Hello my dear friends, usually i come here as teacher but today i come as student bcoz we are here to teach and learn.
I'm looking for a good VPN. Free ones are always a pain. Suggest some premium ones. Thanks in advance :)
There's lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you out from the Wifi long time ago you still can hack the password.
The people, prompt as to be. Damaged file of outlook.pst, if its prog scan scanpst.exe then it gives "Check was stopped because of an error. The changes to the file were made". File outlook.pst weighs about 2Gb. Is there any way to recover it?
Download Kali Linux v2.0 at: https://kali.org/
Hi All , Am glad that i could find a forum just like this anyway i need some help
I spoofed the mac address of rooted phone x, to that of phone y. I used an app called MacSpoofer for this. The spoofing of the mac address worked as far as I know. In the Android settings, under "status" the mac address of phone y is displayed. I noticed they can not be connected to the same WiFi network. It constantly changes which phone has connection to WiFi. I assume this means that the mac spoofing works.
Hello guys, I have been into Pen Testing for awhile now and managed to exploit some vulnerabilities and gain user/root privileges on LANs ONLY. I was wondering how would be the steps of hacking into a machine through WAN.
I've seen this in a lot of threads, I know that they set the Local and Remote host, but what would happen if you didn't set them up?
So heres the deal i make a cluster of 5 rasberry pi 3 and now i want yo connect my so called super computer to my separate monitor , keyboard and mouse & i dont want to use the putty software ? so pl help me regarding this ..
Hey guys! I've seen here are a lot of Kali tutorials and i'm wondering if its worth to use it as a main OS?
Hi. Can somebody tell me how to hack an acc?
Hello everyone, I have a major problem. I am Windows 10 user and following this http://www.ibtimes.co.uk/windows-10-cumulative-update-kb3081424-fails-install-stuck-30-how-fix-1514534 tutorial I deleted all ProfileImagePaths in order to fix update issue.