I suspect my wife is cheating on me and I want to find out how much she's not telling me. I know she uses Facebook and Twitter to message him. She's locked everything up, her laptop, droid phone (via fingerprint), email accounts, etc. She does have a Guest account open on her laptop and leaves it home when she goes to work so I have all the time I need on it. I think she may have a keylogger or other antispyware on her laptop so I don't want to tip my hand that I have hacked her password.
Can you list the best sites?
Unfortunately my word list is not big enough.
Anyone Know How to Hide Payload from App List on Android or Creating Another Process After Exploiting It ? :)
What are the basics to white hat hacking?
hello im am a stating beginner hacker I don't know anything about it really I been researching on how to videos so i wanted to know what is the best way to hack my girlfriend phone without having her phone with me
Hello my friends, i'm KaOs and is my first post in here. First of all sorry for my poor english. :)
Hello World, When Credential Harvester Attack is used in Social Engineering toolkit, the URL sent to the Victim is the attacker IP address which is displayed in the Address bar of the browser. Is there any way to stop displaying the IP address on the address bar and instead show a link?
metasploit v4.14.17-dev...this -dev remains no matter how much i update everything... and none of my hacks r working on metasploit... is this -dev the reason behind everything...if yes...please gimme a way around this
What WORSE can I do to an Android device of mine which is connected to same wifi on I am... I am using Kali Linux and I know the MAC address of the phone.
There's lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you out from the Wifi long time ago you still can hack the password.
hello all, can someone help me, how to land router's all trafic on a specefic webpage.
Hi so I've been learning about how this whole hacking thing works using the Kali Linux and tools they have, most of what I have found means the person has to run a program of some sort or some cmd code in order to gain access. I was wondering if their was a way to hack without them having to do anything, Im trying it on my own LAN connection. Any help would be appreciated
Hello all. I am starting out my pentest/hacking career and I am installing Kali Linux on my Windows 8.1 PC for a dual-boot. The installation has been going well and it has been installed on the system. It is now installing GRUB, and my problem is with the GRUB installation. It has been stuck in the same position (about 60%) for a good 30 minutes now with the command 'running "update-grub"'. I don't know if I am just being impatient or not but I would appreciate your thoughts.
Hello everyone! I thought I'd help a few people out by writing a written tutorial on how to install Kali Linux on your chromebook, as well as Metasploit-Framework, so let's begin! If you would like a video version instead, watch my YouTube video at the bottom of the page. Although this guide is a lot more clear.
Hey guyz, i recently found out that instagram accounts can be hacked by dictionary attacks(Noob here) and so i found out the scripts online and tried them. i found this python script .
My word list is not that big, could not decrypt it.
My Host A (ftest) IP is:192.168.120.104 (Kali Linux 1.0) My Host B (ftestd) IP is:10.0.2.15 (Kali Linux 1.0)
Hi I have created an apk with msfvenom command
Hi there! I was just wondering, let's say we've got this set up:
Hey everyone, I've finished up practicing pen-testing my network but I wanted to know how far I should go to protect myself within my own network. For instance, what are the other possible attacks someone could do once they have penetrated network in my home? I know you can nmap for devices and I remember reading an article about wireshark.
I have recently got a raspberry pi zero w. I did this to try and use its USB slave functionality and do things like HID attacks and grab cookies and such with poison tap. I cannot, no matter how hard i try, get duck berry pi to work. I would be very grateful if someone could make a guide on how to do it, or provide an image that I could use. Thanks in advance, m4r10
msfconsole Metasploit Park, System Security Interface
Which is the best antivirus? Which of them has biggest database of viruses and various attacks? Is ESET good?
.I am using kali with virtual box oracle.I have TP LINK wn722n with chip set AR9271 every time when i try to use airmon-ng i recieve this
I'm trying to send the Metasploit Python meterpreter to a Mac, but it won't open the file because "Microsoft Windows applications are not supported by OS X." The host computer is a PC running Kali Linux, but it's dual booted with Windows 10. Why am I getting this error, and how do I get around it? Help much appreciated!
So I've been looking at launching MITM attacks, and started to play around when I discovered this problem
i am new to kali linux (version 2017.1) and i have tried alot of times to update metasploit bt it never seems to happen.
Hey there, I was asking, I have a kali linux verison my laptop, I need to try penetrating an android phone with MetaSpolit, I saw many methods and they are the same by creating an APK file and sending it to the victim using msconsle but I was wondering, The android phone I am trying to hack must be connected to my own internet connection (Local Host) or it doesn't matter?
Forum Thread: Hi , I Am a Noobie in Hacking,Can Anyone Tell the Requirment for Port Forwarding ,I Am Going to Buy a New Router
I think my college wifi does not suits for a budding hacker,i tried metasploit ,i cant even start a session when i connect my android to the same wlan.for your notice , my college wifi uses mac filteration for access,so even though same lan we are given different logins username and password for each user.
Hello World, I have been using the Social Engineering Toolkit for quite a while now, and I am particularly attached to the Website Cloning Option. However I have been facing an issue with FB cloning that make my hacks vulnerable to attention.
first, sorry my bad english.
Hey everybody. So this week I've been making it my mission to learn a bit about THC Hydra and all the little bells and whistles it has to offer — trust me, there are A LOT.
Hi, I am trying to get access to a router login page without user name and password, I know the method of bruteforcing by Hydra but it is too time taking. So, I goggled and found to hack it by deleting a certain HTML part, but I am confused. I don't know which part of HTML I have to remove as I don't have enough command. So can you help me. I will be grateful.
Hay guys, I'm an amatuer and I've learnd password crack ( else online attack! ) , so I wanna crack an instagram account ( my account )
Hi, I'm a super noobie in regards to hacking so the solution might be pretty simple here. I tried hacking my windows 7 host with a kali virtual machine using a simple guide I found on youtube. It's a client side hack, but when I double clicked the hack file nothing happened on my kali. So then I tried pinging both systems, and pinging windows from kali worked just fine, but I couldn't ping kali from my windows host. So I'm guessing the IP-address is just wrong. I used the "inet addr" under "e...
Hey Guys, I have the following Problem:
Hi to everyone! I've got problems when I get to the "Configure the package manager" phase where it is asking about the network mirror. I always get the "Bad archive mirror" error. I am installing from a live usb. I know I can continue without a network mirror. But my kali will have only a very minimal base system. I don't know what to add to kali (through a terminal) after completing the installation. What are the things I should add to kali or update or should do after completing the install...
I'm looking to gain access to a couple of teacher computers. They run windows 7 or 8, not entirely sure but I'll confirm on monday.