This looks like it could be really handy if you're doing pentesting on premises. https://samy.pl/poisontap/ it grabs all sorts of useful data. Worth reading through.
Forum Thread: Easy Data Exfiltration with Poison Tap
- Hot
- Active
-
Metasploit Error: Handler Failed to Bind 40 Replies
1 day ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
2 wks ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
2 wks ago -
Forum Thread: How to Hack School Website 8 Replies
2 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
4 wks ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
1 mo ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
1 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
3 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago -
Forum Thread: Kali Wont Start, Stuck at Kali Login: 21 Replies
4 mo ago -
Forum Thread: How to View Your Child's What's App And Many More! 3 Replies
4 mo ago -
Forum Thread: Proxy Lists for Proxy Chains 1 Replies
5 mo ago
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Make Your Own Bad USB
-
How To: Clear the Logs & Bash History on Hacked Linux Systems to Cover Your Tracks & Remain Undetected
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
Hack Like a Pro: How to Hack Facebook (Facebook Password Extractor)
-
How To: Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing
-
Hack Like a Pro: How to Extract Email Addresses from an SMTP Server
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How To: Hack WiFi Using a WPS Pixie Dust Attack
-
How To: Run USB Rubber Ducky Scripts on a Super Inexpensive Digispark Board
-
How To: Get Started with Kali Linux (2014 Version)
-
How To: Make Your Malicious Android App Be More Convincing.
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
3 Responses
Thanks
Nice.
and effective
Share Your Thoughts