General Discussion
Forum Thread: Hi all members
How to exploit in Office doc file pls help me
Forum Thread: How Do I Configure Setoolkit to Use Apache in Kali Linux
i am using kali linux 1.0.9.when i use setoolkit and clone a url it says that the files will be saved in /root/www but the harvester files are empty
Forum Thread: Metasploit Not Working
Hello I need help setting up metasploit. In every exploit it fails to connect to rhost, and i dont know why, dbstatus says its connect to database.
Forum Thread: What Is the Best Way to Crack wpa2?
HI there I was wondering what is the best way to crack a wpa2 wifi either with dictionary or without and if with dictionary then can someone also provide me with a link of where to get a alpha numeric wordlist (not from crunch because it is 34pb...) thanks in advanced any reply would be appreciated :D
Question: How Do I Mask My Web Browsing Activity Behind a Victim Machine's IP Address?
I'm running some stuff on a machine on which I have a persistent Meterpreter session. It's a Windows 7 machine. I can elevate to NT/System, but I don't have access to the router admin page.
Forum Thread: Need Help with Aircrack-Ng
Hi there I have recently posted a forum on how I needed help on installing kali Linux on a virtual machine, and I have successfully installed it, I would like to give a big thanks to these guys:
HIOB: Using Paros for Web Application Auditing and Debugging
Paros is a wonderful free Java based tool that is invaluable for web application auditing, testing, and debugging. Although Paros is well known in the web application security circles, it is less known in general web development circles. This article will demonstrate just a few of the many uses of Paros that cross over both realms. Paros' proxy feature is invaluable for inspecting traffic as it comes to and from a browser. This allows developers and testers to investigate various aspects of w...
Forum Thread: Do You Know BREACH Tool to Extract Secret Data (Session Identifiers, CSRF Tokens, OAuth Tokens, Email Addresses, ...) ?
Hi. Do you know BREACH tool to extract secret data (session identifiers, CSRF tokens, OAuth tokens, email addresses, ViewState hidden fields, etc.) on an HTTPS (SSL)?
Forum Thread: What advice can you give me to properly secure my online bank account against dictionary attacks?
Hello. I'm afraid my online banking account is hacked one day by a dictionary attack or brute force.
Forum Thread: How to DDos Ip Address
Hello i have a some questions that i would like an answer for! First of all i am new to hacking and wanting to learn the basics and the easiest fastest way. so here is a list of questions,
Forum Thread: CCProxy Users
Hello. I have CCProxy server,
Forum Thread: Can I to Install Kali Linux on a Portable DVD-CD ???
Hello. I wonder whether if it's possible to install Kali Linux on a DVD or CD to use as a portable software already installed (DVD / CD) and use on any computer without having to post the install on this machine before using it ???
Forum Thread: How Save My New Password Wordlist "uniq.txt" in the Kali's Directory "/Usr/Share/Wordlist /" ?
Hello. I have password lists (uniq.txt) I want to insert the following directory "/usr/share/wordlist /" Kali Linux as it is already the wordlist rockyou.txt.
Forum Thread: Meterpreter Basics and Attacking Windows Xp with Meterpreter Payload
This is Another Tutorial About Metasploit Framework. In This tutorial I am Going To Show You Some Basics About Meterpreter and An Attack Using It.
Forum Thread: Super Hiding Any File/Folder Using Windows Command Prompt
Super Hide Your Most Important files and gain more privacy.
Forum Thread: Embedding Encoded Payloads into Word Document
I am encoding a payload using msfpayload and msfencode and I want to embed it into a word document how do I do that?
Forum Thread: Problem with rt3070 Chipset in Kali
Hello readers, How is everyone? I'm a little moody.
Forum Thread: How to Use CMD Like a Master
Know Your Command Prompt Better. Use It Like A Pro. 6 Hidden Features That Will Help You Out Surly.
Forum Thread: Persistence Issue[Android]
Greetings fellow students, Experts and Enthusiasts ! So I've been hacking my android phone ( android version 4.3 non-rooted ) and all works well. The only thing is that when I try to run the persistence.rb script it says :
Forum Thread: A Couple of Things to Keep in Mind
You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and "secure" credit cards, Hacker extraordinaire shows how nearly every secure system is vulnerable.
Forum Thread: How to solve an issue when creating fake Rogue AP
hello all i recently wanned to create a fake rogue AP but when typing the command:
Forum Thread: Meterpreter Migration
Greetings like minded creatures ! I've ran into a problem today, I've hacked into my girlfriends computer on the same network ( got the meterpreter, uploaded an extra payload, fooled around a bit ).
Forum Thread: A Break from Hardcore Hacking.
Come on, I know all you hacking ninjas have a setup including at least four green-screen monitors, two of which have nothing but numerical waterfalls! New law to link hackers with stock photos of hackers.
Forum Thread: What After the Recon ?
Ok! I did the nmap reconnaissance of my intended target and found a couple of TCP and UDP ports open. But how to proceed thereafter ?
Forum Thread: Is There Software Similar to Wifikill, That Kills Nearby Bluetooth Signals?
If not, how can I, using a rooted nexus 7, hack into a hidden bluetooth device if I already know the PIN code?
Forum Thread: Raspberry Pi - Let's hear your thoughts on this.
I have QUESTIONS!!! Why no VGA? Only HDMI... The composite I can understand. But HDMI over VGA? Wut?
Shellshock Tutorial : Shellshock Attack to Gain Root Access into a Computer in Same Lan?
Hello . i wanna ask for a help about shellshock . i have 2 virtual MACHINES . one is ubuntu and the other one is metasploitable 2 system . i want to get root access with shellshock into metasploitable2 from ubuntu .(metasploitable 2 system has a login password and we dont know it). what kind of methods can we use ?
Forum Thread: Hi Everybody!
I'd like to ask you something about an Open wifi to make it always accessible even if it will be wpa locked in the future.
Forum Thread: Can VPN Server Eavesdrop Secured Communication?
I used VPN server (Hola Better Internet) to change my IP address to US IP address to overcome regional restrictions. I wanted to buy something in USD istead of EUR. So my question is. Could the VPN server log my credit card informations? The connection was secured and I checked certificate. But I don't feel very strong in this area of expertise so I can't tell whether I'm in danger or not. What do you think guys?
Forum Thread: How to Make Your Own Command to Backup in RedHat Linux?
Hello Friends,currently I'm student of RHCSA.I want to share script that i have written in my lab for backup and restore.Let's Start. Backup of Folder
Forum Thread: How to Hack Personal Info
do you know how to hack sb with an e-mail an access their information like cookies? I know it's possible but i don't know how.
Forum Thread: Types of Hackers
i have gotten very tired of hearing about the different hats. i do wear a white beanie but i think the hats thing is silly.
Forum Thread: DNS
I am really considering privacy, even on daily basis. I heard about some servers from opennic that they don`t keep logs.
Forum Thread: How to Encrypt a Listner?
Hello , I would like to know if there is a way to encrypt our hijacked file ( .doc , .pdf , or .exe ) so that it can bypasse all farewell and Anti virus ( Undetectable ) , AND WITHOUT using a payable crypter , i mean doing it for free , with a free crypter , using metaspoit or manually .
Forum Thread: I Want to Learn Hacking Websites.
learn hacking website in windows xp the tools i need for it and how to use it i mostly need free tools more specific provide me site to download tools.
Forum Thread: Custom Phyton Script for SSL-Strip
Im not quite familier with phyton but, i give it a trie. The task is to performe a ssl Stripping attack through a phython script.
Forum Thread: How to Remote Code Exploit Cisco Cam System
Cisco Surveillance Cams I have the IP for the cisco server and I want to be able to use http://www.exploit-db.com/exploits/24786/ but I do not know exactly how to execute the script. I am wanting to learn more how to use exploits not just recon and footprint.
Forum Thread: How to Create a Malicious Link to Grab Ip's
Hi I was wondering if there was anything in Kali or a 3rd party tool or site that is able to create a link that when clicked will grab the ip of the clicker and send it to me