Greetings to veterans and to newbies,i read so many discusion about installing keylogger remotly and they are all same.i want to know how to install it on someone pc without sending keylogger to that person via email,that is so obvius i am here i have time so if someone have time to learn me few things i can pay too for that
First of all I got Bugtraq 2 Black Widow on Ubuntu 12.04.02.I want to crack my own Wifi but i got no handshake. I did this:> iwconfigoutput: lo no wireless extensions.
learn hacking website in windows xp the tools i need for it and how to use it i mostly need free tools more specific provide me site to download tools.
Im not quite familier with phyton but, i give it a trie.The task is to performe a ssl Stripping attack through a phython script.The output off the script musst be Username and PW (stdout)My problem is now:
Hi I was wondering if there was anything in Kali or a 3rd party tool or site that is able to create a link that when clicked will grab the ip of the clicker and send it to me
I did read this a lot on the web. With my little experience, maybe i can say that this is not so true. When you analyze a site with the best tools, try different exploits, and do this the best you can, and finally find nothing, it's pretty odd. The only thing that worked for me is to find random targets with dorks (sql injections), such a big script kiddie. And maybe a simple DDOS leak that is not so intellectually interesting.
I Inadvertently Left Kali Running a Scan on Local APs Using the Airodump Function in Aircrack Whilst I Was Away for a Couple of Days. Upon My Return I Find That It Has Seemingly Grabbed Shedloads of WPA Handshakes for Various BSSIDs Whilst I've Been Away. As I'm Used to Using the Tutorials on Here (Whereby You Use the -W Command to Create a File for the Captured 'Shakes) I've No Idea Where to Find the Handshakes. I Know I Need to Make a Start on the Linux Basics Tutorials but Any Assistance in...
Basically I sold a laptop for my partner and there was images on it of her from her younger days ( 15 years old ) someone has not formatted the laptop properly and now the images have leaked viral on twitter. I need the IP address of the culprit ASAP, can anyone do this for me please
I know that ultimately I need to just get in there and play around -- but I'm hoping if I can get a few direct questions out of the way, I'll save myself a few hours of troubleshooting.
This is the first installment in a new series that I am calling "Hacker Hurdles." These are things, methods, techniques that make our job as hackers more challenging and difficult. Don't misunderstand me, these items don't make our task impossible, but rather more challenging and, therefore, more gratifying when we are successful.
So I've compromised a windows 7 system(system priv and all) and would like to download files directly from his computer to mine. Is it possible to write a script that would search his computer for any files titled sales and download them? I couldn't find anything in the ultimate list of meterpreter scripts. Google searches have led me to find veil-pillage's Remote Desktop tool as a possible option but there has to be a more discreet way. Thanks in advance.
So if you were to have RDP access to an admin account on a system, how would you make the system vulnerable so that you can log into it from metasploit on kali? I looked for ways to log into rdp via Metasploit but didnt see any.
Hey everyone. I am new here and new to this world. I am working on a degree in Information tech and very interested in everything electronic. I am just learning linux now and I love it. Just wrote my first couple basic scripts the other day. figuring out how to crack wifi networks and all. Anyway wanted to get to know some people here who dont mind helping someone who has questions and a desire to learn. Making friends is always good and i dont know anything so please all advice and just...
I recently read about a "malware" in the financial sector ((banks), to be more specific, and these malware targets ATM machines which has been compromised around the globe)..
I've recently created a live Kali USB with additional persistent storage but the instructions I followed did not mention encryption. Is there any way to add encryption to the persistent partition after the fact, or should I have gone about it in a different way?
I don't have a degree in CS, nor is it likely I will be able to acquire one in the near future. I do however have the desire to become a professional ethical hacker. I have been reading up on this, and it seems that many people do not consider a CS degree to be essential for achieving this goal. It is obvious though that an obscene amount of technical knowledge spanning a majority of the IT spectrum is a must. This doesn't bother me too much as I believe myself capable of attaining enough...
I was reading a article on here about Ollydbg and program cracking. The article was published two years ago and so I wasn't sure if there are newer methods to go about doing this. How would you go about cracking a particle program?
can anybody help me.i am trying to install kali linux for like 5 days now....fail....fail...fail... thats all im getting. im installing kali linux 32 bit on oracle virtual box.when i try to install it everything goes fine untill wen its installing the system it loads all tha way to 80% then it just says system installation fail then when i retry it dosent eaven load 1 %. did i set up th virtual machine wrong? my computer is a recently formated windows xp to windows 7 home premium . it had only...
As you already know, Hong Hong has been rocked in recent weeks by protests against their Beijing overlords. Promised free and fair elections, Beijing has reneged on this promise and is now telling Hong Kongians (that's what they're called, aren't they?) that they will only be able to vote on Beijing-selected candidates.
I've been using PIA (Private Internet Access) for a year now, but without any positive feedback I have no idea how effective it really is (though I guess not having any issues is a testament in itself).
It seems like every day now that we see a new headline on a cyber security breach. These headlines usually involve millions of records being stolen from some large financial institution or retailer. What doesn't reach the headlines are the many individual breaches that happen millions of times a day, all over the world.
Hi i have some questions about Linux i want to leanr about this world of hacking and i know that Linux is better for this propose i have windows 7 atm and i know that are various types of windows like windows XP , Windows Vista , and i want to know what is the best version of Linux to download and install on My pc cause i need to delete everything and if i do that i can install another OS.
Hello everyone! I just captured a fresh nice big .pcap list of packets while in monitor mode(Wireshark, Kali linux), Now I would like to know if it would be possible to list all the information(Addresses, data, etc) from the file in a console for researching? Thx
I have a pc that has two accounts. Administrator and Admin, I have access to the Administrator account but not the Admin account I made it a long time ago and forgot the password. Is there a way to retrieve that password. I have Administrator access.
i was wondering if there anyway to exploit a computer using metasploit Framework if the target have an administrator with blank password , like what you can do in MSSQL server if "SA" have a blank password , also if there is any well known key logger that you can trust or a Trojan that's well known for its reliability.
I just recently installed Kali Linux onto my Acer c720 Chromebook. Everything works fine except that when I run credential harvester everything seems to run fine, but when I try to connect to the cloned website that I set up with the Chromebook on my other computer to test that its working, I get a connection error!
Having a software firewall and a Router firewall together be required? or is this over the top? I would guess having both firewalls secures you from the outside world and also you local network.
Hoping someone might be able to give some light into the security issues of having an old systems such as windows NT or Windows 2000 running on a Vlan.
If to be honest guys I'm green on this things but Would like to find as much as I possibly can. First of all i want to know the best way how to do keylogging and as much safe of course. I have simple windows 7. Would be grateful if somebody could give me some good tips,
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on.
What if the code you are trying to reverse engineer is obfuscated or somehow corrupted? What if no way is left? Here comes what I like to call (wrongly and ironically) the "brute force of reverse engineering".
Good morning, community! This is mi first post here since I found this page by casuality.First of all, I'm from Argentina and english isn't my native language, so please forgive my mistakes.