How can I tell pyrit to store its database on an external HDD? I figured out how to feed it with data from an external HDD but not how to move the entire database to it.
Can law enforcement somehow trace spoofed caller id with spoof card or something like that? Answer will probably be yes, so do you know some other way to spoof caller id without being traced?
A Remote System Is Accessible to Me Through Kaseya Agent. I Have Access to All Its Disk Drives / Files, Command Prompt and Even I Can Take Control of It Through VNC. I Want to Listen / Record Live Audio (Sound) Of Its Surroundings Through Its Microphone in Stealth Mode. I Can Access the Files, if Sound Can Be Recorded in the Remote System. I Can Also Install Snooper (Audio Spy) In It from Command Prompt. But It Requires Post Installation Configuration Through Its Interface Window Which I Cannot...
I am running kali on my laptop and have captured a wpa2 handshake. The laptop has a slow gpu, is there a way i can run the bruteforce attack on my nvidia gpu in my tower (preferably on windows)?
It has been a long while since I last came here to write an article. Graduate school keeps you busy. After I looked over what I had written previously, I decided that I should introduce another fun topic from cryptography. In this case, steganography.
I have recently watched this video and almost every time they get caught and go to prison. I don't understand how that is possible if they don't use their own IP, etc.
Welcome to the first official article of Hacking and You; where we will be discussing the non-technical aspects of hacking, hacking culture, and the role it will play in our lives.
Hello, readers. Beginning today, I will be writing a small series of articles about the paths we have taken as hackers, hacker culture, and what it means in the grand scheme of our lives.
Please note this article is for those who have intermediate skills and are looking to expand those with real hacking practice in a structured environment with lesson plans and homework. After completing this course I am confident that you will have the skill to begin the move into full hacker status.
hello all,im new here and just wanna share my findings while on the net while searching for security and and whitehat hacking tutorials, you might find this useful , i know some of you know's about this,but im still
I was wondering why I can I hack on my LAN but not outside the LAN. Then I figured out that I have dynamic IP address. I was getting some informations about this and my internet provider wants too much money for a static IP address. Is there another way to hack outside the LAN even if i dont have static IP address?
What language should i choose?I would like to learn Ruby but i dont know if it has the same capabalities as Python?What language is better for a hacker?
First of all, I apologize if it is against this sites rules. But I am willing to pay someone to deliver me a piece of software that meets some or all of my specifications.
Hello, recently i have been trying to access my schools CCTV cameras or at least locate the IP address to use metasploit to hack the username and password. I have ran the command sudo nmap -sP 192.168.36.0/24 to scan my schools range of IP addresses. Do you have any tips for being able to locate and access the CCTV cams because i am sure you know more about this stuff than i do. (and yes i am aware of the risks of geting caught and doubt i will because i have attempted to make a admin account...
Sorry for seeming like a complete newbie. I was looking at a tutorial on how to get access to a school's exams. I figured out with xprobe2 that it is running HP UX 11.0x. I was wondering if anyone could explain how I could find the exploit for this Unix version? I've looked at other tutorials but they involve using Backtrack and I'm using Kali and I couldn't really figure it out.
If You Are Successful in Getting It Installed, as Well Having It Self-Destruct After You got what you want, what do you do to keep the file being executed again. For example I send a word document with the embedded server. Can you set it up to only be executed once? I don't want them opening it again and loading again.
Since I don't have my own computer, I'm planning on using Kali on Live USB. A friend of mine told me that you should have a separate computer system for hacking so that if you get hacked no personal information may be taken.
hey i was wondering if anybody had expirience with this how can you make an hidden os.i was thinking about making a dummy os (windows 7)that i use regulary and a hidden OS (kali just to hack and store some sensitive information) could that be done and are both sistem secured by the encription?if that can be done then can anybody help me set it up
I know you are all busy but , can someone help me to hack (cheat) "League of Angels" game ? Its a mmorpg web browser game with a lot of cash ppl and i hate them :p . Im not so young but still not so old to start using Linux and learn how to hack , i am old school guy using windows xp , that's why i ask you profesional ppl.
A few days ago I finally finished my 2 week journey into trying to get OpenVas to work properly. You all may have noticed that you can't just click the setup openvas in kali and have it working properly.
I'm looking into hacking a Cisco router running IOS and I need some guidance. Not really sure how to go about doing this, although I've searched for known vulnerabilities online and found these vulnerabilities online.
From This Post I Am Going To Begin A Series Of Metasploit Tutorials. This Is A Simple Tutorial That Will Give You A Basic Introduction About Exploit And Related Stuffs. I Would Like To Start From The Beginning , So Every One Can Understand Metasploit And They Can Master Them.
In legal Consequences of hacking OWT was kind enough to help me with some information. He asked me to post a script that will put your system into Stealth mode. The goal of the script will be to stop all logging and history files then restore them after you no longer need to be stealthy :)