Wildcards Understanding and Using for Hacking

Wildcards, I would like to highlight the use of Wildcards, because they are incredibly important, especially for “hacking-related and some programming” stuff. In this article I will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2020. In real-world attacks, arbitrary shell options and or arguments could be hidden among regular files, and not so easily spotted by the administrator. Same in case of cron jobs, shell scripts or web applications that calls shell commands.

How to Hack Exploit Windows Using Metasploit Beginners Guide

For this video - article, I set up Windows 7 (As an easy target). Create a payload with Metasploit MSFvenom and get full control over the target machine using Metasploit MSFConsole. And then we going to have some fun. I like to mention, that these commands I use in this tutorial are the same and it does not matter wetter you use Kali Linux or Parrot Security OS. All commands are the same.

Create bootable (USB) Drive fast

Download ISO with WGET or Curl and put this directly to your (USB) to make a bootable Drive - Simple and Fast. As you might know, personally I like to keep things as simple as possible, and fast as well. You can use these techniques with all types of files. But for this article, I like to show you how to make a bootable USB. That means you can boot your system from the USB or your Device.

How to Install Kali Linux 2020 2

Lately, I’ve been getting so many questions about how to install Kali Linux, so many questions about errors they encountered during or after installing. Hence this short article and video. Now I’m really going to refer you to the article from the previous installation, but I made a new video. Nothing has changed with the installation. You can see this very well in the video.  Here is the article you can follow: https://hackingpassion.

Clear Your Tracks on Linux

In this article and video, I show you how to clear your tracks in Linux. This is very important if you are a penetration tester, an ethical hacker, or a cybersecurity expert.  Clear Your Tracks The Final Step It is one of the biggest mistakes an attacker makes to let a track behind. If you see the biggest attacks in the past years, most of the detection was made really easy from the malware that the black hat hacker(s) have left, which they didn’t clear.

Red Hawk Information Gathering Vulnerability Scanner and Crawling

RED HAWK is A all in one tool for Information Gathering, Vulnerability Scanning, and Crawling. A must-have tool for all penetration testers. A Step-by-Step walkthrough.  Scans That You Can Perform Using RED HAWK Basic Scan Site Title NEW IP Address Web Server Detection IMPROVED CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup IMPROVED Geo-IP Lookup Grab Banners IMPROVED DNS Lookup Subnet Calculator Nmap Port Scan Sub-Domain Scanner IMPROVED Sub Domain IP Address Reverse IP Lookup & CMS Detection IMPROVED Hostname IP Address CMS Error Based SQLi Scanner Bloggers View NEW HTTP Response Code Site Title Alexa Ranking Domain Authority Page Authority Social Links Extractor Link Grabber WordPress Scan NEW Sensitive Files Crawling Version Detection Version Vulnerability Scanner Crawler MX Lookup NEW Scan For Everything - The Old Lame Scanner  Installation: 1 git clone https://github.

Who Would Put a Printer on the Internet

Are you as secure as you think? Is your printer secure? When was the last time you changed your computer or the device passwords? Do you have a different password for each? And what about your printer? It may be hard to believe but less than 2% of printers in use today are intrusion-proof. Most people do not change the default password at installation and giving hackers with this easy access to embedded system data, network information.

Hfish a Honeypot Platform

HFish Honeypot In this article and video, I show you how to set up the HFish Honeypot in a few different ways and show you what you can do with it. HFish It is a cross-platform honeypot platform developed based on Golang, which has been meticulously built for enterprise security.  What I show in this article and video  What is a Honeypot A honeypot looks like a real computer system that deliberately presents itself as vulnerable with applications and data, fooling cybercriminals into thinking it’s a legitimate target.