Before we delve into this critical topic, let me emphasize the gravity of DNS settings in the realm of ethical hacking. Whether you’re a seasoned professional or just starting out, understanding the nuances of DNS settings is pivotal to your career. In the world of ethical hacking, there are several key factors that can determine your success or failure. However, one aspect that’s often overlooked, even by seasoned professionals, is the Domain Name System (DNS).
Ethical hacking techniques with SSH: Secure tunnels and data transfers Introduction Welcome to this comprehensive guide on Ethical hacking techniques with SSH: Secure tunnels and data transfers. In this easy-to-follow guide, you’ll get the inside scoop on why secure tunnels and data transfers are the unsung heroes of ethical hacking. Plus, you’ll learn how to up your cybersecurity game with the help of Secure Shell (SSH). Why is Ethical Hacking Important?
Dorks Eye is a script I made in python 3. With this tool, you can easily find Google Dorks. Dork Eye collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google’s search bots. You can save the output in a file so that you can view it at a later time. You can determine the number of searches yourself. The number of websites to display
Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then the data you get is saved in a .csv file. This is to make it easy to read. You can then open these files in Excel, LibreOffice or etc. Twitter Eye is WITHOUT an API Key that you need with most tools for Twitter. “Let’s make everything easy”.
Ghost Eye New Release. Ghost Eye is an Information Gathering, Footprinting, Scanner, and Recon Tool I made in Python 3. Since the last release of Ghost Eye, I’ve tweaked, removed, and added some new features. So that Ghost Eye would become more of a whole. For me, it remains a game of options so that together you get a complete overview of your target. Ghost Eye Options In the previous version of Ghost Eye, one of the the option was, “Have I been pwned” Since you need here now (a paid API) for this, I have removed this tool.
MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. This is such as telephone numbers, data leaks, related domain names and much more. Information Gathering Information Gathering is the act of gathering different kinds of information against the targeted victim or system. There are various tools, techniques, and websites, including public sources such as Whois, nslookup that can help gather information.
The Purpose of Maigret - collect a dossier on a person by username only, checking for accounts on a huge number of sites. This is a sherlock fork with cool features under heavy development. Don’t forget to regularly update source code from this repo. Currently supported more than 2000 sites (full list), by default the search is launched against 500 popular sites in descending order of popularity. The Commissioner Jules Maigret is a fictional French police detective, created by Georges Simenon.
Clear Your Tracks on Linux In this article and video, I show you how to clear your tracks in Linux. This is very important if you are a penetration tester, an ethical hacker, or a cyber security expert. Clear Your Tracks The Final Step It is one of the biggest mistakes an attacker makes to let a track behind. If you see the biggest attacks in the past years, most of the detection was made really easy from the malware that the black hat hacker(s) have left, which they didn’t clear.
Glances is a cross-platform system monitoring tool written in Python. It shows a frequently updated list of the processes running on a computer, normally ordered by the amount of CPU usage. It’ll run on almost any platform, including Linux, Windows, and macOS. This tool makes it easier for developers to view a large amount of monitoring information through a web-based interface. Many of you know Top as a monitor tool, or Htop, a slightly more extensive version of Top.
Wildcards, I would like to highlight the use of Wildcards, because they are incredibly important, especially for “hacking-related and some programming” stuff. In this article I will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2020. In real-world attacks, arbitrary shell options and or arguments could be hidden among regular files, and not so easily spotted by the administrator. Same in case of cron jobs, shell scripts or web applications that calls shell commands.