Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Bash Bunny – Multi-Functional USB Attack Device

Bash Bunny is a simple and powerful multi-function USB attack device and automation platform for all pentesters and sysadmins, designed by Hak5, which allows you to easily perform multiple USB (badUSB) based attacks. It’s a tiny and portable Debian based linux computer with a USB interface designed specifically to execute payloads when plugged into a […]

High school Students Arrested for Allegedly Employing Someone from the Dark Web to Hack Their School WIFI

Two 14 year old freshmen from Secaucus N.J. high school were recently arrested after being accused of hacking their school’s WIFI system. The two boys allegedly knocked down their school’s WIFI system so as to avoid taking a test. With the WIFI down, the teachers were not able to teach any lessons or give any […]

Commando VM – Windows Based Kali Linux Alternative

Commando VM launched by FireEye, aiming to provide a Windows distribution that focuses on supporting penetration testers and red teamers. It is recommended to install the Commando VM in a virtual machine, for installation it requires 60 GB of disk space, 2 GB memory, and the operating system should be Windows 7 Service Pack 1, […]

CQTools – Ultimate Hacking Toolkit

This toolkit allows you to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to […]

QRLJacker v2.0 – QRLJacking Exploitation Framework

QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers. What is QRLJacking? QRLJacking or Quick Response Code Login Jacking is a simple social engineering […]

mongoBuster – Hunt Open MongoDB Instances

Hunt Open MongoDB instances on the internet efficiently. Features Worlds fastest and most efficient scanner ( Uses Masscan ). Scans entire internet by default, So fire the tool and chill. Hyper efficient – Uses Go-routines which are even lighter than threads. Pre-Requisites – Go language ( sudo apt install golang ) Masscan ( sudo apt […]

A Look at Baldr, a New Type of Malware Circulating in Hacking Forums

Baldr is a unique malware recently found on darknet hacking forums that adopts a grab-and-go approach in gathering bulk data from computers. Malware developers in underground hacking forums are reportedly pushing a new malware called Baldr. Popular mostly in Russian forums, Baldr received acclamation at the time of inception in January. Like other malware, it […]

Data breach in fitness website bodybuilding.com

Bodybuilding.com, the internet’s biggest online store and online forum for fitness and bodybuilding enthusiasts, has disclosed last week a security breach that impacted its IT systems. The incident report mentions that the security breach could have compromised some personal details about bodybuilding.com users stored by the website owners. “We conduct research in collaboration with external […]

Ethical Hacking Tutorials © 2018
Skip to toolbar