Security

How to

Kali Linux

Enabling AMD GPU for Hashcat on Kali Linux: A Quick Guide

If you've encountered an issue where Hashcat initially only recognizes your CPU and not the GPU, this guide can help you enable your AMD...

Virtual Private Network (VPN)

Advanced Persistent Threat Activity Exploiting Managed Service Providers

Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment...

Popular in Last 24 Hours

Wireless LAN (Wi-Fi)

Can’t connect to WiFi in Linux

So I installed the latest version of Kali Linux from USB into my RAZER Blade 2016 laptop. Took a while as it seems after...

Cyber Actors Target Home and Office Routers and Networked Devices Worldwide

DHS and FBI recommend that all SOHO router owners power cycle (reboot) their devices to temporarily disrupt the malware. Network device management interfaces—such as Telnet, SSH,...

Automatically crack WiFi password with besside-ng

besside-ng is a tool like Wesside-ng but it support also WPA encryption. It will automatically crack all the WEP networks in range and log...

Forging ARP, UDP, ICMP or custom packets with packetforge-ng

The purpose of packetforge-ng is to create encrypted packets that can subsequently be used for injection. You may create various types of packets such...

Crack a WEP key of an open network without user intervention with Wesside-ng

Wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes. It first identifies a network,...

Security

Output your microphone to a remote computers speaker

Output your microphone to a remote computers speaker

SSH through host in the middle

This command will SSH through host in the middle. Unreachable_host is unavailable from local network, but it's available from reachable_host's network. This command creates a connection to unreachable_host through "hidden" connection to reachable_host.

Recent Posts