The purpose of packetforge-ng is to create encrypted packets that can subsequently be used for injection. You may create various types of packets such as arp requests, UDP, ICMP and custom packets. The most common use is to create ARP requests for subsequent injection. To create an encrypted packet, you …
Read More »Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
Recommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent the initial attack vectors and the spread of malicious activity, there is no single proven threat response. Using a defense-in-depth …
Read More »Browse anonymously in Kali Linux with Anonsurf
anonsurf allows you push your whole system via TOR network. It’s very easy to configure and possibly less hassle than setting up a VPN. Of course you will have slower connection speed than VPN as you are using TOR network. Anonsurf works in the background (you can close the terminal), …
Read More »Spoof or change MAC address in Linux
This guide takes you through step by step procedures on how to change MAC address in Linux. I’ve tried to make it generic to cover most Linux distros. If you have a different option, please comment and I will include it in my guide. Under GNU/Linux, the MAC address of …
Read More »