PRINT
PRINT
SEND MAIL
SEND MAIL

Month: July 2017

TUTORIALS

Compiling Linux Kernel (on Ubuntu)

This information might not precisely be related to this weblog, however as an train in getting accustomed to Linux, I am going to submit it anyhow. Here are just a few disclaimers- Don’t observe this information for compiling linux kernel, there are significantly better guides on the market for that goal (that is the one I adopted). The information exists that will help you be taught some new stuff which you did not know earlier than, and to enhance your understanding of Linux a…

TUTORIALS

How to install Kerberos!

Download  Roza writer to create your usb :   for windows   Linux 64   Linux 32 Open Roza Writer press the button with the folder, locate your Kerberos iso  select your drive and hit write! Errors and Fixes No grub after installation or grub fail to install durring the installation If for some reason the installer failed to install grub , don't panic!! You can fix this with  any linux distribution you have or just download a  ubuntu xenial iso and go on live mode and…

Custom DistributionsDownloadsNew Releases

Kerberos Gnu Debian Linux

Teaser Boot Animation Kerberos Gnu Debian Linux Kerberos is a penetration testing distribution focusing on automation and anonymity providing a auto exploid futures with msf functions , it aims to have the best tools available on the hacking scene tools like : Fuzzbunch,Dandespritz, Cobalt strike , Armitage , Metasploit framework and metasploit cummunity version set up and ready for use!!It includes custom scripts ,custom themes,custom icons !Kerberos distribution is based on debian testing ,it has the capability to use 3 repositories to install packages…

TUTORIALS

The Top 5 Pen Testing Tools You Will Ever Need

There is little doubt right now that the menace panorama is altering every day. It looks like that hardly one menace is found that many unknown ones are nonetheless lurking. One of the perfect methods for companies and companies to defend themselves is thru Penetration (Pen) Testing. This article will present an outline of what Pen Testing is, its advantages, and probably the most generally used instruments used right now. Generally talking, a Penetration Test (also referred to as a “Pen Test”) is a…

TUTORIALS

Install Kali Linux On Raspberry Pi 3 : Creation of a Hacking Machine

In this tutorial, we are going to inform you the best way to set up kali Linux on raspberry pi 3. Raspberry pi is a single board small pc which is transportable as properly. Raspberry pi 3 is the third technology Raspberry Pi. It will value you round $35-$40 (completely value it). It will include helpful specs. INSTALLATION REQUIREMENTS : Raspberry Pi :Raspberry Pi Model B RASP-PI-3 MotherboardSD CARD : Samsung Evo 16GB Class 10 micro SDHC Card (MB-MP16D/IN)Ethernet Cable : Patch Cord 1.5…

TUTORIALS

Stay anonymous while hacking online using TOR and Proxychains

[email protected]:-# sudo apt-get set up tor proxychains [email protected]:-# sudo service tor begin [email protected]:-# gedit /and so on/proxychains.conf Go to . Select one ip and add as proven : [email protected]:-# proxychains wget -qO- That’s it! Now you need to use proxychains with any kind of command. Example: [email protected]:-# proxychains sqlmap -u –dbs ############################################ # Full Hacking Course at Huge Discount: Click Here # ###########################################

TUTORIALS

Metasploitable 3: Exploiting ManageEngine Desktop Central 9

In the last hacking tutorial we have installed the Metasploitable 3 virtual machine on Windows 10 using Virtualbox, Vagrant and Packer. After setting up the virtual machine with Windows Server 2008 the installation script installed and configured all vulnerable services and applications. One of the vulnerable applications is ManageEngine Desktop Central 9. This version of ManageEngine Desktop Central 9 contains several vulnerabilities that allow us to upload files and execute commands on the target system. Both vulnerabilities have been patched by the vendor back…

TUTORIALS

18 Extensions For Turning Firefox Into a Penetration Testing Tool

Firefox is a widespread net browser from Mozilla. Popularity of Firefox just isn’t solely as a result of it’s a good net browser, it additionally helps add-ons to boost the performance. Mozilla has a web site add-on part that has 1000’s of helpful add-ons in several classes. Some of those add-ons are helpful for penetration testers and security analysts. These penetration testing add-ons helps in performing completely different sorts of assaults, and modify request headers direct from the browser. This approach, it reduces using…

TUTORIALS

19 Extensions to Turn Google Chrome into Penetration Testing tool

Google Chrome is the preferred internet browser of the world. It’s mild weight and comes with a clear interface. This is the principle cause of its recognition. It additionally has numerous different options that make web site searching simple and quicker. Like Firefox, Chrome additionally helps add-ons however known as extensions for Chrome. Extensions assist us in bettering the performance of Google Chrome. There are 1000’s of Google Chrome extensions out there that add good instruments immediately within the browser and scale back the…