CREATE YOUR OWN WORDLIST WITH CRUNCH
CRUNCH INTRO:- While cracking the password, attacker always needs an wordlist. Normally, wordlist use thousand of words per second to crack the password. If attacker gathers some information about theRead More →
CRUNCH INTRO:- While cracking the password, attacker always needs an wordlist. Normally, wordlist use thousand of words per second to crack the password. If attacker gathers some information about theRead More →
SHODAN:- Shodan is a scanner which finds devices connected over the internet. Shodan can finds devices like traffic lights, security cameras, home heating devices and baby monitors, ethical hacking consultantsRead More →
Recon-ng is a tool written in python mostly used in information gathering with its independent modules, keys list and other modules. This tool is preloaded with lots of modules whichRead More →
DATASPLOIT:- Datasploit is a tool used in footprinting a target or defending target. It allows you to collect relevant information about the domain, email, phone number, person, etc, as perRead More →
What is WAPITI? Wapiti is a black box scanner. It only scans the webpage not source code fo the target. Wapiti only discover’s the vulnerabilities in a web application andRead More →
What is W3af? W3af is a tool used in auditing and exploitation of web applications. It’s an open source python based web vulnerability scanner. The tool also has GUI version.Read More →
DNSMap: Dnsmap is a tool used to gather subdomains & information of subdomains for a target host, as per ethical hacking courses. It was developed in 2006 and last updatedRead More →
For most people it is difficult to determine what is “normal” when looking for signs that reveal a compromised host. This is easily one of the biggest problems that digitalRead More →
Cybersecurity reports reveal the most frequently exploited vulnerabilities Shortly after the launch of its second annual report called “Under the Hoodie: Lessons from a season of penetration testing”, cybersecurity firmRead More →
Kali Linux is the most popular penetration testing and hacking Linux distroibution and Ubuntu is the most popular Linux distribution. Since it is kind of common knowledge that Linux is a more convenientRead More →