Argument Parsing | Python Hacking

I was strolling through my comment section and different subreddits the other day and noticed that a lot of you are asking "how can I use python for hacking?", "do I need coding for hacking", or similar questions. Since I used to be a software developer myself (now transitioning to a PenTester), I thought I … Continue reading Argument Parsing | Python Hacking

Information Gathering Tools [2018] – Ethical Hacking Guide

Finding information gathering tools can be troublesome, for beginner and more advanced penetration testers. It is the first step in a penetration test. I'll make this process easy for you, by providing a couple of useful tools. This list is going to be expanded and edited from time to time. Video https://www.youtube.com/watch?v=31tc3DbILtY&feature=youtu.be Online Information Gathering … Continue reading Information Gathering Tools [2018] – Ethical Hacking Guide

Information Gathering [Weekly How To Hack 0x01]

information gathering

Information Gathering is the first step in a penetration test. But how does it work? I create weekly videos, posts and other content to help beginners get their foot into ethical hacking. And this weeks topic was Information Gathering. This post is a recap of this months content I created. Aggregated into one simple post … Continue reading Information Gathering [Weekly How To Hack 0x01]

5 Ways To hack a password

Are you looking for ways to hack passwords? I can give you five different approaches to hacking passwords! Preconditions In order to crack a password, you have to know a little something about what hashes are, and how they work. I suggest watching this video: https://www.youtube.com/watch?v=--tnZMuoK3E Plus you'll need to have the passwords stored in … Continue reading 5 Ways To hack a password

How To Hack WiFi – Commands | WiFI Hacking Guide

A little tutorial on how to hack wifi networks/ access points. Based on my youtube video. video https://www.youtube.com/watch?v=eiCkxC_Hbf4 available at 2018-08-01 7:OO PM UTC Explanation We need to figure out available access points. Then we need to monitor connections to the target access point and capture the auth- handshake. To do this, we need to … Continue reading How To Hack WiFi – Commands | WiFI Hacking Guide