LEARN ETHICAL HACKING WITH DVWA & DWWS

DAMN VULNERABLE WEB APPLICATION Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students…Read more LEARN ETHICAL HACKING WITH DVWA & DWWS

How to encrypt and decrypt your files with ccrypt

  Encryption is one way that ensures the safety and security of our data, making the information unreadable to anyone who tries to get it without authorization. In addition to ensuring the integrity of your files, it allows access to be made ​​only for those who have the key (password) to decrypt it. We'll see…Read more How to encrypt and decrypt your files with ccrypt

Making scanning and raising vulnerabilities with Nikto

Nikto is a Perl tool developed by Chris Solo and David Lodge, which was written for vulnerability validation supporting multiple platforms, including Windows, Linux and UNIX. Unlike some security scanners, Nikto is designed to operate in a stealth mode, yet it causes a noise like other scanners. It is an open source licensed under the…Read more Making scanning and raising vulnerabilities with Nikto

Auditing and creating vulnerability analysis report with Nessus

  Nessus is one of the best tools to do vulnerability assessment, due to present an interactive interface and be able to generate and robust reporting. We will bring here how to install it, and how to make a vulnerability assessment (scanning) on ​​the target, showing some of its features such as report generation. Entering…Read more Auditing and creating vulnerability analysis report with Nessus

Performing Man in the Middle attack with sslstrip and Ettercap

In this tutorial we will address the type of attack known as Man in the Middle. This test "poison" the ARP table of the victim, causing the attacker machine - our machine - to pass through the router, so that we can intercept the traffic and have access to sensitive data exchanged between the two…Read more Performing Man in the Middle attack with sslstrip and Ettercap

An Informal Guide to Linux Distributions For the Unwashed Hacker

  I have decided to adapt a long post of mine detailing the “big five” minimalistic Linux distributions into a general guide for newcomers on entering the Linux ecosystem and choosing their first distro. == 1. A Quick and Dirty Introduction == I’m not going to cover the history of GNU, Linux and the free…Read more An Informal Guide to Linux Distributions For the Unwashed Hacker

Great Links & Tools to Learn From

I am not taking any credit for this list. I found this list and I am posting it here to share with everyone. I have checked most of the links but not all of them so if any are dead let me know and I will look for alternatives. Security Forums https://evilzone.org https://www.hackthissite.org/forums/index.php https://www.ethicalhacker.net/forums/index.php http://forum.antichat.ru/…Read more Great Links & Tools to Learn From

Stored XSS And SET ToolKit

Stored XSS is the most dangerous type of cross site scripting due to the fact that the user can be exploited just by visiting the web page where the vulnerability occurs.Also if that user happens to be the administrator of the website then this can lead to compromise the web application which is one of the…Read more Stored XSS And SET ToolKit

How to exploit home routers for anonymity

  This article is just a demo for educational purposes. To those who say this sort of information should be censored, I say you can close your eyes and shout, “la-la-la-la-this-doesn’t-exist” all you want but that won’t make practices like those outlined below disappear. Only through awareness can you grow and protect yourself and others.…Read more How to exploit home routers for anonymity

Best Onion Links – Deep Web

Introduction Points Ahmia.fi – Clearnet search engine for Tor Hidden Services The Hidden Wiki – Wiki style link list of TOR, most links there are SCAMS! OnionList Onion Link List and Vendor Reviews. DuckDuckGo – A Hidden Service that searches the clearnet. Bitcoin Fog – Bitcoin anonymization taken seriously. Torch – Tor Search Engine. Claims…Read more Best Onion Links – Deep Web