How to Install the New Tor Browser in Kali Linux
This video covers installing the Tor Browser Bundle v3.6+ (older versions work too, there is just an extra step with the new version,) on...
Hacking Course: Go from Beginner to Expert Hacker
Everything you need to get started as a hacker and take your hacking skills to an expert level is included in this free screen capture HD...
Setting up RKhunter on a Linux box and setup a Cron Job for rootkits
This on is quite easy, I use it all the time at work. How to install rkhunter! Login to your server (via SSH and su to root) cd...
Scheduling Tasks with Cron Jobs
Cron Jobs are used for scheduling tasks to run on the server. They're most commonly used for automating system maintenance or...
Creating a Backdoor Using Meterpreter
So, Let’s Start; You can either start the Metasploit framework from the Applications menu or from the command line. To launch Metasploit...
Simple Python Fully Undetectable (FUD) Reverse Shell Backdoor
During Internal penetration testing, sometimes you get an environment, where Antiviruses are up to date, which means that, you cannot use...
Why Every Hacker Should Know & Use Linux
In many of my tutorials, I have emphasized that a real hacker must know and use Linux, but I thought it might be time to emphasize and...
Hacking a Web Server with Armitage
Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits. It is a...
Using ProxyStrike to Detect SQL Injection
I've touched on exploiting SQL Injection in previous blog posts. I gave some tips on how to manually test inputs for sql injection, but...
Exploiting a Remote System using a Rootkit
Tools Used: Backtrack R5 Windows XP Home SP1 (Due to lack of exploit updates on my system for win 7) Beast v2.07 Trojan Horse ...