Kali Linux

New Kali Linux 2022.1 Version Released

(Last Updated On: February 16, 2022) The Offensive Security has announced Kali Linux 2022.1 with major updates. The first version of the year 2022. Kali Linux is one of the famous platform for ethical hackers and penetration testers. After two

Kali Linux : Touchpad issues – tapping, reverse/natural scrolling

Since I’ve started using Kali Linux, I have often encountered problems with my touchpad. The problem can either be with tapping (tapping the touchpad doesn’t result in a click, and I have to press the physical button), or with scrolling

Kali Linux 2022.2 Released – Added 10 New Software

(Last Updated On: July 24, 2022) kali Linux 2022 adds its new version for this year. Kali Linux 2022.2 with major updates has been released by Offensive Security and released with ten new various software. It is one of the

Metasploit and Metasploitable 2 installation

In this new Metasploit tutorial we will be installing and configuring Metasploit on Kali Linux and the Metasploitable 2 virtual machine on VMware Player. Metasploit is one of the most popular and top rated penetration testing tools on the market and

Cracking WPA with oclHashcat GPU on Windows

In this tutorial we’re going to crack the WPA/WPA2 wireless network key using oclHashcat on Windows. Instead of using CPU power to brute force the password we’re going to use the GPU’s, short for Graphics Processing Unit. The benefit of using the GPU

Metasploit commands – Y3llowl4bs

In this article we will be talking about the very basics of Metasploit and the Metasploit commands used in the command line interface. At first the MSF console command line and the number of available commands might seem a lot and

WPS Pixie Dust Attack in Kali Linux with Reaver

Pixie Dust Attack WPS with Reaver In this tutorial we are going to do a pixie dust attack using Reaver 1.5.2, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is

Metasploitable 2 enumeration – Y3llowl4bs

In this new Metasploit Hacking Tutorial we will be enumerating the Metasploitable 2 virtual machine to gather useful information for a vulnerability assessment. Enumeration in mathematics or computer science is referred to as listing a number of elements in a set. Enumeration

How to hack a TP link WR841N router wireless network

In this tutorial we will show you how to hack a TP link WR841N router wireless network with the default wifi password using Kali Linux. TP Link routers use the default WPS PIN as wifi password out of the box

Metasploitable 2 vulnerability assessment – Y3llowl4bs

A vulnerability assessment is a crucial part in every penetration test and is the process of identifying and assessing vulnerabilities on a target system. In this part of the tutorial we will be assessing the vulnerabilities available on the network

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!