Lets hack your home network

Lets hack your home network

Lets hack your home network Step 1: Network Discovery (Finding Devices) 1. Identify Your Network Subnet First, find your network’s IP range. Open a terminal and run: bash CopyEdit ip a | grep inet or bash CopyEdit ifconfig Look for something like 192.168.1.x or 10.0.0.x. The subnet is likely 192.168.1.0/24. 2. Scan the Network for Devices Use nmap to find …

Read More
How to Create an Evil Twin Attack to Capture Wi-Fi Credentials

How to Create an Evil Twin Attack to Capture Wi-Fi Credentials

How to Create an Evil Twin Attack to Capture Wi-Fi Credentials Let’s say, You are an Ethical hacker and you are learning and trying to figure out how to gain access to a target network using various penetration testing techniques for education purposes. Before we Delve into ” How to Create an Evil Twin Attack to Capture WI-FI Credentials, first …

Read More
Burp Suite Cheat Sheet

Burp Suite Cheat Sheet

Burp Suite Cheat Sheet 🥴 Intro : Burp Suite is the de-facto penetration testing tool for assessing web applications. It enables penetration testers to test applications using features like repeater, intruder, sequencer, and extender. Burp Suite comes in a free community edition and a commercial professional edition. It has a built in Chromium browser for easy set-up of HTTP and SSL/TLS interception …

Read More
Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet PAYLOAD ALL THE THINGS Summary Tools Reverse Shell Awk Automatic Reverse Shell Generator Bash TCP Bash UDP C Dart Golang Groovy Alternative 1 Groovy Java Alternative 1 Java Alternative 2 Java Lua Ncat Netcat OpenBsd Netcat BusyBox Netcat Traditional NodeJS OGNL OpenSSL Perl PHP Powershell Python Ruby Rust Socat Telnet War Meterpreter Shell Windows Staged reverse …

Read More
How to Setup Wireshark

How to Setup Wireshark

How to Setup Wireshark To set up your laptop to capture and analyze wireless network traffic using Aircrack-ng’s airmon-ng and Wireshark, follow these steps: First Buy and Get the necessary equipment To capture and analyze wireless network traffic using tools like Aircrack-ng’s airmon-ng and Wireshark, it’s essential to have a compatible wireless network adapter that supports monitor mode and packet …

Read More
Wireshark Cheat Sheet

Wireshark Cheat Sheet

Wireshark Cheat Sheet Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected to computer. Analyze over 750 protocols Can capture packets and save them to a file. Wireshark walkthrough the basics  Wireshark user guide …

Read More
Linux Cheat Sheet

Linux Cheat Sheet

Linux Cheat Sheet Linux commands cheat sheet How to update/upgrade Linux: What does APT do? APT (Advanced Packaging Tool) is a set of core tools found inside the Debian operating system. It provides utilities for the installation and removal of software packages and dependencies on a system. apt is a subset of apt-get and apt-cache commands providing necessary commands for …

Read More
How to install Zenmap

How to install Zenmap

How to install Zenmap Zenmap is the official graphical user interface (GUI) for Nmap, a widely used network scanning and security auditing tool. It simplifies Nmap’s functionalities, making them more accessible, especially for users who prefer a visual interface over command-line operations. Why Use Zenmap? User-Friendly Interface: Zenmap provides an intuitive GUI, allowing users to perform complex network scans without …

Read More
How to use theHarvester

How to use theHarvester

How to use theHarvester What is theHarvester? theHarvester is an open-source intelligence (OSINT) tool designed to collect information such as email addresses, subdomains, IP addresses, and URLs from various public sources. It’s commonly used in the reconnaissance phase of penetration testing to map an organization’s external footprint. Why use theHarvester? Utilizing theHarvester enables security professionals to efficiently gather critical data …

Read More