Lets hack your home network
- Cracking & Hacking
-
Android ADB exploit, brute force hacking, cybersecurity, ethical hacking, ethical hacking tutorial, find devices on network, hacking tools, home network security, MITM attack, network discovery, nmap scanning, open ports, penetration testing, router security, Windows SMB exploit
- February 12, 2025
Lets hack your home network Step 1: Network Discovery (Finding Devices) 1. Identify Your Network Subnet First, find your network’s IP range. Open a terminal and run: bash CopyEdit ip a | grep inet or bash CopyEdit ifconfig Look for something like 192.168.1.x or 10.0.0.x. The subnet is likely 192.168.1.0/24. 2. Scan the Network for Devices Use nmap to find …
Read More
How to Create an Evil Twin Attack to Capture Wi-Fi Credentials
How to Create an Evil Twin Attack to Capture Wi-Fi Credentials Let’s say, You are an Ethical hacker and you are learning and trying to figure out how to gain access to a target network using various penetration testing techniques for education purposes. Before we Delve into ” How to Create an Evil Twin Attack to Capture WI-FI Credentials, first …
Read More
How to hack a Website
How to Hack a Website Inspect the Page Source: Right-click on the page and select “View Page Source” or press Ctrl+U. Look for any comments or hidden elements that might contain hints or credentials. Click on the browser’s menu icon (often represented by three dots or lines) in the top-right corner. Hover over “More tools” and select “Developer tools” or …
Read More
Burp Suite Cheat Sheet
Burp Suite Cheat Sheet 🥴 Intro : Burp Suite is the de-facto penetration testing tool for assessing web applications. It enables penetration testers to test applications using features like repeater, intruder, sequencer, and extender. Burp Suite comes in a free community edition and a commercial professional edition. It has a built in Chromium browser for easy set-up of HTTP and SSL/TLS interception …
Read More
Reverse Shell Cheat Sheet
Reverse Shell Cheat Sheet PAYLOAD ALL THE THINGS Summary Tools Reverse Shell Awk Automatic Reverse Shell Generator Bash TCP Bash UDP C Dart Golang Groovy Alternative 1 Groovy Java Alternative 1 Java Alternative 2 Java Lua Ncat Netcat OpenBsd Netcat BusyBox Netcat Traditional NodeJS OGNL OpenSSL Perl PHP Powershell Python Ruby Rust Socat Telnet War Meterpreter Shell Windows Staged reverse …
Read More
How to Setup Wireshark
- Cracking & Hacking
-
Aircrack-ng setup, How to Setup Wireshark, how to sniff wireless traffic, how to turn on a wifi adapter, network monitoring tool, network packet analysis, packet capture configuration, protocol analyzer setup, wireshark beginner tutorial, Wireshark installation
- November 14, 2024
How to Setup Wireshark To set up your laptop to capture and analyze wireless network traffic using Aircrack-ng’s airmon-ng and Wireshark, follow these steps: First Buy and Get the necessary equipment To capture and analyze wireless network traffic using tools like Aircrack-ng’s airmon-ng and Wireshark, it’s essential to have a compatible wireless network adapter that supports monitor mode and packet …
Read More
Wireshark Cheat Sheet
Wireshark Cheat Sheet Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected to computer. Analyze over 750 protocols Can capture packets and save them to a file. Wireshark walkthrough the basics Wireshark user guide …
Read More
Linux Cheat Sheet
Linux Cheat Sheet Linux commands cheat sheet How to update/upgrade Linux: What does APT do? APT (Advanced Packaging Tool) is a set of core tools found inside the Debian operating system. It provides utilities for the installation and removal of software packages and dependencies on a system. apt is a subset of apt-get and apt-cache commands providing necessary commands for …
Read More
How to install Zenmap
How to install Zenmap Zenmap is the official graphical user interface (GUI) for Nmap, a widely used network scanning and security auditing tool. It simplifies Nmap’s functionalities, making them more accessible, especially for users who prefer a visual interface over command-line operations. Why Use Zenmap? User-Friendly Interface: Zenmap provides an intuitive GUI, allowing users to perform complex network scans without …
Read More
How to use theHarvester
How to use theHarvester What is theHarvester? theHarvester is an open-source intelligence (OSINT) tool designed to collect information such as email addresses, subdomains, IP addresses, and URLs from various public sources. It’s commonly used in the reconnaissance phase of penetration testing to map an organization’s external footprint. Why use theHarvester? Utilizing theHarvester enables security professionals to efficiently gather critical data …
Read More