How to Create an Evil Twin Attack to Capture Wi-Fi Credentials

How to Create an Evil Twin Attack to Capture Wi-Fi Credentials

How to Create an Evil Twin Attack to Capture Wi-Fi Credentials Let’s say, You are an Ethical hacker and you are learning and trying to figure out how to gain access to a target network using various penetration testing techniques for education purposes. Before we Delve into ” How to Create an Evil Twin Attack to Capture WI-FI Credentials, first …

Read More
TLDR Linux Commands

TL;DR (Quick Commands)

TL;DR (Quick Commands) Is your Kali running slow and need of a clean & boost? Well have no fear TLDR quick commands are here! sudo journalctl –vacuum-size=100M The cODe: sudo journalctl –vacuum-size=100M sudo rm -rf /var/cache/apt/archives/*.deb sudo systemctl disable –now bluetooth.service cups.service echo ‘vm.swappiness=10’ | sudo tee -a /etc/sysctl.conf && sudo sysctl -p sudo sync && sudo sysctl -w vm.drop_caches=3 …

Read More
Burp Suite Cheat Sheet

Burp Suite Cheat Sheet

Burp Suite Cheat Sheet 🥴 Intro : Burp Suite is the de-facto penetration testing tool for assessing web applications. It enables penetration testers to test applications using features like repeater, intruder, sequencer, and extender. Burp Suite comes in a free community edition and a commercial professional edition. It has a built in Chromium browser for easy set-up of HTTP and SSL/TLS interception …

Read More
Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet PAYLOAD ALL THE THINGS Summary Tools Reverse Shell Awk Automatic Reverse Shell Generator Bash TCP Bash UDP C Dart Golang Groovy Alternative 1 Groovy Java Alternative 1 Java Alternative 2 Java Lua Ncat Netcat OpenBsd Netcat BusyBox Netcat Traditional NodeJS OGNL OpenSSL Perl PHP Powershell Python Ruby Rust Socat Telnet War Meterpreter Shell Windows Staged reverse …

Read More
How to Setup Wireshark

How to Setup Wireshark

How to Setup Wireshark To set up your laptop to capture and analyze wireless network traffic using Aircrack-ng’s airmon-ng and Wireshark, follow these steps: First Buy and Get the necessary equipment To capture and analyze wireless network traffic using tools like Aircrack-ng’s airmon-ng and Wireshark, it’s essential to have a compatible wireless network adapter that supports monitor mode and packet …

Read More
Wireshark Cheat Sheet

Wireshark Cheat Sheet

Wireshark Cheat Sheet Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected to computer. Analyze over 750 protocols Can capture packets and save them to a file. Wireshark walkthrough the basics  Wireshark user guide …

Read More
Linux Cheat Sheet

Linux Cheat Sheet

Linux Cheat Sheet Linux commands cheat sheet How to update/upgrade Linux: What does APT do? APT (Advanced Packaging Tool) is a set of core tools found inside the Debian operating system. It provides utilities for the installation and removal of software packages and dependencies on a system. apt is a subset of apt-get and apt-cache commands providing necessary commands for …

Read More
Insert anchor

How to add Anchor Links in WordPress

How to add Anchor Links in WordPress How to add Anchor Links in WordPress, Learn how to create very easy anchor ids and links in WordPress. If you dont like using Gutenberg in WordPress like me, then you will find many of the tutorials on how to install anchor text not very good. So I put together this easy to …

Read More
Covering a broad Spectrum of Pentesting

Covering a broad Spectrum of Pentesting

Table of Contents Initial Scanning Port/Service Enumeration Port 21 — FTP Port 22 — SSH Port 25/110/143 — SMTP/POP3/IMAP Port 53 — DNS Port 80/443 — HTTP/S Port 139/445 — SMB/SAMBA Port 389/636 — LDAP/S Port 3306 — MySQL Port 3389 — RDP Shells File Transfers Privilege Escalation Initial Scanning The initial scanning phase is probably the most crucial aspect …

Read More