Lets hack your home network

Lets hack your home network

Lets hack your home network Step 1: Network Discovery (Finding Devices) 1. Identify Your Network Subnet First, find your network’s IP range. Open a terminal and run: bash CopyEdit ip a | grep inet or bash CopyEdit ifconfig Look for something like 192.168.1.x or 10.0.0.x. The subnet is likely 192.168.1.0/24. 2. Scan the Network for Devices Use nmap to find …

Read More
Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet PAYLOAD ALL THE THINGS Summary Tools Reverse Shell Awk Automatic Reverse Shell Generator Bash TCP Bash UDP C Dart Golang Groovy Alternative 1 Groovy Java Alternative 1 Java Alternative 2 Java Lua Ncat Netcat OpenBsd Netcat BusyBox Netcat Traditional NodeJS OGNL OpenSSL Perl PHP Powershell Python Ruby Rust Socat Telnet War Meterpreter Shell Windows Staged reverse …

Read More
Covering a broad Spectrum of Pentesting

Covering a broad Spectrum of Pentesting

Table of Contents Initial Scanning Port/Service Enumeration Port 21 — FTP Port 22 — SSH Port 25/110/143 — SMTP/POP3/IMAP Port 53 — DNS Port 80/443 — HTTP/S Port 139/445 — SMB/SAMBA Port 389/636 — LDAP/S Port 3306 — MySQL Port 3389 — RDP Shells File Transfers Privilege Escalation Initial Scanning The initial scanning phase is probably the most crucial aspect …

Read More
How to use theHarvester

How to use theHarvester

How to use theHarvester What is theHarvester? theHarvester is an open-source intelligence (OSINT) tool designed to collect information such as email addresses, subdomains, IP addresses, and URLs from various public sources. It’s commonly used in the reconnaissance phase of penetration testing to map an organization’s external footprint. Why use theHarvester? Utilizing theHarvester enables security professionals to efficiently gather critical data …

Read More
Kali Linux Basics: Cheat Sheet for Beginners

Kali Linux Basics: Cheat Sheet for Beginners

💻Kali Linux Basics: Cheat Sheet for Beginners November 05, 2024 Table of Contents 🧭 Navigation & Directory Management 📝 File Operations 🔍 Search for Files and Text 📦 Package Management with APT 🔒 Permissions and Ownership 📊 System Monitoring 🌐 Network Essentials 💾 File Compression and Archiving 🔧 Process Management ⏰ Scheduling with Cron 🔑 SSH & Remote Access 🧭 Navigation …

Read More
Top 20 Bug Bounty Platforms to Earn Money from

Top 20 Bug Bounty Platforms to Earn Money from

Top 20 Bug Bounty Platforms to Earn Money from Earn Big Money Hacking Fortune 500 companies! At the heart of ethical hacking and responsible disclosure, bug bounty programs connect security-minded individuals with organizations seeking to identify vulnerabilities in their systems. This mutually beneficial arrangement allows you to leverage your skills, uncover security flaws, and earn money in the process. With …

Read More