Tags » Ethical Hacking

Text Processing with Kali Linux Scripting

Text processing is a skill that is often used.

For today’s example, we will try filtering a list of words that we can use as a wordlist for password brute forcing. 209 more words

Ethical Hacking

Finding Vulnerabilities with Nikto

Nikto is a small and simple tool that examines a website and reports vulnerabilities back. A word of warning before using Nikto, it is not… 88 more words

Ethical Hacking

WPScan - Obtaining User Access of A Wordpress Websit

Getting information of a WordPress website can be done by using WPScan. WPScan is a black box WordPress vulnerability scanner created by WPScan team with the official website WPScan.org. 219 more words

Ethical Hacking

Installing Kali Linux with VirtualBox

We will need to download two things:

  • VirtualBox
  • The most recent Kali Linux VirtualBox edition

First, install VirtualBox.

Second, double-click the Kali VM you downloaded. An import screen will then pop up, press import to finish the process. 45 more words

Ethical Hacking

~ Web Bug Scanners ~

When it comes to web application scanning technique i always prefer manual testing because automated tools are limited because you are applying some programmer technique to your target website to find any bug or vulnerability. 1,140 more words

Daily Blog Post

The Big Business of Data Privacy: 3B

Who wrote “There’s No Business Like Show Business?”  It was Irving Berlin who had written “There’s No Business Like Show Businessfor the 1946 musical “Annie Get Your Gun. 502 more words

Cyber Security

How you can do evil with your computer without harming a soul.

As a relative newbie in the world of information security, I’m struck by the seductive call of the black hat. Just as the internet has made so many good things easier, such as connecting with my far-flung family instantly via text, so has the web smoothed the way to the dark side of human nature. 455 more words

News & Commentary