Tag: Tips

Installing Kali Linux from Windows App Store in Windows 10

Kali Linux from Windows App Store
In this post you're going to learn how to install Kali Linux from Windows App Store in Windows 10.Microsoft's Windows Subsystem for Linux (WSL) is a great way to utilize Kali on your Windows computer without the need for a virtual machine. However, it is...

Kalibrating Device for GSM and Decoding ADS-B messages

As I have mentioned in my previous article that I'll discuss Kalibrating Device for GSM and Decoding ADS-B messages in my upcoming article so here is the useful guide to get familiar with these methods.This article is the second part of Software Defined RadiosRTLSDR also...

How to use Software Defined Radios

In this article we'll cover how to use software defined radios. This will include following topicsIntroduction to radio frequency scanners Hands-on with RTLSDR scanner Playing around with gqrx Kalibrating device for GSM tapping Decoding ADS-B messages with Dump1090The term software-defined radio means, implementation...

Compromise SSH (Secure Shell) using Kali Linux

In this article we are going to discuss how to penetrate or compromise SSH (Secure Shell) using Kali Linux. Basically secure shell (SSH) protocol is a network protocol mainly used to establish an encrypted communication channel across an open network between a server and...

Penetration Testing IPSec VPN (Virtual Private Network)

Introduction In this article we are going to discuss Penetration Testing IPSec VPN (Virtual Private Network). VPN provide secure (encrypted) communications between remote locations or users within the same network through internet. Basically there are two types of VPNs: IPSec VPN and SSL VPN. IPSec is...

How Buffer Overflow Attacks Work in Kali Linux

Here is all you need to know about Buffer Overflow Attacks process, how they work? and how to make yourself root user on a computer using a buffer overflow attack in Kali Linux? you may want learn about Fileless attacks also?...

RDPY Security Tool Penetrate into Remote Desktop Protocol

RDPY security tool is a Microsoft RDP Security tool developed in pure Python with RDP (MITM) proxy help. This permits a consumer to document classes and develop honeypot performance. It helps each Microsoft RDP (Distant Desktop Protocol) protocol consumer and server aspect. RDPY security tool...

WAFNinja Kali Linux tool to Bypass WAF

I have added a video tutorial about WAFNinja Kali Linux tool to understand this python tool which can bypass WAF. Basically WAFNinja is a CLI (Command Line Interface) python software that helps penetration testers to bypass Internet Software Firewall by automating steps essential for...

(Guide) Export WordPress Users Information to a CSV File

This is a simple and basic guide to export wordpress users information to a CSV file. The default WordPress export tool doesn't embrace user accounts. It lets you create user accounts through the import, provided that these users have content material. This excludes user roles with no...

WordPress Complete Security Guide in one Article

Yes we are going to discuss now Wordpress Complete Security Guide in one Article. WordPress safety is a subject of big significance for each web site proprietor or a blogger. Every week, Google blacklists round 20,000 web sites for malware and round 50,000 for...