Brute-force SMB shares

“Finding open shares is useful to a penetration tester because there may be private files shared, or, if it’s writable,…

Common nmap commands during Pentest

1. Discover live hosts in a subnet nmap -n -sn -PE -oA live_hosts 192.168.1.0/24 2. Discover open TCP ports nmap…

Kali right click no new document

1. GoTo Templates folder cd /root/Templates 2. Create empty file touch "New Document"

Web Content Scanner

DIRB is a Web Content Scanner, URL Bruteforcer. It looks for existing (and/or hidden) Web Objects. It basically works by…

Kali Linux Tools

Kali Linux provides multiple metapackages that allow us to easily install subsets of tools based on our particular needs. These…

Honeypot Linux distribution

HoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed….

How to Install Atom Text Editor Debian

Atom is a text editor that’s modern, approachable, yet hackable to the core—a tool you can customize to do anything…

Targeted geolocation and tracking

HoneyBadger is a framework for targeted geolocation. HoneyBadger is used to identify the physical location of a web user using…

SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction…

How to delete a folder in use

1. Start Process Explorer from SysInternals suite. 2. Press Ctrl+F to open Search window. 3. Search for the folder name…

Next Page