hacking

Wireless Hacking Tutorial

Overview

Today we're going to go over the principals of wireless hacking, an example of a WPA2 hacking and then we will wrap it up with a few troubleshooting tips. Disclaimer: Before we begin let me preface this. Intrusion into anyone's network without express permission by the network owner is illegal. I highly recommend you practice these techniques on your own wireless network. I take NO responsibility in what you do with this knowledge. (more…)

By hellor00t, ago
hacking

Hack with Metasploit – Exploitation

If you have been following along with our Hacker Methodology series you'll remember that conducting a hack on a target is a logical process. So far we have completed recon of our target machine in our hack lab. Our next step in hacker methodology is the exploitation phase. This is the phase where we gain access to the target machine. We will go deeper into metasploit, its commands and its features a bit later, this is a brief overview combined with an example to get you thinking about some of the things that you can do. (more…)

By hellor00t, ago
hacking

Hack Methods – Active Recon With Nmap

Overview

If you have not reviewed the Hacker Methodology write up now is a good time to check it out. It will provide you with a much better overview of how we are logically gathering intelligence in order to create a solid basis for the later phases of hacking or penetration testing. In this overview we're going to learn about some of the common uses of nmap, go over a few of the switches or options and how they work and then wrap it up with an example of a scan. Disclaimer: nmap is considered to be recon for further action and can be taken as hostile intent. It's a grey area between illegal and not, depending on how good of a lawyer you have. I recommend ONLY using this in our Hacker Lab. Used incorrectly it is VERY obvious when you are scanning. (more…)

By hellor00t, ago
hacking

Basic Hacker Methodology – Steps to the Hacking Process

Overview

Many beginners don't understand that hacking or penetration testing follows a very logical process and when broken down can really clarify tasks and goals. During this write-up I will use a fake company as an example and use very general examples of how each step is completed. Our target will be a fake company called SillyVictim and all we know is that they have a webpage and they have an internal company network. Our goal is infiltrate this company and obtain admin privileges. I'll be using my metasploitable and Kali VM's from my previous lesson as examples on how to apply this methodology. (more…)

By hellor00t, ago
hacking

Building a Hack Lab For Free: Part 1

Overview

A frequently asked question is "How do I practice?". Well today we're going to show you how to safely create your own hack lab environment completely free on a Windows machine.  You can do this on a *nix or even OSX, VirtualBox supports any of them and is the only installation required. The best part about having your lab in a VM is that if you have any problems, you and quickly reset your machine to a previous state without compromising your main machine.

Part 2 of this tutorial can be found here.

(more…)

By hellor00t, ago