What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Kali

How to scan a website with metasploit

What is WMAP? WMAP is a feature-rich web application vulnerability scanner that was originally created from a tool named SQLMap. This tool is integrated with Metasploit and allows us to conduct web application scanning from within the Metasploit Framework. Vulnerability Scanning with WMAP We begin by first creating a new . . . Read more

How to Recover Data from Corrupt / formatted USB Flash

How to Recover Data from Corrupt / formatted USB Flash If you accidentally deleted your data or you formatted your USB flash or your friend running Virus full Windows corrupted it then, PhotoRec is an awesome tool for you to choose for Data Recovery. TestDisk can Fix partition table, recover deleted . . . Read more

What’s new in Kali 2.0

I’m sure a lot of you have been waiting for the launch of Kali 2.0. I’ve started looking into competitive programming, and hence now have a bit less time for this blog. That being said, I took a few screenshots for you guys to see what Kali 2.0 has to . . . Read more

Cracking Wifi WPA/WPA2 passwords using Reaver-WPS

Description: Reaver-wps targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar. In order to authenticate as a registrar, the registrar must prove its . . . Read more

Anonymous Scanning with Nmap in Kali Linux

Anonymizing your connection is one the main requirements you need to do when you want to do bad things. When you going to scan a website or target host for vulnerabilities undetected so that Interpol won’t come knocking at your door with the Female Body Inspectors. For this purpose we . . . Read more

13 Metasploit Meterpreter File System Command You Should Know

1. cat The cat command displays the contents of a single file. As of the time of this writing, the command will throw an error when trying to read an emtpy file. meterpreter > cat passwords.txt harleydavidson password kidsbirthday   2. cd To change directory the cd command is used. The command will accept both back and forward slashes somewhat . . . Read more

Google Hacking Tutorial + SQL Injection (Basic)

Purpose : As a website owner you can also aware with this kind of attack to your web server Why I wrote this tutorial about Google Hacking is because there are some people keep messaging me about how to perform Google Hacking… A lot of people that learn about hacking they just think that hacking was going through a webserver or . . . Read more