Category: Tutorials

  • Athena OS — Hacking Distribution

    Introduction Welcome to my new article, today I will show you Athena OS, a new open-source Pentesting distribution based in Arch Linux. Let’s get started!!! Description from Github Repo: Athena is a Arch Linux-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool! GitHub — Athena-OS/athena-iso: Athena is a Arch Linux-based distro focused on Cybersecurity.…

  • Pentesting Study Plan and Job Hunting — on a Budget

    Working in cybersecurity can be a very fulfilling career, but most jobs require some amount of experience or formal training. While there are many great courses and certifications for learning pentesting out there, it might be the case that they are simply above your budget. But that is totally fine. I think it is still…

  • HBSQLI – Automated Tool For Testing Header Based Blind SQL Injection

    HBSQLI is an automated command-line tool for performing Header Based Blind SQL injection attacks on web applications. It automates the process of detecting Header Based Blind SQL injection vulnerabilities, making it easier for security researchers , penetration testers & bug bounty hunters to test the security of web applications.  Disclaimer: This tool is intended for authorized penetration testing and…

  • 10 Most Secure Linux Distros

    Without an introduction, because by reading the heading, you already know what this blog is all about privacy, securtiy and more privacy. Then, let’s start without loading your bytes. Why the Choice of Linux Distro Matters A Linux distribution serves as the cornerstone of your computing experience, governing interactions between hardware components. Without robust security…

  • Roadmap to become an Ethical Hacker in 2023

    A professional programmer knowledgeable in computer operating systems and machine code was initially what the term “hacker” denoted. A person who regularly engages in hacking activities and has adopted hacking as a way of life and philosophy is now referred to as a “hacker.” Hacking is the act of changing a system’s functionality to achieve…

  • Nikto Introduction – web Application Security

    Introduction Nikto is a vulnerability scanner part of Kali Linux and is widely used to find vulnerabilities in Web servers. It performs various tasks, including: In this write-up, I will demonstrate how Nikto is used for vulnerability scanning. ⚠️ Disclaimer: All information, techniques, and tools described in this write-up are for educational purposes only. Use…

  • Explore Various Network Scanning Techniques using Hping3

    Explore Various Network Scanning Techniques using Hping3 Hping2/Hping3 is a command-line-oriented network scanning and packet crafting tool for the TCP/IP protocol that sends ICMP echo requests and supports TCP, UDP, ICMP, and raw-IP protocols. Using Hping, you can study the behavior of an idle host and gain information about the target such as the services…

  • Explore Various Network Scanning Techniques using Nmap

    Explore Various Network Scanning Techniques using Nmap Nmap comes with various inbuilt scripts that can be employed during a scanning process in an attempt to find the open ports and services running on the ports. It sends specially crafted packets to the target host, and then analyzes the responses to accomplish its goal. Nmap includes…

  • Perform Port Scanning using sx Tool

    Perform Port Scanning using sx Tool The sx tool is a command-line network scanner that can be used to perform ARP scans, ICMP scans, TCP SYN scans, UDP scans and application scans such as SOCS5 scans, Docker scans and Elasticsearch scans. In the terminal window, type sx arp [Target subnet] and press Enter (here, the…

  • Perform Port and Service Discovery using NetScanTools Pro

    Perform Port and Service Discovery using NetScanTools Pro NetScanTools Pro is an integrated collection of utilities that gathers information on the Internet and troubleshoots networks for Network Professionals. With the available tools, you can research IPv4/IPv6 addresses, hostnames, domain names, e-mail addresses, and URLs on the target network. The Setup – NetScanTools Pro Demo window…