nmap for Recon and DoS

Welcome back, my nascent Hackers!​ In previous articles , we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it’s totally undetectable, meaning that the target never knows you’re scouting them and you leave no tracks. The disadvantage, of course, is that it’s limited […]

Continue Reading

Password Cracking Strategies

Welcome back, my hacker apprentices Recently, I started my password cracking series with an introduction to the principles and technologies involved in the art of cracking passwords. In past guides, I showed some specific tools and techniques for cracking Windows, online, Wi-Fi, Linux, and even SNMP passwords. This series is intended to help you hone your skills […]

Continue Reading

How to Hack Web Cams

Welcome back, my hacker novitiates!​ Like in my last article on remotely installing a keylogger onto somebody’s computer, this guide will continue to display the abilities of Metasploit’s powerful Meterpreter by hacking into the victim’s webcam. This will allow us to control the webcam remotely, capturing snapshots from it. ​ Why exactly would you want […]

Continue Reading