nmap for Recon and DoS

Welcome back, my nascent Hackers!​ In previous articles , we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it’s totally undetectable, meaning that the target never knows you’re scouting them and you leave no tracks. The disadvantage, of course, is that it’s limited […]

Continue Reading

Password Cracking Strategies

Welcome back, my hacker apprentices Recently, I started my password cracking series with an introduction to the principles and technologies involved in the art of cracking passwords. In past guides, I showed some specific tools and techniques for cracking Windows, online, Wi-Fi, Linux, and even SNMP passwords. This series is intended to help you hone your skills […]

Continue Reading

How to Hack Web Cams

Welcome back, my hacker novitiates!​ Like in my last article on remotely installing a keylogger onto somebody’s computer, this guide will continue to display the abilities of Metasploit’s powerful Meterpreter by hacking into the victim’s webcam. This will allow us to control the webcam remotely, capturing snapshots from it. ​ Why exactly would you want […]

Continue Reading

Command & Control Series Part III (Installing your Redirector)

In the dynamic landscape of cybersecurity operations, the use of Command and Control (C2) servers stands as a critical component for orchestrating coordinated tasks across compromised systems. However, directly interacting with a C2 can often leave an operator exposed to detection and countermeasures. This is where the strategic implementation of a redirector plays a pivotal […]

Continue Reading