17 Essential Skills to Become a Master Hacker
1. Advanced Computer Skills It probably goes without saying that to become a hacker you need some mad computer skills. These skills go...
Setting up RKhunter on a Linux box and setup a Cron Job for rootkits
This on is quite easy, I use it all the time at work. How to install rkhunter! Login to your server (via SSH and su to root) cd...
Scheduling Tasks with Cron Jobs
Cron Jobs are used for scheduling tasks to run on the server. They're most commonly used for automating system maintenance or...
Making Malware Using Bash Scripting
There are many different classes of malware that have varying ways of infecting systems and propagating themselves. Malware can infect...
11 great Rails libraries we use on every project
As you work with your favorite programming language, you often look for tools to make your job easier. In the Ruby world, these tools...
Creating a Backdoor Using Meterpreter
So, Let’s Start; You can either start the Metasploit framework from the Applications menu or from the command line. To launch Metasploit...
How to Hack WiFi with Raspberry Pi 2
Raspberry Pi infused with the Kali Linux Raspberry Image creates the ultimate portable hacking toolkit. You still need a Kali Linux...
Finding a Zero-Day Exploit
Zero-days are found in exactly the same ways as any other kind of hole. What makes a security hole a "zero day" relies exclusively on who...
Simple Python Fully Undetectable (FUD) Reverse Shell Backdoor
During Internal penetration testing, sometimes you get an environment, where Antiviruses are up to date, which means that, you cannot use...
Client Side Exploits in Metasploit
As we have already discussed, Metasploit has many uses and another one we will discuss here is client side exploits. To show the power of...