Category: Hacking

0

Information Gathering Part III: recon-ng (cont.)

Introduction If you haven’t seen the previous two parts in this series, please check out Information Gathering Part I: theHarvester, and Information Gathering Part II: Recon-ng, go check those out before reading this post,...

0

Information Gathering Part II: recon-ng

Introduction to Recon-ng In the last part in this series, theHarvester, we looked at a simple tool that would allow us, with a single command, to gather information on a target domain given only...

0

Information Gathering Part I: TheHarvester

Introduction to Information Gathering During the earliest stages of either a penetration test or a hack, gathering as much information about an organization or a person as possible is the very first thing that...

0

Bind Shells and Reverse Shells with netcat

Introduction to netcat The simplest definition of netcat is that it’s a network utility that’s used to read to and write from TCP or UDP connections. You can set up and tear down connections...

1

Installing Kali Linux on a GPD Pocket

Thanks to a guy over on https://whitedome.com.au/re4son/ (you can follow him @Re4sonKernel on Twitter), it’s now fairly simple to put Kali on a GPD Pocket. I picked up a GPD Pocket a few months ago...