10 Best Laptops for Ethical Hacking and Kali Linux

10 Best Laptops for Ethical Hacking and Kali Linux

Since I am a penetration tester myself, the question what is the best laptop for ethical hacking and Kali Linux has been extremely relevant to me. I had spent a lot of time online looking for the best option when looking for a new computer for myself. After I realized that my current hardware didn’t …

Read more

TryHackMe Basic Pentesting Walkthrough

Tryhackme Basic Pentesting Walkthrough

Tryhackme has many beginner friendly rooms. If you are just starting with the platform, rooms, such as Nmap, or Introductory Researching, is a great start. However, after you’ve nailed the basic tools and methodologies, you should increase difficulty. If you will stay solving same level rooms, you won’t progress that much. Today we are going …

Read more

WebMap Dashboard for Nmap XML Scan Results

WebMap Dashboard for Nmap XML Scan Results

If you have to scan a network, that might potentially have many running hosts, you will probably use Nmap. And if your weapon of choice is Nmap, you will soon realize that working with the results is a pain in the ass when there is a lot of data. No matter in what format from …

Read more

Why Maltego Is Not Working on Parrot OS?

Why Maltego is not working on Parrot OS

Parrot OS is popular not without a reason. It is liked by penetration testers as it comes with a plethora of penetration testing tools. Because the whole purpose of the distribution is to provide a wide range of different cybersecurity tools, it becomes irritating when some of the tools do not work. Let’s see why …

Read more

TryHackMe Brooklyn Nine Nine Walkthrough

TryHackMe Brooklyn Nine Nine Walkthrough

TryHackMe Brooklyn Nine Nine walkthrough will guide you through another themed room of THM. This one is based on the Brooklyn Nine-Nine TV series, If you’ve liked other THM rooms, such as Pickle Rick, or Kenobi, you will surely love this one. Let’s get straight to the action. The first step would be to deploy …

Read more

How to Use Searchsploit in Kali Linux?

How to Use Searchsploit in Kali Linux

If you are into penetration testing there is a chance you are familiar with a website called Exploit-DB. Even though it is not the only option, it is one of the most used websites for checking if a specific version of aservice is vulnerable. Exploit-DB is created by Offensive Security. The website is pretty neat, …

Read more