How to Encrypt Kali Linux After the Installation?

Encrypting your computer disk is crucial. There is nothing worse than losing your personal data. Not only the data can be used to extort you, but you might immediately experience financial losses. That’s why should know how to encrypt Kali Linux after the installation? As the Kali Linux is usually used for working with confidential …

Read more

How to Install Docker on Kali Linux WSL2?

If you are a cybersecurity professional, you are probably using the Docker containers constantly. Docker is great for pulling image of a hacking tool, running the container, and after you don’t need the tool, simply destroying the container. In this way you will save time that is required for installing each of the tools separately. …

Read more

Fetch URLs with GetAllUrls (GAU)

Fetch URLs with GetAllUrls

Getting as much information about the target as possible is very important during penetration testing. If you are a seasoned bug bounty hunter you know that sometimes there are low hanging fruits. Hidden subdomain with exposed secret, or a password might result in a big payout. That’s why it is very important to find everything …

Read more

How to Install DirBuster on Ubuntu?

How to install DirBuster on Ubuntu

DirBuster is one of the handy tools that is used during the reconnaissance stage. It helps to discover existing directories of the system. In simple words, it is a multithreaded application for brute forcing the directories. So, basically, it works like this: you launch the DirBuster, choose a dictionary, set the target, and launch the attack. …

Read more

10 Best Laptops for Ethical Hacking and Kali Linux

10 Best Laptops for Ethical Hacking and Kali Linux

Since I am a penetration tester myself, the question what is the best laptop for ethical hacking and Kali Linux has been extremely relevant to me. I had spent a lot of time online looking for the best option when looking for a new computer for myself. After I realized that my current hardware didn’t …

Read more

How to Crack SSH Private Key With John the Ripper

How to crack SSH private key with SSH2John

While finding the private key is a bad thing itself, you can try stepping a step forward – find out the password of the private key and log in with it. This is a thing you might need to do in a CTF, or by hacking a vulnerable machine. Let’s see how to crack SSH …

Read more

WebMap Dashboard for Nmap XML Scan Results

WebMap Dashboard for Nmap XML Scan Results

If you have to scan a network, that might potentially have many running hosts, you will probably use Nmap. And if your weapon of choice is Nmap, you will soon realize that working with the results is a pain in the ass when there is a lot of data. No matter in what format from …

Read more