Welcome to hacking a rise i this post we are going to show you how to perform a man in the middle attack with a tool called Xerosploit this tool was designed by LionSec What is Xerosploit Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing …
Category Archives: FEATURED
IntRec – Pack Intelligence and Reconnaissance Package/Bundle installer
Welcome to Hacking a rise in this i am going to show you how to install and use IntRec on any Debian system i am using Kali Linux for this tutorial Whats IntRec IntRec-Pack is a Bash script designed to download, install and deploy several quality OSINT, Recon and Threat Intelligence tools. Due to the …
Continue reading “IntRec – Pack Intelligence and Reconnaissance Package/Bundle installer”
Cewl custom password list
Welcome to hacking a rise i am the laughing man and today im going to show you the basics of Cewl for building custom word lists .. What is Cewl CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which …
Session hijacking on lan
Welcome to hacking a rise I’m the Laughing man in this post is to show you session hijacking wile on LAN when i mean LAN this can be a public network or your own i will be using my home network as i dont wanna brake any laws so the tools need is Ettercap,hamster,ferret (thank …
Pentesters Cheat Sheet Part 1
This is a quick reference high level overview for typical penetration testing engagements. Designed as a quick reference cheat sheet providing a high level overview of the typical commands you would run when performing a penetration test. For more in depth information I’d recommend the man file for the tool or a more specific pen …
Nmap Basic’s part one Simple scan
Welcome back to hacking arise lads Laughing Man here with a very basic understanding of some the commands in Nmap Free Security Scanner What is Nmap network scanner Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets …
Seeker tracking GPS
Welcome lads and gals in this were going to talk a bout seeker a python3 tool designed to make a fake site for your target What is seeker gps tracker Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website …
Cryptography Basics
As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to …
pentestinfra a new way to stay anon online
Welcome to hacking a rise today is a real treat as are very own Shiva mead pentestinfa that way to anon ur network with out tor or vpn this tool is going to gave 4nonmizer a run for its money to find out more check Shivas blog CLICK HERE Introduction This is the first part …
Continue reading “pentestinfra a new way to stay anon online”
hack the box guide
hi good day and welcome to my first walkthough on the HTB series today in this hack the box guide we are going to learn how to get the invite code on HTB as we all know you can’t simply just register a account and hack away What is Hack The Box : It is …