Linux xxd command explained

Linux xxd command explained

Once a program has been compiled, it is not easy to get a peek at the source code or to manipulate its behavior. But there is one thing we can do, which is look at the hexadecimal values inside the binary files. We can also make changes to the data and compile it back to a binary file. This will sometimes reveal information about a file, or allow us to modify its behavior if we can manage to edit the right bit.

Read more

How to gain access to a MAC whitelist WiFi network

How to gain access to a MAC whitelist WiFi network

MAC address whitelisting sounds like a great way to prevent unauthorized access to your wireless network, but it does not work as well as you might think. The purpose of this guide is to demonstrate exactly how easy it is to spoof a whitelisted MAC address and gain access to a restricted network. In the steps below, you will see how to spoof a MAC address to gain access to MAC whitelisted network on Kali Linux.

Read more

How to crash Linux

How to crash Linux

There are a number of dangerous commands that can be executed to crash a Linux system. You may find a nefarious user executing these commands on a system you manage, or someone may send you a seemingly harmless command, hoping that you will run it and crash your computer.

Read more

How to crack a wireless WEP key using aircrack-ng

How to crack a wireless WEP key using AIR Crack

This article shortly describes simple steps on how to crack a wireless WEP key using aircrack-ng software. This can be done by sniffing a wireless network, capturing encrypted packets and running appropriate encryption cracking program in an attempt to decrypt captured data. WEP ( Wired Equivalent Privacy ) is quite easy to crack as it uses only one key to encrypt all traffic.

Read more

Changing the MAC address with the macchanger command on Linux

Change mac address with macchanger Linux command

A Media Access Control (MAC) address is a unique number that gets assigned to every network interface, including Ethernet and wireless. It’s used by many system programs and protocols in order to identify a network interface. One of the most common examples would be in the case of DHCP, where a router assigns an IP address to a network interface automatically. The router will know which device it has assigned an IP address to by referring to the MAC address.

Unlike an IP address, which is temporary and can be changed easily, MAC addresses are hardcoded into a network interface from the manufacturer. However, it’s still possible to change or “spoof” a MAC address temporarily. On Linux systems, one of the easiest ways to do this is with the macchanger command line program. There are both legitimate and shady reasons for why a Linux user may find the need to change a MAC address.

In this guide, we’ll show how to install the macchanger program on major Linux distros and then use the macchanger command to change the MAC address of a network interface either to a random value or some specific number. Follow the examples below to learn how.

In this tutorial you will learn:

  • How to install macchanger on major Linux distros
  • How to identify current MAC address and network interface
  • How to change an interface’s MAC address
  • How to change interface to a specific MAC address

Read more

Using JoomScan on Kali Linux

Use JoomScan to scan Joomla for vulnerabilities on Kali

When installing a content management system for your website, it’s easy to get lazy and assume that it’s going to do all the work for you. A CMS like Joomla certainly does make things more convenient, and lets you publish a polished website very quickly, but that doesn’t mean you shouldn’t take some extra time to secure it.

If your website is running Joomla, you can use the JoomScan utility against your site to uncover vulnerabilities or just general information that can assist in an attack against your site. Once you’re aware of the the site’s weak spots, you can take the proper steps to secure it. JoomScan works similarly to WPScan, which is used for scanning WordPress sites for vulnerabilities.

In this guide, we’ll see how to use JoomScan on Kali Linux. JoomScan itself is not a tool that can be used maliciously while performing simple scans against a site, unless you consider the extra traffic itself to be malicious. But the information it reveals about a site can be leveraged by attackers to launch an attack. Therefore, make sure you have permission to scan a website when using this tool.

In this tutorial you will learn:

  • How to use JoomScan
Using JoomScan on Kali Linux

Using JoomScan on Kali Linux

Read more

YouTube Video Page

How to Rip Songs From YouTube Videos

Using a combination of the youtube-dl script and FFMPEG, you can easily rip audio from YouTube videos and instantly convert it to MP3, OGG, or any other audio format that you prefer for your music library.

In this tutorial you will learn:

  • How to Install FFMPEG and youtube-dl
  • How to Download and Convert a YouTube Video
  • How to Convert a Video in One Line and Script It

Read more