Blog Archives

Fun with CUPP and Medusa in Kali Linux (Part 2 of 3)

Cracking passwords in Kali Linux

In the previous guide, I showed you how to use the Common User Password Profiler in Kali Linux.  Today, we’re going to crack passwords against that list.

Posted in Linux Tagged with: , , , ,

Fun with CUPP and Medusa in Kali Linux (Part 1 of 3)

Cracking passwords in Kali Linux

What’s the best way to crack a password? Your first idea might be to grab a giant wordlist and start a dictionary attack against an account such as a Windows Active Directory account or a web login.  Or you might

Posted in Linux Tagged with: , , , ,

Detecting Rootkits on a PC

Detecting Rootkits in Kali Linux

Imagine malware so sophisticated that it not only disappears from the Windows Task Manager and your antivirus software but also modifies the code that undergirds the operating system in such a way that it’s virtually impossible to detect. Does such a thing

Posted in Linux, Security, Windows, Windows 10, Windows 8.1 Tagged with: , , , ,

Using the Social Engineering Toolkit In Kali Linux

SET for Kali

Here’s a little known fact:  It’s a lot easier to trick a credulous user into dishing over his password than it is to crack it.  People are getting smarter with passwords.  It seems like hacked accounts are always in the

Posted in Linux Tagged with: , , ,

Beginning Linux for Windowsphiles (Part 3 of 3)

Linux Basics with Vonnie

In the previous guide I really drilled home the two licensing structures used in the open source community: FSF and OSI.  But we didn’t even touch Linux yet.  So today we’re going to actually get our hands dirty with Linux

Posted in Linux Tagged with: ,