How to scan for weak passwords with Hydra

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.

Installed size: 956 KB
How to install: sudo apt install hydra

[mai mult...]

Kali Linux tools – zsteg

Purpose: Detect steganographic payloads in PNG and BMP image files.

What It Is:
zsteg is a Ruby-based tool used to find LSB (Least Significant Bit)-based steganography and hidden data inside image files.

Primarily works on BMP and PNG formats, including non-standard or suspicious metadata and bit-layer anomalies.

Features
Detects:
-LSB steganography (bit-level hidden data in image color channels)
-Embedded files in metadata or unusual file structures.
-Strings, byte patterns, XOR, and Zlib compression artifacts.
-Supports pattern-based payload discovery using known signatures.

Built into Kali Linux
You can run it without installing anything

[mai mult...]

Kali Linux tools -magic-wormhole

magic-wormhole is a command-line tool that allows two computers to securely transfer a file or short message through a simple, human-readable code. It is designed to be:

-Easy to use via CLI: wormhole send file.txt → receive with wormhole receive
-Transfers are encrypted, peer-to-peer (or via a relay if needed).
-No user accounts or persistent connections.
-Can send directories (–code, –hide-progress available).
-Works on Linux, macOS, Windows, and even Raspberry Pi.

Real Use Cases:
Share sensitive files securely without needing cloud services.
Drop a script or payload into a target machine in red-team/pentest environments (covert file exfiltration).
Air-gapped environments where traditional networking is blocked but outbound DNS or HTTP exists.

Built into Kali Linux
You can run it without installing anything

How does it work?
1.The sender and receiver each run magic-wormhole in the terminal.
2.The sender is shown a one-time “wormhole code” like 7-orange-tunnel.
3.The receiver enters that same code into their own wormhole command.
4.Both sides use this code to derive a shared cryptographic key using PAKE (Password-Authenticated Key Exchange).
5.This key encrypts the file or message and sends it directly over a secure connection.
It uses:
-SPAKE2 protocol for key agreement.
-libsodium (NaCl) for authenticated encryption (Curve25519 + XSalsa20-Poly1305).
-Transit relay server (if direct peer-to-peer fails).

[mai mult...]

Kali Linux tools – dnstwist

Discovering Typosquatting Domains with dnstwist

dnstwist is an open-source domain name permutation engine — a typosquatting detection tool used in cybersecurity to identify suspicious or malicious domains that look similar to legitimate ones.

dnstwist generates hundreds of typo variations (e.g., goggle.com, gooogle.com, g00gle.com) based on a target domain and checks:
-If those domains are registered
-Whether they resolve to IP addresses
-If they have DNS, MX, or WHOIS info
-(Optional) Whether they are serving web content, potentially phishing pages

Built into Kali Linux
You can run it without installing anything

Why It’s Useful (in Cybersecurity & OSINT)
-Detect phishing campaigns targeting your brand
-Monitor brand abuse or lookalike domains
-Alert your clients of malicious typosquat domains
-Enhance security posture in red team and blue team scenario

Goal:
Check for domains that look similar to your real domain (like gooogle.com, g00gle.com, etc.). These are often used for phishing, malware, or impersonation — a classic typosquatting tactic.

[mai mult...]

Linux: using grep + find to locate stuff fast

In Linux, grep and find are two powerful command-line tools that, when combined, allow you to quickly search and locate files and content on your system.

  • find helps you search for files and directories based on various criteria, such as name, size, modification date, and more.

  • grep is used to search for specific content within files, making it perfect for finding text patterns or keywords inside files.

it’s a must-know skill for navigating and searching in Linux
Goal:
Find specific files or content inside files — fast.

[mai mult...]

Steganography: hiding messages inside images using Steghide

What is Steghide?
Steghide is a command-line tool used for steganography, which is the practice of hiding secret data inside files like images or audio files. It allows you to embed and extract hidden information from JPEG, BMP, WAV, and AU files while keeping the original file looking unchanged.

Key Features of Steghide
✅ Hides data inside images and audio files without visibly altering them
✅ Uses encryption (AES-128 by default) to protect the hidden data
✅ Compresses data before embedding to save space
✅ Preserves the original file format and properties, making detection harder.

[mai mult...]