How to build a custom Wordlist using Cewl

Objective: Use the cewl tool to generate a custom wordlist from a website for use in password attacks when pentesting.

If you’re looking to crack a password, you’ll need a solid wordlist to start with. But not just any wordlist—one that fits the target you’re trying to crack. Kali Linux has a tool called cewl that can help you make a custom wordlist by crawling a website.

Why should you use cewl?

You can use it to gather words from the site, like blog post titles, common terms, and metadata. This custom wordlist would be way more effective than using a generic list.

[mai mult...]

Setting up a Phishing Campaign with a fake login page in SET

SET (Social-Engineering Toolkit) is a powerful tool for simulating social engineering attacks like phishing and credential harvesting. It allows you to easily create fake login pages and test user awareness in a controlled environment. Useful for ethical hacking, security training, and penetration testing, SET helps assess vulnerabilities to real-world attacks. Always ensure it’s used responsibly and with proper authorization.

Important Reminder:
Only use this setup for ethical purposes, such as testing security awareness in environments where you have explicit permission. Phishing without authorization is illegal.

[mai mult...]

Capturing a 3-way handshake using Wireshark

Capturing a TCP 3-way handshake is a great way to learn how packets work. It shows you the basic process of how devices establish a reliable connection over the network, including key elements like sequence numbers, flags, and acknowledgments. By analyzing the handshake, you can better understand the flow of data in a TCP connection and how different parts of a packet contribute to establishing communication between devices. It’s a hands-on way to learn about networking fundamentals.

[mai mult...]

Setting up a Telegram bot

Setting up a Telegram bot allows you to send real-time notifications, automate tasks, and integrate with other systems. It’s easy to use, cost-effective, and provides secure communication. Bots are great for things like system alerts, user engagement, and simple automations, all within the familiar Telegram interface.

[mai mult...]

How to install and start Tor on Kali

Enabling Tor has several key benefits:

Anonymity: Tor helps anonymize your internet traffic by routing it through a network of volunteer nodes, making it difficult for anyone (including your ISP) to trace your online activities or identify your real IP address.

Bypass Censorship: Tor allows access to websites and content that may be blocked or censored in certain regions or networks by routing traffic through different countries.

Privacy: It protects against surveillance and tracking, providing a layer of privacy when browsing the internet or communicating online.

Access to .onion Sites: Tor provides access to the deep web, including .onion sites, which are not accessible through regular browsers.

These reasons make Tor useful for privacy-conscious users, journalists, activists, or anyone seeking to enhance online anonymity.

[mai mult...]

Change terminal transparency in Kali

Changing terminal transparency can be helpful for:

-Aesthetics: It gives a sleek, modern look, blending the terminal with your desktop background.

-Multitasking: You can see underlying windows or notes while working in the terminal, improving productivity.

-Personal Preference: Some users find a transparent terminal easier on the eyes, allowing for customization based on comfort.

[mai mult...]

Create low privilege users in Kali

Low-level users (non-root users) are important for the following reasons:

  • Security: Using a low-level user minimizes the risk of accidental system damage or security breaches, since this user has limited permissions compared to root.
  • Preventing Malware/Attacks: Many malicious programs require elevated privileges to harm the system. By using a low-level user, you reduce the risk of malware gaining control.
  • System Stability: Low-level users can’t accidentally modify critical system files, helping maintain system integrity.
  • Best Practice: In Linux, it’s best practice to perform regular tasks under a low-level user and only use root privileges when absolutely necessary.

This helps keep the system more secure and stable overall.

[mai mult...]