New BBS Network

I am setting up a new BBS soon but this requires me setting up a server first. It is my hopes to eventually make this a nice little BBS network. If interested please send me a contact.


You will notice a new menu item to the top right of the page now just for BBS stuff. It doesn't matter if you are an old hand with BBS or new to the entire thing come check it out, you will love it.


I may even connect an IRC network to the BBS network later on...

Share
BackupGuard - backup your website in the cloud

Hacking

Introducing the Official Release of TX Power Blast v2.0

I have rewritten and tweaked out TX Power Blast into a version 2.0. TX Power Blast is a handy little proof of concept utility I wrote that increases the power of your WiFi card and opens up additional channels normally not accessible in the US. I am creating a quick little tutorial to post on my YouTube channel later today and when it is done I will add the video and the link here. Nothing difficult, the tutorial just Continue reading

What are Rainbow Tables and why would I need them?

So you may have heard about these things called rainbow tables. Maybe you thought, "What the hell is a rainbow table? Some kind of new Skittles?" and that would be ok. Well, what if I told you they are magic tables to figure out hidden hash passwords? Ok, maybe they aren't truly magic but they sure will seem that way.  Rainbow tables are a very organized, precision way to crack password hashes. It may take quite awhile, as cracking hashes Continue reading

Getting ready for the Big Hack

So you are ready for your big hack. You did your research and social engineering, picked out your method of attack, and you think you are ready to go. One thing a lot of people just starting out forget all about it how to cloak themselves. Sure, you can use a Proxy, setup a VPN, and perform your work from a remote location, NOT YOUR HOME. However, there is one other identifiable item you can affect for that little extra bit of cloaking. What might that Continue reading

What is Babysploit?

So there is a neat little toolkit, originally written for Kali, call Babysploit. Babysploit was designed as a smaller, learning toolset similar to MetaSploit. So, if MetaSploit seems a bit heavy for you at first you can always install and… Continue reading

Make life easier with automation

As a LINUX user you should always be looking for ways to automate things on your system. Automation makes things much easier and more efficient. Learning to use Bash script is certainly a step in the right direction there. I find myself with quite a collection of various Bash scripts I have written over the years to make my life easier. For example, if you always boost your wifi card before an audit or attack why not write a script for those steps as opposed to typing all that out each time? Continue reading

Tutorial 12 – Creating and using a wordlist

In this tutorial I will go over how to create your own wordlists used for cracking passwords in hash files, including how to create a targeted wordlist for a specific target. I will also introduce you to a handy little tool to help you choose just the right wordlist to use for an attack. Enjoy! Continue reading

Some Sound Advice for Future Hackers

So, we are about to get more into the guts of hacking and I thought I should offer a little advice before I post the next tutorial. Whether you wish to actually learn cyber security or you just have a great interest in this particular topic area it can be a very daunting task to learn your way around. If you have started out learning on your own without any guidance it can be especially frustrating along the way. You will find tons of good and bad information all over the web and this too can me a problem. I mean, how do you tell the good info from the bad right? Continue reading