Social Engineering

Getting ready for the Big Hack

So you are ready for your big hack. You did your research and social engineering, picked out your method of attack, and you think you are ready to go. One thing a lot of people just starting out forget all about it how to cloak themselves. Sure, you can use a Proxy, setup a VPN, and perform your work from a remote location, NOT YOUR HOME. However, there is one other identifiable item you can affect for that little extra bit of cloaking. What might that Continue reading

What is Babysploit?

So there is a neat little toolkit, originally written for Kali, call Babysploit. Babysploit was designed as a smaller, learning toolset similar to MetaSploit. So, if MetaSploit seems a bit heavy for you at first you can always install and… Continue reading

Make life easier with automation

As a LINUX user you should always be looking for ways to automate things on your system. Automation makes things much easier and more efficient. Learning to use Bash script is certainly a step in the right direction there. I find myself with quite a collection of various Bash scripts I have written over the years to make my life easier. For example, if you always boost your wifi card before an audit or attack why not write a script for those steps as opposed to typing all that out each time? Continue reading