KickThemOut- how to kick someone off your wifi

KickThemOut- how to kick someone off your wifi

  Do you know? how to kick someone off your wifi! If you have a question how to kick someone off your wifi or LAN network?, here is one tool called KickThemOut might help you. This tool kicks devices to out of your wifi/LAN network and you can enjoy all bandwidth for yourself. It also Read more about KickThemOut- how to kick someone off your wifi[…]

6 steps to change Kali Linux IP address (Easy)

6 steps to change Kali Linux IP address (Easy)

 Its time to get up on your lazy asses and do some work. Easy Steps to change Kali Linux IP address When it comes to windows everything just comes too easy. I mean you gotta work for that too but the sense of accomplishment just ain’t there. When it comes too linux, everything feels like Read more about 6 steps to change Kali Linux IP address (Easy)[…]

How to create Kali Linux bootable USB live in windows 10

How to create Kali Linux bootable USB live in windows 10

Create a Kali Linux bootable USB for live use Kali Linux bootable USB drive is very used fully for Penetration testing of an organization by Pen tester. With the help of this drive, you can boot the computer from Kali Linux without installing it. Do you think it’s amazing? May be but true. Here one more Read more about How to create Kali Linux bootable USB live in windows 10[…]

How to upgrade Kali to Kali Linux 2 0 SANA

How to update and upgrade kali linux to latest version

Update and Upgrade Kali Linux Hey, first check Kali Linux version and then update and upgrade Kali Linux. As we know Offensive security always released a newer version of Kali Linux.  The newer version fixes bugs and the latest kernel, latest tools, and sometimes adds new tools.  There are two terms update and upgrade. In update, advanced Read more about How to update and upgrade kali linux to latest version[…]

8 important nmap commands in Kali Linux with Example

8 important nmap commands in Kali Linux with Example

Hi and Welcome, I am happy to see you on my blog, I am writing articles related cyber security, which helps you to increase your knowledge in the cyber security industry. if you want to get future latest updates direct in your inbox, don’t forget to subscribe our newsletter by entering your Name and email Read more about 8 important nmap commands in Kali Linux with Example[…]

How to use dnsenum for dns enumeration - Kali

How to use dnsenum for dns enumeration – Kali

Why in the DNS enumeration we need dnsenum? Just like previous tools this is also used for the purpose of gathering information. This is used if we require to access whatever scraps and metal information of the domain sites that we can. What it basically does is enumerates the  DNS enumeration (Information)  about domains. Its a Read more about How to use dnsenum for dns enumeration – Kali[…]

How to use dig command in Kali Linux

How to use dig command in Kali Linux

What is dig command? The ‘dig command‘ is used in network administration that check and lookup domain name server (DNS) It is dnssec and the part of information gathering. Well further can’t be discussed much until I give you the definition of name servers….until then everything I say will be moot. What is domain name server? A Read more about How to use dig command in Kali Linux[…]

whois command for dns lookup in Kali Linux

whois command for dns lookup in Kali Linux

What is Whois command? A whois command is a utility as a part of the information gathering used in all of the Linux-based operating systems. this tool is part of information security assessment, and one of  information gathering techniques.  there are a lot of  information gathering strategies. It is used to identify domain information and more. Unknown and distant Read more about whois command for dns lookup in Kali Linux[…]

Top 10 tools for hacking wirelessly that should protect yourself from.

Gather around tech folks or up n coming tech gods. Today we shall talk about TOP 10 TOOLS FOR HACKING WIRELESSLY  First of, let’s start with what is wireless. Wireless is anything  that doesn’t have or need a wire. What?? You thought the were getting a long convoluted explanation of the radio waves that are involved, that Read more about Top 10 tools for hacking wirelessly that should protect yourself from.[…]

Top 10 insecure programming languages

New research shows that scripting languages cause web vulnerabilities To this news, I was like.WHHHHHHHAAAAAAAAAAttt?? But it is true. A new research showed that scripting languages, in general, spawn security vulnerabilities regarding web applications. Now this got many on the web their panties got all twisted. As millions are websites are now under potential security Read more about Top 10 insecure programming languages[…]