PRINT
PRINT
SEND MAIL
SEND MAIL
METASPLOIT TUTORIALS

Metasploitable 2 enumeration

In this new Metasploit Hacking Tutorial we will be enumerating the Metasploitable 2 virtual machine to gather useful information for a vulnerability assessment. Enumeration in mathematics or computer science is referred to as listing a number of elements in a set. Enumeration in the hacking context is the process of retrieving usernames, shares, services, web directories, groups, computers on a network. This is also called network enumeration. During this process we will also collect other useful network related information for conducting a penetration test.…

TUTORIALS

How to hack a wifi router by cracking WPA/WPA2 using kali linux 2.0 -2016

There are many ways to hack a wifi router, some people use to bruteforce password directly some use WPS pin cracking with reaver etc. Most of the times WPS pin cracking succeed because the router is in its default pin and easy to crack. Here we are going to hack a WPS disabled router. We have most effective and simple toolkit for this purpose: Aircrack-ng. The whole process is not too hard but not too easy. This is a little bit complicated process but…

BUG FIXES

How to enable Panto Anonsurf or Anonymous mode!

  Panto Anonsurf Open Panto Linux  Anosurf  mode manager. Start the service by pressing start anonymous button. Click the firefox or Iceweasel button to surf anonymous! Anon mode Open you Panto linux menu select anonymity>anonmode start service A terminal will open and ask's  you some info , configure and  hit enter .

METASPLOIT TUTORIALS

Metasploit commands

In this article we will be talking about the very basics of Metasploit and the Metasploit commands used in the command line interface. At first the MSF console command line and the number of available commands might seem a lot and hard to understand and use, but don’t be intimidated by them. Once you get to understand the concept and the clear structure it will be very easy. If we put it all together the Metasploit framework consists of the core and base, a…

METASPLOIT TUTORIALS

Metasploit and Metasploitable 2 installation

In this new Metasploit tutorial we will be installing and configuring Metasploit on Kali Linux and the Metasploitable 2 virtual machine on VMware Player. Metasploit is one of the most popular and top rated penetration testing tools on the market and is designed for penetration tests, vulnerability assessments and developing and executing exploit code against remote targets. Metasploit is an open source project available in a free Metasploit Framework and community version and there is a paid pro version which even contains more features.…

Custom-distributionsDownloadsNew Releases

Panto Linux 4~2 Stable release (For all users that have donated Panto 4~1 this release is free)

All users that have donated to get the testing release of Panto Linux 4~1 : The Stable release of Panto linux 4~2 is free for those that have donated already! The version 4~1 was the testing release and needed some bug fixes and now we have fixed some bugs but not all ,fill free please to report any bug to our facebook page Cyber Sec   Let's work all together! Major bug fixes: Panto plymouth on live dvd/cd  fixed. Panto Xfce  wrong directory for…

TUTORIALS

How to install medusa-gui,sqlmap-gui,metagoofil-gui, crunch-gui and metasploit-gui in Panto Linux!

How to install medusa-gui,sqlmap-gui,metagoofil-gui, crunch-gui and metasploit gui  in Panto Linux!: Panto linux doesn't use apt-get to install some package on panto you just need to type inst  or install and thats it! open a terminal  and type: add-ppa add this ppa     ppa:cybersec/panto-experimental update && upgrade then open again a terminal and type this: install medusa-gui sqlmap-gui metagoofil-gui  crunch-gui metasploit-gui Done ! your tools will be available on your menu now!