Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts
Wednesday, June 14, 2017
Kali Linux Tutorial Introduction To SAKIS3G Hardware Hacking
Kali Linux Tutorial Introduction To SAKIS3G Hardware Hacking

Sakis3G is a tweaked shell script which is supposed to work out-of-the-box for establishing a 3G connection with any combination of modem or operator. It automagically setups your USB or Bluetooth modem, and may even detect operator settings. You should try it when anything else fails.
Recommended: An Introduction To Hackers OS: Kali Linux And Setup Tutorial.
TOOLS INCLUDED IN THE SAKIS3G PACKAGE
root@kali:~# sakis3g help
Sakis 3G All-in-one script Version 0.2.0e
(c) Sakis Dimopoulos 2009, 2010 under GNU GPL v2Usage:
sakis3g [actors] [switches] [variables]Sakis3G is a shell script which is supposed to work out-of-the-box for
establishing a 3G connection with any combination of modem or operator.NOTE: This script requires root priviledges to properly work. If not executed from root, it will try to acquire them.Common actors are:connect Attempts to establish 3G connection.
disconnect Stops all active PPP connections.
toggle Attempts to establish 3G connection. If already connected, it
disconnects instead.
reconnect Attempts to establish 3G connection. If already connected, it
first disconnects and then attempts.
start Same as connect. Provided for use as init.d script.
stop Same as disconnect. Provided for use as init.d script.
reload Same as reconnect. Provided for use as init.d script.
force-reload Same as reload. Provided for use as init.d script.
restart Same as reload. Provided for use as init.d script.
desktop Creates desktop shortcut for this script.
status Prints connection status and exits. Exit code is 0 if
connected, or 6 if not connected.
help Prints this screen and exits.
man Displays man page.NOTE: For more information, you should consult man page or official Sakis3G
wiki, available at:
http://wiki.sakis3g.org/
SAKIS3G USAGE EXAMPLE
root@kali:~# sakis3g interactive connect
Video TUTORIAL
Also Read:
- Programming Languages For Hackers And Learn It From Most 6 Helpful Websites
- Installing Hackers OS Kali Linux In VMware (Beginners Guide With Screenshots)
- Easy Steps to Create Web Penetration Testing Lab in Kali Linux
Available link for download
Sunday, April 30, 2017
Kali Linux Tools Brief Introduction To 10 Powerful Hacking Tools
Kali Linux Tools Brief Introduction To 10 Powerful Hacking Tools

Kali Linux, the hackers operating system is very powerful Linux distro and it is my favorite OS, not only my favorite but also many Hackers and pentesters choosing Kali Linux as their favorite hacking tool. The main reason hackers and newbies like Kali is because it is blessed with 300+ hacking tools and it has developed by Offencive Security team, so today i want to introduce you the top 10 tools i like most in kali linux. Here i am giving tutorials for each hacking tools so everybody can understand it well.
If you want to know more about Kali Linux then you should read this article first: An Introduction To Hackers OS: Kali Linux Setup Tutorial
1. Metasploit
Metasploit has become over the years the best framework to conduct penetration testing on network systems and IT infrastructure. The Metasploit Project, or better known as simply is a hugely popular pentesting or hacking tool that is used by cyber security professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.
Metasploit is in fact a sub-project of the Metasploit Framework. This hacker tool and framework is best known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
Tutorial: Introduction to using Metasploit in Kali Linux
2. THC Hydra
Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH.
Tutorial: How to Crack Online Passwords Using THC-Hydra in Kali Linux
3. Sqlmap
Basically its just a tool to make Sql Injection easier. Their official website introduces the tool as -"sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections."
4. Nikto
This small and simple tool examines a website and reports back to you the potential vulnerabilities that it found that you could use to exploit or hack the site. In addition, its one of the most widely used website vulnerabilities tools in the industry and in many circles considered the industry standard.
5. Ettercap
Tutorial: Man In The Middle Attack Using Ettercap In Kali Linux
6. BeEF
7. Wireshark
8. Maltego
9. Msfvenom
But the good news is msfpayload and msfencode are being replaced by a new tool called msfvenom. This is the combination of both the tools, almost from three and half years this new tool is being tested and the time has come to use it.
10. Wireless Auditing
In this Section i am introducing you to the 3 wireless hacking tools, Aircrack-ng, Reaver, and Pixiewps. PicaTesHackZ do not condone the illicit activities of wireless auditing on unauthorized systems. We do however encourage you to use this knowledge to your benefit to learn and practice exploitation using the latest in Wireless Auditing. Although I did do a write up about using reaver and pixiewps, there has been updates, I have more tests, and more knowledge on the tools. Please keep in mind it is illegal to penetrate networks that are not your own without proper permission. This falls on you, so do what you will but we will hold no liability for your actions.
Available link for download
Subscribe to:
Posts (Atom)