Posts

Showing posts from May, 2020

How To Run Kali Live Persistence | Kali Linux 2020

Image
Kali Linux is an excellent distribution for penetration testing and conducting network security audits. While you can install Kali directly on your hard drive, that's not the best solution in every case. At the same time, sometimes you want to save data from your tests, and a live USB won't cut it. That's where the middle ground of a persistent USB comes in. A persistent USB is a live USB with a storage partition that lets you keep your data.

Hack Password With Mask Attack | HashCat | Hack Like A Pro (Windows)

Image
If you have completed a dictionary attack, but some passwords still have not been recovered, you have to follow up with a Mask attack. In this attack, the program tries to guess the password by trying every single combination of characters until the password is found. Mask attack is similar to a brute-force attack, but with rules to reduce the number of errant entries. The brute force attack is the slowest method of password attack, but can often be successful on short and simple passwords. Mask attacks against password hashes are effective if you know the exact length or certain characters from the password string & this type of attack can be done more efficiently by using precomputed mask file that comes forth with the hashcat package. Implementation of the mask is reasonable because of it brute force all the impaired characters that craved to finalize the password string. What excites more is it takes no less than a minute to uncover the password. However, this does not ob...

Hack Passwords With Shoulder Surfing Techniques

Image
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Finding out a password is the usually the first step in hacking and breaking into systems, that's why there are so many articles telling you to change your passwords often and make them hard to figure out and part of practising proper password security is not leaving your password in plain sight. This shoulder surfing password-stealing technique gathers information from a computer. As the name implies, a hacker will simply look over your shoulder as you enter in passwords and other sensitive information. Shoulder surfing is more common with ATMs, credit card machines, and any other device that requires the input of a PIN. According to Hacker’s point of view...