#prowl #linkedin #emails
Harvest emails with job titles using Prowl. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers/pentesters harvest email addresses. Please do not use this technique to perform any illegal activities.
Prowl is an email harvesting tool that scrapes Yahoo for LinkedIn profiles associated to the users search terms and identifies job titles. It also identifies current job listings for the specified organisation.
Downloads :
Prowl
https://github.com/nettitude/Prowl
Linux Lite
https://www.linuxliteos.com/
Read:
NTLM Credentials Theft via PDF Files
https://research.checkpoint.com/2018/...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
How Hackers Perform Email Spoofing & Phishing
Description
#email #phishing #spoofing
Python 3.x based email spoofing with smtp-email-spoofer. Tutorial by m0du5.
This is the second part of 'Spoof Check A Domain For Email Spoofing' tutorial.
Watch the first part here: https://odysee.com/@hacktheplanet:5/Spoof-Check-A-Domain-For-Email-Spoofing:2
DISCLAIMER : This video is intended to educate people on how hackers/pentesters use email spoofing and phishing to capture user credentials. Do not use this technique to perform any illegal activities.
Email spoofing is often used for spam campaigns and phishing attacks. If you use this tool inappropriately, you could violate of the CAN-SPAM Act of 2003 and/or the Computer Fraud and Abuse Act. You'd also be committing wire fraud.
Downloads :
SMTP-Email-Spoofer
https://github.com/mikechabot/smtp-email-spoofer-py
Linux Lite
https://www.linuxliteos.com/
Read:
What is an SMTP Relay
https://blog.mailchannels.com/what-is-an-smtp-relay-service
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#honeypot #pentbox #cybersecurity
Setup and create honeypot to trap hackers. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how honeypot is used to trap a malicious hacker, hoping that they'll interact with it in a way that provides useful intelligence . Do not use this method to perform any illegal activities.
Downloads :
Pentbox
https://github.com/technicaldada/pentbox
Linux Lite
https://www.linuxliteos.com/
Honeypot Tools:
https://github.com/paralax/awesome-ho...
Read:
What is a Honeypot
https://linuxsecurity.expert/security...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#seeker #geolocation #tracker
Accurately Locate Smartphones using Social Engineering. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on the dangers of accepting and clicking on unknown links. Do not use this method to perform any illegal activities.
Seeker host phishing pages to get location. Seeker hosts a fake website on In Built PHP Server and uses Serveo/Ngrok to generate a link which than forwarded to the target to get location permission.
Downloads :
Seeker
https://github.com/thewhiteh4t/seeker
Linux Lite
https://www.linuxliteos.com/
Read:
Common Phishing Attacks
https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#android #backdoor #msfvenom
Hack an android mobile device using MSFvenom and Metasploit framework. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on the dangers of accepting and installing unknown apps-apk. Do not use this method to
perform any illegal activities.
Downloads :
Ngrok
https://ngrok.com/
Linux Lite
https://www.linuxliteos.com/
Metasploit
https://docs.rapid7.com/metasploit/installing-the-metasploit-framework/
TheFatRat
https://github.com/Screetsec/TheFatRat
Install:
sudo apt-get install default-jdk default-jre
sudo apt-get install zipalign
Commands:
keytool :
keytool -genkey -V -keystore key.keystore -alias androidapp -keyalg RSA -keysize 2048 -validity 10000
jarsigner :
jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore key.keystore payload.apk androidapp
zipalign :
zipalign -v 4 payload.apk signed_app.apk
Read:
Creating keystore & signing Android apps.
https://stablekernel.com/article/creating-keystores-and-signing-android-apps/
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#wifibroot #PMKID #wpa2
Capture & Crack 4-way handshake and PMKID key. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers gain access to a wireless network by hacking an Access Point that uses weak WiFi passwords. Do not use this method to perform any illegal activities.
Downloads :
WiFi-Broot
https://github.com/hash3liZer/WiFiBroot
Linux Lite
https://www.linuxliteos.com/
WPA / WPA2 Word List Dictionaries
https://www.wirelesshack.org/wpa-wpa2...
USB WiFi Adapters
https://www.kalilinux.in/2020/07/wifi...
Read:
PMKID (Pairwise Master Key Identifier)
https://www.nirico.com/what-should-i-...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#badpdf #responder #NTLMv2
Capture NTLMv2 hash with Bad-Pdf & Responder and crack it with Hashcat. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers/pentesters capture & crack Windows passwords using certain tools, and how important the strength of the password is when it comes to security.
Bad-PDF create malicious PDF file to steal NTLM(NTLMv1/NTLMv2) Hashes from windows machines, it utilize vulnerability disclosed by checkpoint team to create the malicious PDF file. Bad-Pdf reads the NTLM hashes using Responder listener.
Downloads :
Bad-Pdf
https://github.com/deepzec/Bad-Pdf
Wordlist
https://github.com/danielmiessler/Sec...
Responder
https://github.com/lgandx/Responder
Linux Lite
https://www.linuxliteos.com/
Read:
NTLM Credentials Theft via PDF Files
https://research.checkpoint.com/2018/...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#stegcloak #steganography #invisible
Hide secrets with invisible characters in plain text securely using passwords. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people in Cybersecurity & Steganography. Do not use this method to perform any illegal activities!
StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside text by compressing and encrypting the secret before cloaking it with special unicode invisible characters..
Downloads :
Stegcloak
https://github.com/KuroLabs/stegcloak
Linux Lite
https://www.linuxliteos.com/
Read:
https://blog.bitsrc.io/how-to-hide-se...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#evilginx2 #phishing #mitm
Setup and configure Evilginx2, a standalone mitm attack framework. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers or someone with malicious intent create phishing pages to scam people into divulging
sensitive information. Do not to use this method to perform any illegal activities.
Downloads :
evilginx2
https://github.com/kgretzky/evilginx2
Linux Lite
https://www.linuxliteos.com/
Read:
Phishing
https://www.forcepoint.com/cyber-edu/phishing-attack
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com