#h8mail #password #osint Email OSINT & password breach hunting with h8mail. Tutorial by m0du5.
DISCLAIMER : This video is meant to educate people on data breach and the severity of it and how important the strength of the password is when it comes to security.
h8mail, allows you to search across multiple data breaches to see if your email address has been compromised.
#CeWL #wordlist #passwords
Creating Custom Wordlists for Targeted Attacks with CeWL. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people only and not to promote any type of illegal activities.
CeWL is a ruby app which spiders a given URL to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.
Downloads :
CeWL
https://github.com/digininja/CeWL
Linux Lite
https://www.linuxliteos.com/
Read:
CeWL
https://github.com/digininja/CeWL#readme
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#evilginx2 #phishing #mitm
Setup and configure Evilginx2, a standalone mitm attack framework. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers or someone with malicious intent create phishing pages to scam people into divulging
sensitive information. Do not to use this method to perform any illegal activities.
Downloads :
evilginx2
https://github.com/kgretzky/evilginx2
Linux Lite
https://www.linuxliteos.com/
Read:
Phishing
https://www.forcepoint.com/cyber-edu/phishing-attack
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#zphisher #phishing #scam
How hackers create phishing pages like Facebook, Instagram, Google and more with automated phishing tool. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers or someone with malicious intent create phishing pages to scam people into divulging sensitive information. Do not to use this method to perform any illegal activities.
Downloads :
Zphisher
https://github.com/htr-tech/zphisher
Linux Lite
https://www.linuxliteos.com/
Read:
Phishing
https://www.forcepoint.com/cyber-edu/phishing-attack
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
SUBSCRIBE for more videos!
Thanks for watching!
#phoneInfoga #OSINT #footprinting
Advanced information gathering & OSINT framework for phone numbers. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how to do some information gathering on a phone number. This technique does not in any way condone any sort of illegal activities.
PhoneInfoga is one of the most advanced tools to scan international phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.
Downloads :
Phoneinfoga
https://github.com/sundowndev/PhoneIn...
Linux Lite
https://www.linuxliteos.com/
Read:
Phoneinfoga
https://sundowndev.github.io/PhoneInf...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
SUBSCRIBE for more videos!
Thanks for watching!
#hacktools #firefox #extension
Web application penetration test with HackTools. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how some web application penetration tests are done using tools like HackTools. Do not perform this if you do not have permission on target websites.
Hacktools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells to test your web application.
Downloads :
HackTools
https://addons.mozilla.org/en-US/fire...
Read:
Beginners Guide To Web Application Penetration Testing
https://www.softwaretestinghelp.com/g...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
SUBSCRIBE for more videos!
Thanks for watching!
How Hackers Perform Email Spoofing & Phishing
Description
#email #phishing #spoofing
Python 3.x based email spoofing with smtp-email-spoofer. Tutorial by m0du5.
This is the second part of 'Spoof Check A Domain For Email Spoofing' tutorial.
Watch the first part here: https://odysee.com/@hacktheplanet:5/Spoof-Check-A-Domain-For-Email-Spoofing:2
DISCLAIMER : This video is intended to educate people on how hackers/pentesters use email spoofing and phishing to capture user credentials. Do not use this technique to perform any illegal activities.
Email spoofing is often used for spam campaigns and phishing attacks. If you use this tool inappropriately, you could violate of the CAN-SPAM Act of 2003 and/or the Computer Fraud and Abuse Act. You'd also be committing wire fraud.
Downloads :
SMTP-Email-Spoofer
https://github.com/mikechabot/smtp-email-spoofer-py
Linux Lite
https://www.linuxliteos.com/
Read:
What is an SMTP Relay
https://blog.mailchannels.com/what-is-an-smtp-relay-service
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#prowl #linkedin #emails
Harvest emails with job titles using Prowl. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers/pentesters harvest email addresses. Please do not use this technique to perform any illegal activities.
Prowl is an email harvesting tool that scrapes Yahoo for LinkedIn profiles associated to the users search terms and identifies job titles. It also identifies current job listings for the specified organisation.
Downloads :
Prowl
https://github.com/nettitude/Prowl
Linux Lite
https://www.linuxliteos.com/
Read:
NTLM Credentials Theft via PDF Files
https://research.checkpoint.com/2018/...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
#evilssdp #ssdp #uPnP
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers/pentesters spoof a device on SSDP multicast discover requests. Do not use this method to perform any types of illegal activities!
This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden image over SMB, allowing you to capture or relay the NetNTLM challenge/response.
Downloads :
EvilSSDP
https://github.com/initstring/evil-ssdp
Linux Lite
https://www.linuxliteos.com/
Read:
SSDP DDoS Attack
https://www.purevpn.com/ddos/ssdp-attack
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com
SUBSCRIBE for more videos!
Thanks for watching!
How Domains For Phishing Is Generated
#catphish #phishing #instagram
How domains for phishing is generated. Tutorial by m0du5.
DISCLAIMER : This video is intended to educate people on how hackers generate phishing domains look alike. Do not use it for any illegal activities.
Catphish generates similar-looking domains for phishing attacks. Check expired domains and their categorized domain status to evade proxy categorization. Whitelisted domains are perfect for your C2 servers. Perfect for Red Team engagements.
Downloads :
Catphish
https://github.com/ring0lab/catphish
Linux Lite
https://www.linuxliteos.com/
Read:
Phishing Technique
https://www.advancedcyber.co.uk/it-se...
If you are interested in learning a specific hacking/pentesting method please comment below.
Music: https://www.bensound.com