Best Tool for Pentesting Android Applications

This is just a love post for Drozer It is metasploit console-ish CLI framework to hack Android Applications. Attach this with Qark, Frida and Burp Suite and you're well on your way to having a good toolset to attack Android Apps. I'll make an upcoming post with a more complete list of tools I use … Continue reading Best Tool for Pentesting Android Applications

Best Android Apps for Pentesting and Hacking

There are many apps that run on Android so I'll probably make a few of these posts. That said, the first and best resource isn't actually one app but an overlay to the Android OS. This is Kali NetHunter. I suggest buying a play edition phone (bootloader unlocked and open to be rooted) then you … Continue reading Best Android Apps for Pentesting and Hacking

Daily Read #4

Part 4 ALREADY! BOOKMARK THESE LINKS! And don't forget to check out the other entries and bookmark those too : ] BlackRoomSec  Noise  ToolsWatch HackingVision Hashes.Org  Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #3

Part 3! Don't forget to check the other entries and bookmark those resources too!! Darknet.Org.UK  HackerSploit  FireBounty  Hacking Articles  SC Magazine  Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #2

Part 2 of the daily reads! Don't forget to check the other parts and bookmark those links as well! The Hacker News TheHackToday Cyber Forensics Blog  InfoSec Writers  Schneier on Security Check out the other posts in this series! Daily Read #4 Daily Read #3 Daily Read #2 Daily Read #1 END TRANSMISSION

Daily Read #1

This post is going to kick off an extensive and constantly updated list of links to all kinds of resources that I check every single day. I'll post five resources per post, in no particular order, but I suggest checking every single one every day!   HackRead DarkReading CyberCrime & Doing Time Security List Network … Continue reading Daily Read #1

Technique, Tool and Lecture #9

Technique: Basic one liner to clean masscan output cat masscan-output | cut -d ' ' -f4,6 This will return something like this Tool: Drozer - https://labs.f-secure.com/tools/drozer/ Awesome extensive attack framework for Android Apps (Must have) Lecture: Not super technical but very interesting Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev https://www.youtube.com/watch?v=6Chp12sEnWk&t=784s Check out … Continue reading Technique, Tool and Lecture #9

Who are you?!

Security Researcher Security Researcher... I have to say, since the rise of Bug Bounties, The self-proclaimed title of Security Researcher has gotten less and less popular Here is something I realized years ago... A little background, at this time, I had used some tools, I had used BackTrack and then Kali, I have monitored trends … Continue reading Who are you?!

Technique, Tool and Lecture #8

Technique: One line dash loop for running CLI tools on Kali for IP in $(cat ~/Desktop/target); do nikto -host $IP >> ~/Desktop/nitko-output; done; Tool: Nikto Lecture: Drinking from the caffeine firehose we know as shodan   https://www.youtube.com/watch?v=5cWck_xcH64   Check out all the entries of this series! Technique Tool and Lecture #14 Technique Tool and Lecture … Continue reading Technique, Tool and Lecture #8

Difference between Ethical Hacker, Boug Bounty(ier), Penetration Tester, Security Consultant and Security Researcher

Let me first say that most of these terms are used interchangeability by the majority of outlets (especially media) incorrectly Please note this is VERY incomplete and I will continue to update this as time goes by Types of "Hacker" -- Whitehat Grayhat Blackhat -- Ethical Hacker: Type: Whitehat or Grayhat Someone who actively monitors … Continue reading Difference between Ethical Hacker, Boug Bounty(ier), Penetration Tester, Security Consultant and Security Researcher