Learn Burp Suite on Kali Linux: Part 1
When it comes to testing the security of web applications, you’d have a hard time finding a set of tools better than Burp Suite from Portswigger web security. It allows…
When it comes to testing the security of web applications, you’d have a hard time finding a set of tools better than Burp Suite from Portswigger web security. It allows…
Out of the box, the only option for installing software on Kali Linux is to use the APT package manager from the command line, or download software directly from a developer’s website. This minimal approach…
Kali Linux and Parrot OS are two Linux distributions with a huge focus on cybersecurity, privacy, and penetration testing. Both distributions are based on Debian Linux, naturally making them pretty similar. This fact, along with a…
Kali Linux is a powerful Linux distro for penetration testing and ethical hacking. It’s not meant as an everyday operating system, so most Kali users will utilize the distro by running it temporarily…
Kali Linux already comes with a lot of ethical hacking and penetration tools out of the box. There are even more tools available from package repositories, but sifting through hundreds…
Vulnerabilities in WordPress can be uncovered by the WPScan utility, which comes installed by default in Kali Linux. It’s also a great tool for gathering general reconnaissance information about a website…
Kali Linux is a Linux distribution geared towards cyber security professionals, penetration testers, and ethical hackers. If you are thinking about installing it on your system but need to know the minimum or…
The objective of this guide is to show how to crack a password for a zip file on Kali Linux. By default, Kali includes the tools to crack passwords for these compressed archives,…
The objective of this guide is to show the default username and password for Kali Linux. The guide will be applicable for persistent installations, as well as the live CD image and Kali…
When performing digital reconnaissance or penetrating testing, it’s important to fingerprint a network by understanding what servers or devices sit between your system and a target. For example, security professionals…