Network Security

TorGhost on Kail

Posted on

TOR is a great service for anonymity. However, if you want to use it in Kali you would have to install the Tor Browser, great for hiding web browsing but not for running exploits or scanning. One tool that shines out for me is TorGhost. With TorGhost running, it will route all the network traffic […]

Network Security

Shut Your Pi-Hole

Posted on

Chances are you will be using a browser like Firefox or Chrome, also more then likely you will have a browser extension for blocking ads. But as more and more use their mobile devices to browse the web at home, don’t you want the same level of protection? or just after a “Gotta Catch Em All” […]

Network Security

Target Specific Word List

Posted on

In this tutorial I will show you the basics on creating a custom wordlist based upon a company’s own website using CeWL. The idea behind using a target specific wordlist as apposed bruit-force or mega long wordlists is TIME. Time is the one thing most people don’t have and the longer you spend attacking a target […]

Network Security

DIY Onion Pi

Posted on

Step-by-step guide to make your own wireless tor router using an old Raspberry Pi. Required materials: Raspberry Pi (I had an old Pi B) SD Card (at least 4 gigabytes) Network cable (<—This long—>) Compatible USB Wifi adapter (I recommend anything with the RT5370 chipset) Micro USB power adapter You won’t be needing a keyboard […]

Network Security

Kali installed, what next?

Posted on

This port will be a part continuation to my Installing Kali on VirtualBox and what things to do once you have just done a basic Kali install.   One of the first thing i would suggest is to install the VirtualBox tools, this will improve your experience 10 fold, not least allowing you to use higher […]