Learn Ethical Hacking using Kali Linux from a to z: Part One

kali linux logo looking at world

Hacking is an art! An art of digital exploitation. It can’t be learned in a day or by reading a particular book ! It’s a lifestyle which you develop over time, slowly. To be called a good hacker you need to learn, and learn, and learn a ton of things before you can even come close.

I have designed this course so that you can get a glimpse of what it’s like to be a hacker! Not a script kiddie but a proper WHITE HAT hacker.

Building a pen-testing Lab in 2020


Now you have made up your mind that you also want to control the whole world from your system. You also want the glory and coolness of hackers you see on the TV. But you have no idea of where to practice your cool tricks?

Vulnerability in Sudo, even the Restricted users can run commands as Root

A recently discovered vulnerability in the Sudo allows unprivileged users to run a command as root by specifying the user ID -1 or 4294967295. Sudo is one of the most powerful and commonly used utilities in all the Linux-based and UNIX Operating Systems. A vulnerability in that core utility has left everyone in utter confusion and frenzy.

What is Raspberry Pi ?

The raspberry pi is a magical, state of art device used by hackers, artists, programmers, creators, scientists, and students.The Raspberry Pi is a single-board, low-cost, high-performance computer first developed in the UK by the Raspberry Pi Foundation.

Hacking: The Essence Of Digital Exploiting

working pattern internet abstract

Hacking isn’t just knowing many programming languages or knowing many tools, but hacking is understanding the whole system and using various methods to exploit it. Hacking can’t be defined by a single definition but it rather is a huge domain having tons and tons of subdomains.

Blogarama - Blog Directory