Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Chapter 1:Remote Access – Using Metaploit and planting backdoors.
What is remote hacking?
Gain full control on computer using Cobalt Strike
Using Backtrack/Kali to gain full access to Machinne.
Using Backtrack/Kali to Activate VNC on Victim Machine
Conclusion
Chapter 2: Website Penetration - Finding vulnerability and hack it.
Retrieve Website Database with Sequel Injection
First we have to understand how SQL injection works
Going on the mission for retrieving database from a vulnerable site.
Cross Site Scripting
Non persistent.
The persistent
XSS to extract cookie session from users. Or even administrators
Social Engeniring Facebook with the phishing Techinique
What is phishing
1.Creating Phishing.php file:
Some useful Chrome Extension
Conclusion
Chapter 3: Denial of Service-Flooding Things.
What is Denial of Service (Flooding)?
DDos Using notepad and command prompt.
Peforming DdoS using LOIC
DdoS a IPV6 router using Kali
Conclusion
Chapter 4: Wireless Cracking-finding WPA/WPA2 authentication
Cracking Wi-fi password using Reaver
Hack Wireless password using Cain & Abel
By-passing the mac address filter within a wireless-router
Even though we know the password we used, is right, this type of network won’t allow us to connect (Because currently our mac address is not registered). It will be like an endless loop without authentication.
Conclusion
Chapter 5: Android Weaponize the Android and Infiltrate the Android
Weaponizing ur Android
Turn your Android device into a pentesting tool
Catching Wifi password in the Android Device.
Using Metasploit to hack in the Android Root Folder.
Conclusion
Chapter 6: Lan Attack- Compromising networks
Using nmap to hack machines in the network.
Raspberry Pi in the office.
Conclusion
Chapter 7. Staying Anonymous: Using the right VPN's
Using Cyberhost to disappear for good
Using the tor browser
Using ZenMate
Setting the VPN for Kali to say cloaked
Conclusion
Shodan the evil engine
What exactly is shodan?
Hacking an IP Camera using Shodan.
Conclusion
Build malicious applications with python.
Create Your own keylogger to monitor Victim Typings
Building a Portscanner
Building a zip Password cracker in Python
Take screen shot
Ready made Virus with C++
C++ Environmental Setup
Creating ur first C++ Application
Basic understanding of C++ code
Declaring Variables in C++
Changing and Comparing Variables
If Statement Syntax
Loops
C++ virus to render pc unbootable
C++ virus crazy mouse and beeping.
C++ block all inputs
← Prev
Back
Next →
← Prev
Back
Next →