Kali Linux Tutorial: Finding Exploits Using the Searchsploit Tool

What is Vulnerability Exploit? Words like “exploit” and “vulnerability” are tightly bound together. Often, a script/program will exploit a specific vulnerability. Since most vulnerabilities are exploited by script kiddies, the vulnerability is often known by the name of the most popular script that exploits it. In any case, there are broad-spectrum vulnerability scanners/assessment tools that […]

Beginners Guide: What is Hacking and How to Become a Social Engineer

Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.Hacking has grown far bigger than anyone could have expected. In the beginning is was about optimizing model trains […]

Kali Linux Tutorial: Wireless Auditing with Aircrack-ng, Reaver, and Pixiewps

PicaTesHackZ do not condone the illicit activities of wireless auditing on unauthorized systems. We do however encourage you to use this knowledge to your benefit to learn and practice exploitation using the latest in Wireless Auditing. Although I did do a write up about using reaver and pixiewps, there has been updates, I have more […]

Snort OpenAppID Introduction And Configuration Guide

Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for IPS. Snort is a very […]

Begin typing your search above and press enter to search. Press ESC to cancel.

Back To Top