hacking

  1. R

    Android Kernel Debugging (kmsg log)

    Hello, So I've been subject to some rather advanced hacking. Long story short, through means of brute force TTY and shell/root manipulation, the hackers have used ADB (android debugging bridge) and trace/printk to debug my kernel and place kernel hooks. (They've done the same to my...
  2. C

    Can i create a wlan1 with a tethered smartphone connection?

    Hello, i would like to know how to make my phone a wlan1 because my wlan0 is too weak for pentesting. Is it even possible? I'm on Kali Linux, very recently updated.
  3. Gleis

    Which is the best way to learn penetration and hacking using Kali Linux ?

    Which is the best way to learn penetration and hacking using Kali Linux ? For the moment I'm mostly interested in wireless attacks. Can you guys please recommend any tutorials , books etc ? Thanks!
  4. W

    Ghost Framework

    Hello I recently discovered ghost framework on Kali Linux. Lately I've been thinking that,if we connect to random ADB(android debug bridge) through Ghost framework and sniff the information (knowing it's illegal!). If the person get to know that we are peeping on this device. Is it possible for...
  5. D

    Parrot OS 4.0 (Debian-based)

    Parrot Security OS 4.0 has just been released! This is a serious pentesting distribution that is based on Debian. I highly recommend getting acquainted with it: https://www.parrotsec.org/ For any newcomers who are migrating from Windows, this course might be helpful...
Top