Hackercool Magazine Simplifying Cyber Security
- Beginners guide to airgeddonby Anamar Taknev on April 14, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost on WiFi hacking, you learnt about different ways wireless networks are compromised. In this article, you will learn about airgeddon, a multi use bash script to audit wireless networks. Using airgeddon, we can perform DoS stress testing, deacloaking, offline WPA/WPA 2 password cracking, evil twin attack, WPS The post Beginners guide to airgeddon appeared first on Hackercool Magazine.
- Beginners guide to cowpatty toolby Anamar Taknev on April 9, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you have learnt how to crack a WPA/WPA2 passphrase with aircrack. In this article, you will learn about another such tool cowpatty. Cowpatty is a WPA-PSK, WPA2-PSK auditing tool that can be used to identify weak passphrases of an SSID with WPA, WPA2 enabled. Cowpatty does offline The post Beginners guide to cowpatty tool appeared first on Hackercool Magazine.
- Beginners guide to wifipumpkin 3by Anamar Taknev on April 7, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost on wifi hacking, you learnt what is a rogue access point and why hackers or pentesters use it. In this article, you will learn about Wifipumpkin 3, a powerful framework for creating rogue access points. The features of wifipumpkin 3 are, Letโs see how to create a The post Beginners guide to wifipumpkin 3 appeared first on Hackercool Magazine.
- Beginners guide to reaverby Anamar Taknev on April 2, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost on wifi hacking, you learnt what is a WPS pin, why it is used, itโs strengths and weaknesses etc. In this article, you will learn about Reaver, a tool that brute force attacks WPS pins in order to retrieve WPA/WPA2 passphrases. Letโs see how this tool works. The post Beginners guide to reaver appeared first on Hackercool Magazine.
- Beginners guide to Kismetby kanishka10 on March 31, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you learnt everything about wifi hacking. In this article, you will learn about kismet, a wifi security assessment tool. Kismet is a wireless network and device detector, sniffer, war driving tool and intrusion detection system (WIDs) for not just wifi but also Bluetooth, Zigbee, RF and more. The post Beginners guide to Kismet appeared first on Hackercool Magazine.
- Beginners guide to OllyDbgby Anamar Taknev on March 24, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about reverse engineering. In this article, you will learn about OllyDbg, a debugger that is used to reverse engineer programs. OllyDbg is an X86 debugger that is used to perform binary code analysis even when source code is not available. It can trace registers, switches, The post Beginners guide to OllyDbg appeared first on Hackercool Magazine.
- Linux exploit suggester: Complete guideby Anamar Taknev on March 20, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about various linux privilege escalation techniques. In this article, you will learn about Linux exploit suggester, a script that helps us in elevating privileges on a Linux system. Linux exploit suggester assists in detecting security deficiencies of a Linux kernel or Linux machine and suggests The post Linux exploit suggester: Complete guide appeared first on Hackercool Magazine.
- Windows privesc check: Complete guideby Anamar Taknev on March 17, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Windows privilege escalation in detail and various techniques used for achieving this. In this article, you will learn about windows-privesc-check, a standard executable that helps users in elevating privileges on a Windows system. Windows-privesc-check is a executable that can find misconfigurations in target systems The post Windows privesc check: Complete guide appeared first on Hackercool Magazine.
- Complete guide to WebSploitby Anamar Taknev on March 12, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you learnt about man in the Middle attack (MiTM). In this article, you will learn about WebSploit, which is used in MiTM attacks. Websploit is a MiTM framework that can perform various MiTM attacks like arp spoofing, http sniffing, network scanning, wireless scanning, performing de-authentication attacks on The post Complete guide to WebSploit appeared first on Hackercool Magazine.
- Beginners guide to Sqlsusby Anamar Taknev on March 11, 2025 at 1:30 pm
Hello, aspiring ethical hackers. In our previous blogpost, you learnt what is SQL injection and different types of SQL injection. In this article, you will learn about Sqlsus, an open-source MYSQL injection and takeover tool. Sqlsus is a tool written in Perl and we can retrieve the database structure, inject our own SQL commands, download The post Beginners guide to Sqlsus appeared first on Hackercool Magazine.