Email Spoofing Tutorial

Email spoofing is the creation of email messages with a forged sender address. It is easy to do because the core protocols do not have any mechanism for authentication. It can be accomplished from within a LAN or from an external environment using Trojan horses.

Remote D-Link Router Attack

Shodan is a search engine that lets the user find specific types of computers (routers, servers, webcam etc.) connected to the internet using a variety of filters.

Social Engineering Attack

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. SET is the standard for social-engineering penetration tests and supported heavily within the security community.

ARP Spoofing/Poisoning Attack

Ettercap is a comprehensive suite for man in the middle attacks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

Wifite Wireless Attack

Wifite is a build-in Kali wireless hacking tool. It is very user-friendly and does not require much technical knowledge to use it since all the attack methods (WPS pin attack, WEP/WPA handshake attack) is handle by Wifite.

Getting Started: Boot Kali Linux From USB

How to mount Kali Linux into USB Pendrive


Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd.