Reset Administrator Password in Windows Server 2012 R2

Reset Administrator Password in Windows Server 2012 R2 1 – On your Windows Server 2012 R2, boot the server from Windows Server 2012 R2 Boot DVD @ Media… ** Picture here show you if you wrongly key in your password, it will

Read More

wifite – Mass Wifi WEP/WPA Key Cracking Tool

wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in

Read More

Introducing vSphere 6.5

Easy Money 17 Minutes Of Work… Make Money With This TODAY!  Click here  Today, VMware announces vSphere 6.5, the latest version of its industry-leading virtualization platform.  This new release of vSphere features a dramatically simplified experience, comprehensive built-in security, and a universal

Read More

Snort – Free Network Intrusion Detection & Prevention System

Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and

Read More

Gophish – Open-Source Phishing Framework

Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to everyone. Features One-click Installation Standalone, portable binary with static assets Point-and-click Phishing Beautiful

Read More

Shortcut Keys for Windows server 2012 and 2012 R2

If you new to Windows server 2012 and 2012 R2 you might find difficulty to run some of the essential tasks like, Run, CMD, and even to shut down and logoff the server, how do we do a basic  server administration work

Read More

SSL Handshake Simple Definition

Simple definition of how the SSL handshake works: The SSL uses asymmetric encryption to privately share the common password to be used later in the communication for symmetric encryption. SSL Handshake: The client initiates the connection and says he wants to connect

Read More

Cyborg Hawk Linux – Penetration Testing Linux Distro

Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools

Read More

Chat Using Command Prompt

To Chat Using Command Prompt Perform the following Steps Step1-You would require the IP Address of the person you wish to chat. Step2-Open Your Notepad and type the  following code. @echo off: A Cls echo MESSENGER set /p n=User: set /p m=Message:

Read More

Acunetix Free Manual Pen Testing Tools

Acunetix Free Manual Pen Testing Tools allow penetration testers to further automated testing. Use the HTTP Editor to modify or craft HTTP requests and analyze responses, intercept and modify HTTP traffic on the fly using the integrated HTTP Sniffer, fuzz HTTP requests

Read More