Cross-compilation allows you to develop for one platform (like Kali) and compile to run on a different platform (such as Wind ...
Kali Linux is the obvious first choice of an operating system for most new hackers, coming bundled with a curated collection ...
Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for ...
After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repo ...
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our ...
As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of thi ...
We're nearly done getting our Mac set up for hacking. If you haven't checked out previous tutorials, I'd recommend you do so ...
Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our ...
SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provid ...
Local port forwarding is good when you want to use SSH to pivot into a non-routable network. But if you want to access servic ...