Home
B00ckf0rH4ck
Cancel

Pentesting - Brute Force

Default Credentials Some wordlists that contain default passwords for different services: SecLists Rockyou https://github.com/ihebski/DefaultCreds-cheat-sheet/blob...

Pentesting Wireless

Check Available Interfaces Wi-Fi Check the name of the available Wi-Fi interfaces by running: ip link show or iwconfig Monitor Mode Monitor mode in Wi-Fi pentesting is a special configu...

Pentesting - Essentials

Information about the Network There are commands that are used to display the network configuration information of a computer. This commands provide details such as the IP address, subnet mask, de...

Pentesting - Cracking Passwords, Protected Files and Hash

Cracking Protected Files with Password 2john is a tool that is part of the password cracking utilities provided by the John the Ripper project (also known as John). John the Ripper is a popular an...

Pentesting - Attacking Network Services

Email Services Discovery of common ports used for email services: sudo nmap -Pn -sV -sC -p25,143,110,465,993,995 10.129.14.128 Interact with POP3 and IMAP Example with cURL: curl -k 'imap...

Welcome to our cybersecurity blog

Thank you for visiting our cybersecurity blog! We are Ioritz and Elisa, two computer engineers with a master’s degree in cybersecurity and various specializations in the field, along with work e...

FindTrack: An OSINT Automation Tool with Graphical Interface

FindTrack is a Linux tool designed to automate OSINT (Open-Source Intelligence) with a graphical interface. I (Elisa Alises Núñez) created it as part of my Master’s thesis in Cybersecurity. The ...

HackRF One: Analysis and Solution of Replay/Relay Attacks using Radiofrequency

Introduction: In this article, you will delve into the fascinating world of vehicular cybersecurity. We will explore an in-depth investigation of Replay and Relay attacks, which affect vehicles and...

HackSystemKiller: An Automated Pentesting Tool

HackSystemKiller is a tool that I designed and developed for my Bachelor’s thesis in Computer Engineering (Elisa Alises Núñez). Its main objective is to automate Pentesting tasks from the initial p...

Wireless Network Pentesting: Discovering Vulnerabilities and Tools

Introduction In the field of cybersecurity, ensuring the protection of wireless networks, which have become a fundamental part of our daily lives, is essential. In this article, we will explore a ...