DNS Spoofing.

DNS (Domain Name Server): is a special server designed to resolve domain names into IP addresses. So when a user sends a request to a particular server asking to load up a web page, because computers on the net communicate using IPs and not domain names, they need to transfer the request over to the … Continue reading DNS Spoofing.

Packet Sniffer.

Alright guys. In the previous post, we built a program that allows us to run an ARP spoofing attack, redirecting the flow of packets in the network and places us in the middle of the connection. Meaning, every data sent or revived from our target machine goes through our own computer, allowing us to see … Continue reading Packet Sniffer.

ARP Spoofing.

Hey there, welcome to another section on this Python + Ethical Hacking course. In this section we're going to be building our own ARP spoofing program. Lets begin! In the previous post, we looked at ARP, what it is and how we can use it to discover all the connected clients in the same network. … Continue reading ARP Spoofing.

Network Scanner.

Information gathering is one of the most important stage of hacking or penetration testing, you can't gain access to any system if you don't have enough information about the system. If you happen to be on a network and your target is also connected to that same network, you need to be able to discover … Continue reading Network Scanner.

Introduction to Python Programming and Ethical Hacking.

Alright people, before we begin building our tools, I just have a few things to get across to you.• I'm going to start from the basics but I'll also assume that you know how to get your virtual machine, Kali Linux and editor installed and running.• I'll be using Kali Linux in Virtual box• I'll … Continue reading Introduction to Python Programming and Ethical Hacking.