How To install NetHunter Lite (part 2)

Having downloaded a ROM image and Rooting our Android device, we now turn to installing Kali Linux NetHunter Lite. This will give us a smartphone or tablet that is a dedicated and fully-featured mobile Pentesting platform.Continue readingHow To install NetHunter Lite (part 2)

How To install NetHunter Lite (part 1)

In this How To we look at turning a smartphone or tablet into a dedicated and fully-featured mobile Pentesting platform. We start with downloading the Kali Linux NetHunter Lite ROM image and Rooting the Android device.Continue readingHow To install NetHunter Lite (part 1)

How To upgrade Android for NetHunter from Linux (part 1)

In this 2-part article we look at How To upgrade to a later version of Android on a Nexus device from a Linux computer. We then see if this helps improve support for Kali Linux NetHunter Rootless Edition.Continue readingHow To upgrade Android for NetHunter from Linux (part 1)

How To install NetHunter Rootless Edition

Can a smartphone or tablet be turned into a real mobile Pentesting platform? Here we look at installing Kali Linux NetHunter Rootless Edition on Nexus devices.Continue readingHow To install NetHunter Rootless Edition

How To install Metasploitable

Metasploitable is a Linux-based Virtual Machine that has been built to include intentional vulnerabilities. These are ready for Ethical Hackers & Pentesters to discover & exploit in order to practice their skills.Continue readingHow To install Metasploitable

How To build ‘A Little Offensive Appliance’

In this article we examine how to turn a Raspberry Pi Zero W into a flexible low-cost USB Pentesting device for physical engagements using Kali Linux & P4wnP1 A.L.O.A.Continue readingHow To build ‘A Little Offensive Appliance’

How To Pentest using a Raspberry Pi

Ever wanted a device that is so portable it can fit in your pocket? Portable yet powerful enough to run all your favorite Pentesting tools? Meet the Raspberry Pi.Continue readingHow To Pentest using a Raspberry Pi

How To setup & configure VirtualBox for Pentesting

VirtualBox is one of the most popular Virtual Machine Hypervisors used by Penetration Testers and Ethical Hackers. In this ‘How To’ we have put together a selection of articles covering the setup and configuration of this software for Cyber Security-related purposes.Continue readingHow To setup & configure VirtualBox for Pentesting

How To install Kali Linux

Kali Linux is one of the most popular operating systems used by Penetration Testers and Ethical Hackers. In this ‘How To’ we have put together a list of useful articles covering the downloading, installing and basic configuration of Kali Linux.Continue readingHow To install Kali Linux