Having downloaded a ROM image and Rooting our Android device, we now turn to installing Kali Linux NetHunter Lite. This will give us a smartphone or tablet that is a dedicated and fully-featured mobile Pentesting platform.Continue readingHow To install NetHunter Lite (part 2)
Category: How To…
In this How To we look at turning a smartphone or tablet into a dedicated and fully-featured mobile Pentesting platform. We start with downloading the Kali Linux NetHunter Lite ROM image and Rooting the Android device.Continue readingHow To install NetHunter Lite (part 1)
In this 2-part article we look at How To upgrade to a later version of Android on a Nexus device from a Linux computer. We then see if this helps improve support for Kali Linux NetHunter Rootless Edition.Continue readingHow To upgrade Android for NetHunter from Linux (part 1)
Can a smartphone or tablet be turned into a real mobile Pentesting platform? Here we look at installing Kali Linux NetHunter Rootless Edition on Nexus devices.Continue readingHow To install NetHunter Rootless Edition
Metasploitable is a Linux-based Virtual Machine that has been built to include intentional vulnerabilities. These are ready for Ethical Hackers & Pentesters to discover & exploit in order to practice their skills.Continue readingHow To install Metasploitable
In this article we examine how to turn a Raspberry Pi Zero W into a flexible low-cost USB Pentesting device for physical engagements using Kali Linux & P4wnP1 A.L.O.A.Continue readingHow To build ‘A Little Offensive Appliance’
Ever wanted a device that is so portable it can fit in your pocket? Portable yet powerful enough to run all your favorite Pentesting tools? Meet the Raspberry Pi.Continue readingHow To Pentest using a Raspberry Pi
VirtualBox is one of the most popular Virtual Machine Hypervisors used by Penetration Testers and Ethical Hackers. In this ‘How To’ we have put together a selection of articles covering the setup and configuration of this software for Cyber Security-related purposes.Continue readingHow To setup & configure VirtualBox for Pentesting
Kali Linux is one of the most popular operating systems used by Penetration Testers and Ethical Hackers. In this ‘How To’ we have put together a list of useful articles covering the downloading, installing and basic configuration of Kali Linux.Continue readingHow To install Kali Linux