I’m glad to announce the release of zSecurity, this is an idea that I had for a long time, the idea is to have a place that contains everything that a hacker might need, right now the website is still new so it doesn’t have too many features but we started with the essential ideas, right now it contains:
An ethical hacking community where people can learn and share their knowledge for free, this will contain tutorials, articles and news related to ethical hacking, anyone can submit an article but articles get reviewed first before they get published to make sure the are unique and contain good information.
An online learning platform – this section contains online courses related to cyber security, right now it only contains courses by me but we will add more there in the future, the focus will be quality over quantity so we will only include the best ethical hacking courses.
An online shop – right now it only contains wireless adapters that support monitor mode and packet injection, but again there will be much more cool stuff there in the future.
The website is still new, we still have lots of ideas but we wanted to launch it like this first and let it grow and take shape as time passes.
I don’t want to make this too long, you can check the website out here https://zsecurity.org/ , like its facebook page and subscribe to our Youtube channel to stay updated.
We all used a captive portal at some stage, these are open networks that you can connect to without a password, but then it would ask you to sign in to access the internet, caprive portals are usually used in hotels, airports ….etc
This video shows how to steal login info and gain access to captive portals
This lecture will teach you how to install virtual box extension pack so that you can connect a usb device or a usb Wireless adapter to Kali in Virtual Box, I will also cover the correct steps to connect the adapter so that it can be used with Kali with no issues.
Its been a while, sorry about that but I’ve been very busy with a number of projects.
I made this video here to end the confusion once and for all, one of the most common questions that I get is “which wireless adapter should I get” so I made this video to cover all aspects of picking the right wireless adapter.
This video shows how to fix a common issue with Mutillidae in Metasploitable 2, by default Mutillidae is misconfigured to use a wrong database, this will give an error when the web application tries to access the database, the error would say something like
Table ‘metasploit.tableName’ doesn’t exist
Follow the following video on how to fix that issue :)
Veil-Evasion is a tool that can generate backdoors that are not detectable by anti virus programs, in this video you will learn how to install it, generate a backdoor, listen for incoming connections and hack a Windows 10 machine.