Custom Made WiFi Pineapple Mark 4 – AP121U Flashing

In this tutorial for Cr0w’s Place we are going to be introduced in the WiFi Pineapple world and then we are going to try and make our own cheap WiFi Pineapple with only 40 euros. So say hello to our little new friend and let’s get started 😉 WiFi Pineapple is basicaly a Wireless Pen-TestContinue reading “Custom Made WiFi Pineapple Mark 4 – AP121U Flashing”

Hacking with Android Part 2: Network Spoofer

In Part 2 of Hacking with Android series for Cr0w’s Place we are working with Network Spoofer. Network Spoofer lets you redirect your victims to other websites or change the credentials of a website and many more from an Android phone with a series or ARP poisoning and MITM Attacks. After downloading simply log ontoContinue reading “Hacking with Android Part 2: Network Spoofer”

Wordlist Generation with Crunch – Kali Linux

In this tutorial for Cr0w’s Place we are going to see how to generate a wordlist / dictionary file in Kali Linux. To create our wordlist, we are going to use a program called Crunch, which is a fully automated script for this job. We are going to generate all possible pin passwords with 4Continue reading “Wordlist Generation with Crunch – Kali Linux”

Hacking with Android Part 1: Intercepter-NG

In this tutorial for Cr0w’s Place we are starting a new series of videos called Hacking with Android and as the title says we are going to see applications that helps us to perform Penetration Testing Attacks. In part 1 of this series we are working with Intercepter-NG. Intercepter-NG is a multifunctional network toolkit forContinue reading “Hacking with Android Part 1: Intercepter-NG”

Java Applet Attack – Compromising A System

In this tutorial for we are compromising a system by generating an infected Java applet in order to obtain a shell from the remote machine. This method is called Java Applet Attack and for this tutorial we are going to work in Kali Linux with SET and Metasploit Framework. The Social-Engineer Toolkit (SET) is an open-sourceContinue reading “Java Applet Attack – Compromising A System”