Become a Cyber Warrior.png
0
Return to Home

We now accept crypto-currencies in our online store

pentester.png
  • Subscribers
    • GETTING STARTED
      • SCADA Hacking
        • Online Store
          • Online Courses
            • Web App Hacking Course
              • Security+
                • Linux Firewalls
                  • Advanced Linux
                    • OSINT Course
                      • Network Basics for Hackers
                        • Scripting for Hackers
                          • Advanced SCADA Hacking and Security
                            • Automobile Hacking
                              • Linux Basics for Hackers
                                • CISSP Prep
                                  • Introduction to Snort (IDS)
                                    • Cyber Warrior Training
                                      • Metasploit Basics for Hackers
                                        • CWA Prep Course
                                          • SCADA/ICS Security
                                            • Digital Forensics
                                              • Wi-Fi Hacking
                                                • Mobile Hacking
                                                  • Reverse Engineering Malware
                                                    • Network Forensics
                                                    • Training Schedule
                                                      • Course Registration
                                                      • OSINT
                                                        • MEMBERS
                                                          • OTW's New Book
                                                            • OTW's Book Shipping US
                                                              • OTW's Book Shipping Outside US
                                                                • Subscriber PRO
                                                                  • Metasploit
                                                                    • Part 1, Getting Started with Metasploit
                                                                      • Part 2, Metasploit Modules
                                                                        • Part 3, Metasploit Payloads
                                                                          • Part 4, Connecting postgresql
                                                                            • Part 5: Recon with Metasploit
                                                                              • Part 6: Armitage
                                                                                • Part 7, Adding a Module
                                                                                  • Part 8, Exploitation with EternalBlue
                                                                                    • Part 9, msfvenom for Custom Payloads
                                                                                      • Part 10: Pivoting to Control the Network
                                                                                        • Part 11: Exploiting MS Office Fileformat
                                                                                          • Part 12: Creating RC Scripts
                                                                                            • Part 13: Exploiting Android Devices
                                                                                              • Part 14: Updating the msfconsole
                                                                                                • Part 15: Post-Exploitation Fun!
                                                                                                  • Part 16: SCADA Hacking with Metasploit
                                                                                                    • Part 17: Automobile Hacking
                                                                                                      • Part 18: AutoSploit
                                                                                                        • Part 19: Web Delivery for Windows
                                                                                                          • Part 20: Creating a Fake SMB Server
                                                                                                            • Part 21: mimikatz
                                                                                                              • Part 22: Owning with Physical Access
                                                                                                                • Part 23: Remote Forensics
                                                                                                                  • Part 24: Evasion Modules
                                                                                                                    • Part 25: Web Delivery Linux/Unix
                                                                                                                      • Car Hacking with Metasploit
                                                                                                                        • Create a Fake SMB Server with Metasploi
                                                                                                                          • SCADA/ICS Metasploit Modules
                                                                                                                            • Metasploit Basics
                                                                                                                              • msfvenom
                                                                                                                                • Metasploit's autopwn
                                                                                                                                  • Using Metasploit's psexec
                                                                                                                                    • Metasploit Web Delivery for Windows
                                                                                                                                      • How to Make the Meterpreter Persistent
                                                                                                                                        • Ultimate List of Meterpreter scripts
                                                                                                                                          • Ultimate List of Meterpreter Command
                                                                                                                                            • Web Delivery for Linux/UNIX
                                                                                                                                              • Mimikatz
                                                                                                                                                • Metasploit Resource Scripts
                                                                                                                                                  • Metsploit Keywords and Commands
                                                                                                                                                  • Praise for Linux Basics for Hackers
                                                                                                                                                    • Who Is Master OTW?
                                                                                                                                                      • Mr. Robot
                                                                                                                                                        • How Elliot Covered his Tracks
                                                                                                                                                          • Mr. Robot Hacks: Hiding Data in Audio Fi
                                                                                                                                                            • How Elliot Traces the Dark Army
                                                                                                                                                              • How f/society Hacked Smarthome
                                                                                                                                                                • How Elliot Hacked the Prison
                                                                                                                                                                  • How Angela Stole Boss's Password
                                                                                                                                                                    • How Elliot Made his Hacks Untraceable
                                                                                                                                                                      • How f/society Ransomed Evil Corp
                                                                                                                                                                        • How Elliot Created a Hacking Raspberry P
                                                                                                                                                                        • Hackers For Hire
                                                                                                                                                                          • Hackers for Hire Request
                                                                                                                                                                          • Confessions of a Professional Hacker
                                                                                                                                                                            • How Russian Hackers Compromised Election
                                                                                                                                                                              • How Hackers Obtained the Panama Papers
                                                                                                                                                                              • Linux for Hackers
                                                                                                                                                                                • Why Every Hacker Should Know and Use Lin
                                                                                                                                                                                  • Why Every Hacker Should Know and Use Lin
                                                                                                                                                                                    • Part 1, Getting Started
                                                                                                                                                                                      • Part 2, Finding Stuff
                                                                                                                                                                                        • Part 3, Creating, Removing and Renaming
                                                                                                                                                                                          • Part 4, Networking
                                                                                                                                                                                            • Part 5, Adding and Removing Software
                                                                                                                                                                                              • Part 6, Managing Permssions
                                                                                                                                                                                                • Part 7, BASH Basics
                                                                                                                                                                                                  • Part 8, Managing the User Environment
                                                                                                                                                                                                    • Part 9, Text manipulation
                                                                                                                                                                                                      • Part 10, Loadable Kernel Modules
                                                                                                                                                                                                      • Digital Forensic Investigator for Hire
                                                                                                                                                                                                        • Digital Forensic Investigator Request
                                                                                                                                                                                                        • Training Packages
                                                                                                                                                                                                          • Hack Like the NSA
                                                                                                                                                                                                            • The Quantum Insert
                                                                                                                                                                                                              • EXTRABACON of Cisco Firewalls
                                                                                                                                                                                                                • EternalBlue
                                                                                                                                                                                                                  • Shadow Brokers Exploits
                                                                                                                                                                                                                  • Wireless Hacks
                                                                                                                                                                                                                    • Wireless Hacking Strategies
                                                                                                                                                                                                                      • Getting Started with aircrack-ng
                                                                                                                                                                                                                        • Cracking the WPS PIN with Reaver
                                                                                                                                                                                                                          • Getting Started with aircrack-ng
                                                                                                                                                                                                                            • Cracking WPA2-PSK with aircrack-ng
                                                                                                                                                                                                                              • Cracking WPS on Wifi
                                                                                                                                                                                                                                • Evading Wireless Authentication
                                                                                                                                                                                                                                  • Continuous DoSing a Wireless AP
                                                                                                                                                                                                                                    • Wireless Hacking with Wifiphisher
                                                                                                                                                                                                                                      • Wi-Fi Hacking without Cracking Passwords
                                                                                                                                                                                                                                      • Hack to Spy
                                                                                                                                                                                                                                        • Part 1: Building a Raspberry Spy Pi
                                                                                                                                                                                                                                          • Part 3: Building a Raspberry Spy Pi
                                                                                                                                                                                                                                            • Part 2, Building a Raspberry Spy Pi
                                                                                                                                                                                                                                              • Part 4: Adding Listening Capability
                                                                                                                                                                                                                                                • Spy on Anyone's Smartphone
                                                                                                                                                                                                                                                  • Listen to Anyone's Conversation
                                                                                                                                                                                                                                                    • How to Catch a Terrorist
                                                                                                                                                                                                                                                      • How to Hack Web cams
                                                                                                                                                                                                                                                      • WebApp Hacking
                                                                                                                                                                                                                                                        • Part 5:Enumerating Usernames & Passwords
                                                                                                                                                                                                                                                          • Part 6: Brute Force WP using XMLRPC
                                                                                                                                                                                                                                                            • Part 7: Creating a Backdoor with weevely
                                                                                                                                                                                                                                                              • Part 8: Cloning a Web Site
                                                                                                                                                                                                                                                                • Part 9: XSS
                                                                                                                                                                                                                                                                  • Part 10: Directory or Path Traversal
                                                                                                                                                                                                                                                                    • Part 11: Local File Inclusion (LFI)
                                                                                                                                                                                                                                                                      • Part 12: CSRF
                                                                                                                                                                                                                                                                        • Part 13, Comprehensive Recon with TiDOS
                                                                                                                                                                                                                                                                          • Part 14: OS Command Injection
                                                                                                                                                                                                                                                                            • Part 15: Fingerprinting with whatweb
                                                                                                                                                                                                                                                                              • Finding Hidden Directories with dirb
                                                                                                                                                                                                                                                                                • Web Technologies, Part 1
                                                                                                                                                                                                                                                                                  • Overview and Strategy for Beginners
                                                                                                                                                                                                                                                                                    • Spidering a Website with Scarab
                                                                                                                                                                                                                                                                                      • Finding Vulnerable WordPress Sites
                                                                                                                                                                                                                                                                                        • Finding Vulnerabilities in WordPress
                                                                                                                                                                                                                                                                                          • Finding Web Vulnerabilities: Wikto
                                                                                                                                                                                                                                                                                            • Hacking Form Authentication with Burp Su
                                                                                                                                                                                                                                                                                              • Getting Started with OWASP-ZAP
                                                                                                                                                                                                                                                                                              • Network Forensics
                                                                                                                                                                                                                                                                                                • Wireshark Basics
                                                                                                                                                                                                                                                                                                  • Part 1: Analyzing an Intrusion
                                                                                                                                                                                                                                                                                                    • Part 2: Analyzing a SCADA Attack
                                                                                                                                                                                                                                                                                                      • Part 3: Packet Analysis EternalBlue
                                                                                                                                                                                                                                                                                                      • Networks Basics for Hackers
                                                                                                                                                                                                                                                                                                        • Digital Forensics
                                                                                                                                                                                                                                                                                                          • Network Forensics
                                                                                                                                                                                                                                                                                                            • Recovery of Deleted Files
                                                                                                                                                                                                                                                                                                              • Part 1, Capturing the Image
                                                                                                                                                                                                                                                                                                                • Part 2, Live Memory Acquisition
                                                                                                                                                                                                                                                                                                                  • Part 3, Recovering Deleted Files
                                                                                                                                                                                                                                                                                                                    • Part 4, Finding key Evidence
                                                                                                                                                                                                                                                                                                                      • Part 5, Analyzing the Registry
                                                                                                                                                                                                                                                                                                                        • Part 6: Pre-Fetch Files
                                                                                                                                                                                                                                                                                                                          • Part 7: Browser Forensics
                                                                                                                                                                                                                                                                                                                            • Part 8: Live Analysis with Sysinternals
                                                                                                                                                                                                                                                                                                                              • Part 9: Extracting EXIF from Graphics
                                                                                                                                                                                                                                                                                                                              • Automobile Hacking
                                                                                                                                                                                                                                                                                                                                • Hacking the Mitsubishi Outlander
                                                                                                                                                                                                                                                                                                                                  • Part 1, The CAN Protocol
                                                                                                                                                                                                                                                                                                                                    • Part 2, can-utils for Linux
                                                                                                                                                                                                                                                                                                                                      • Part 3: Car Hacking with Metasploit
                                                                                                                                                                                                                                                                                                                                        • Part 4: Hacking the Key Fob
                                                                                                                                                                                                                                                                                                                                          • Part 5: Hacking the Remote Alarm
                                                                                                                                                                                                                                                                                                                                            • Part 6: Installing the ICS Simulator
                                                                                                                                                                                                                                                                                                                                            • Confidantes
                                                                                                                                                                                                                                                                                                                                              • Evading AV
                                                                                                                                                                                                                                                                                                                                                • Evading AV with shellter
                                                                                                                                                                                                                                                                                                                                                  • Evading AV with OWASP-ZSC
                                                                                                                                                                                                                                                                                                                                                    • Anatomy of ClamAV
                                                                                                                                                                                                                                                                                                                                                      • Evading AV with Veil-Evasion
                                                                                                                                                                                                                                                                                                                                                      • DataBase Hacking
                                                                                                                                                                                                                                                                                                                                                        • Part 1: Getting Started
                                                                                                                                                                                                                                                                                                                                                          • Part 2: Basics of SQL Injection
                                                                                                                                                                                                                                                                                                                                                            • Part 3, Using sqlmap against MySQL
                                                                                                                                                                                                                                                                                                                                                              • Part 4, Extracting Data with sqlmap
                                                                                                                                                                                                                                                                                                                                                              • Password Cracking
                                                                                                                                                                                                                                                                                                                                                                • Scraping Potential Passwords with CeWL
                                                                                                                                                                                                                                                                                                                                                                  • Password Cracking Strategy
                                                                                                                                                                                                                                                                                                                                                                    • Online Password Cracking
                                                                                                                                                                                                                                                                                                                                                                      • Online Password Cracking with Hydra
                                                                                                                                                                                                                                                                                                                                                                        • Cracking Passwords with hashcat
                                                                                                                                                                                                                                                                                                                                                                          • Creating a Custom Wordlist with Crunch
                                                                                                                                                                                                                                                                                                                                                                            • Cracking Passwords with hashcat
                                                                                                                                                                                                                                                                                                                                                                            • Welcome
                                                                                                                                                                                                                                                                                                                                                                              • About
                                                                                                                                                                                                                                                                                                                                                                                • Contact
                                                                                                                                                                                                                                                                                                                                                                                • HoneyPot
                                                                                                                                                                                                                                                                                                                                                                                  • Dionaea Part 1
                                                                                                                                                                                                                                                                                                                                                                                    • Dionaea Part 2
                                                                                                                                                                                                                                                                                                                                                                                    • PowerSploit
                                                                                                                                                                                                                                                                                                                                                                                      • Reconnaissance
                                                                                                                                                                                                                                                                                                                                                                                        • Operating System Fingerprinting with p0F
                                                                                                                                                                                                                                                                                                                                                                                          • Recon with unicornscan
                                                                                                                                                                                                                                                                                                                                                                                            • How to Use Maltego, Part 1
                                                                                                                                                                                                                                                                                                                                                                                              • Maltego, Part 2: Recon on a Person
                                                                                                                                                                                                                                                                                                                                                                                                • Google Hacking
                                                                                                                                                                                                                                                                                                                                                                                                  • Email Scraping and Maltego
                                                                                                                                                                                                                                                                                                                                                                                                    • Finding Website Vulnerabilities with Nik
                                                                                                                                                                                                                                                                                                                                                                                                      • Abusing DNS for Recon
                                                                                                                                                                                                                                                                                                                                                                                                        • nmap for recon and DoS
                                                                                                                                                                                                                                                                                                                                                                                                          • hping for Reconnaissance
                                                                                                                                                                                                                                                                                                                                                                                                          • Hacking Bluetooth
                                                                                                                                                                                                                                                                                                                                                                                                            • Part 1, Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                              • Part 2, Blutooth Recon
                                                                                                                                                                                                                                                                                                                                                                                                                • Part 3, The Bluebourne Exploit
                                                                                                                                                                                                                                                                                                                                                                                                                  • Using MultiBlue to Hack a Mobile Device
                                                                                                                                                                                                                                                                                                                                                                                                                  • Working with Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                    • Hacking Facebook
                                                                                                                                                                                                                                                                                                                                                                                                                      • Getting Facebook Credentials without Hac
                                                                                                                                                                                                                                                                                                                                                                                                                        • Facebook Password Extractor
                                                                                                                                                                                                                                                                                                                                                                                                                        • Hacking Fundamentals
                                                                                                                                                                                                                                                                                                                                                                                                                          • Cryptography Basics
                                                                                                                                                                                                                                                                                                                                                                                                                            • Netcat, the All-Powerful
                                                                                                                                                                                                                                                                                                                                                                                                                              • The Hacker Methodology
                                                                                                                                                                                                                                                                                                                                                                                                                                • Basics of XORing
                                                                                                                                                                                                                                                                                                                                                                                                                                  • Basics of Hexadecimal
                                                                                                                                                                                                                                                                                                                                                                                                                                    • Introduction to Regular Expressions
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Networking Basics, Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Networking Basics, Part 2
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Exploit Development
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 1, Anatomy of Buffer Overflow
                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 2, Writing a Simple Buffer Overflow
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 3, Fuzzing with Spike
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Anatomy of Ransomware
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 1, Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 2, Assembler Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 3, Intro to IDA Pro
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 4, Windows Internals
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 5, OllyDbg Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Why Study Reverse Engineering
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Vulnerability Scanning
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Vulnerability Scanning with Nexpose
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Snort
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Snort, Part1: Installing Snort
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Snort, Part 2: Configuration
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Snort, Part 3: Sending Alerts to MySQL
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Snort, Part 4: Snort Rules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Snort, Part 5: Testing Known Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Hack Like OTW
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Anti-Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How Elliot Covered his Tracks: shred
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • BASH Shell Anti-Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Removing Evidence with BleachBit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Raspberry Pi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Information Security Concepts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Android Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Setting Up an Android Hacking Lab
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Android Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Android Hacking: BlueBoune Exploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Embedding a Backdoor
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Shodan
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Scripting for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Powershell for Hackers,Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Perl, Part 1:Intro
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Perl, Part 2: Port Scanner
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • BASH Scripting
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Python 1: Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Python 2: Building a Banner Grabber
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Python 3: Building a FTP Password Crack
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How to Become a Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • What it Takes to Become a Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Why Hacking is the Most Valuable Skills
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Essential Skills of a Master Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • MiTM
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Hacking DNS to Re-Direct on your LAN
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • MitM with Ettercap
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • MitM with arpspoof
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Viewing Graphic Files with driftnet
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Advertising with Hackers-Arise
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • OTW Recommended Products
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Hackers Needed
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • password-lists
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Blog
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Cyber Law
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Software Defined Radio for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Python Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • New Item
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • New Item
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • SDR for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • MEMBERS ONLY
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Shop
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    pentester.png