Posts

Miloserdev Bettercap

Image
  bettercap 2.x: how to install and use in Kali Linux Table of contents 1. Difference between bettercap 2 and bettercap 1.6 2. How to install bettercap 2 in Kali Linux 3. Download and install the latest version of bettercap 4. bettercap usage guide 4.1 Local network monitoring 4.2 Interactive and non-interactive mode. The -eval and -caplet options. Caplets 4.3 How to run spoofing and sniffing in bettercap 4.4 Transparent HTTP proxy 4.5 DNS spoofing in bettercap 4.6 Built-in web server in bettercap 4.7 Wi-Fi networks monitoring 4.8 Capture handshakes in bettercap 4.9 Creating a fake access point 5. Review of bettercap caplets 5.1 BeEF hooking 5.2 Miner injection 5.3 Replacing the uploaded file with the payload 5.4 Stealing Facebook passwords 5.5 Collection of HTTP requests 5.6 Collection of logins and passwords with invisible forms 5.7 Redirect...

Escaping Surveillance in Modern Society

Image
  Escaping surveillance capitalism, at scale Jan 18, 2024 • Our relationship with computers and phones has changed. We used to rely on software installed locally on our computers, and are now shifting towards a model based on services and companion apps, sometimes with free tiers and subscriptions. Most services are provided by organisations, who collect and sometimes resell users’ information to third parties. This massive, indiscriminate, and corporate collection of personal data is called  surveillance capitalism . While organisations can argue this data collection is necessary to provide their services, this comes with significant privacy implications. Self-hosting and paid subscriptions are common strategies to escape surveillance capitalism. But what guarantees do they really offer? What alternatives exist for the general public who wants to escape surveillance capitalism, and at what cost? Paid subscriptions are not enough When services have a free and a paid tier, it c...

Nmap Top 20 Commands

Image
Nmap Top 20 UDP port scan port 135 Generate 1. List all hosts on a network nmap -sL <target> This type of scan (list scan) is a version of host discovery that only lists each host on the selected network (s) and doesn’t send any packets to the target hosts. By default, Nmap does a reverse DNS lookup to get host names. List all hosts on a network 2. Disable port scanning and only discover active hosts nmap -sn <target> nmap -sP <target> With this option, Nmap will only print the names of hosts that have responded to the host discovery probes without any port scan. By default, this option is slightly more intrusive than the list scan. Use this option as a “ping sweep” to count available machines on a network or monitor server availability. (2) Disable port scanning and only discover active hosts - 1 Disable port scanning and only discover active hosts - 2 3. Discover the network path to a host nmap --traceroute <target> A packet may traverse several ho...