The most important tool for every hacker, programmer and forensics expert is nothing other than-Linux. Linux's distros are used in forensics, checking bug in program, networks or system. Its well used from time before till now. Soo for every hacker needs it. Since it is developing OS for Computer especially for laptops , from before some year it begins to develop OS for Android too.. It can now be more usefull and handy because we can take it into our mobile wherever we want. Soo today's article is all about how to install Kali linux in Android in Linux Deploy. First of all these conditions are to be checked or fulfilled before proceeding ahead. : *.A device running Android 2.1 and above, rooted. *.At least 5 GB free space on internal or external storage. *.A fast, wireless internet connection. *.Patience to wait for a distribution to bootstrap from the network. *.Rooted Android for full funcality After having this in your hand w
Online Password Bruteforce Attack With THC-Hydra Tool -Tutorial According to Kali, Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. Hydra will work in 4 modes: One username & one password User-list & One password One username & Password list User-list & Password list Hydra has Va