BlogHide Resteemshack-tha-world (58)in hack • 5 years agosteemCreated with Sketch.New Hacking Tutorials Coming Soon! Thank you for all your support!I wanted to take a few moments and talk about the various tutorials I have planned. I've been busy with work but please know I plan on writing at least a tutorial a day starting within the next…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Installing Malware On a Computer: Reverse Shells(Hacking-106a)In this hands-on tutorial you'll install persistent malware on to a system. There are many methods to do so including: Uploading malware into webpage code(this tutorial) Using Metasploit to…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Gaining Initial Access: Bruteforcing Wordpress Logins (Hacking-105a)Wordpress powers 34% of websites & today you'll learn to hack it! You'll be able to apply this knowledge to 1 out of every 3 websites (over 75,000,000)! This tutorial will be broken up into two…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Password Cracking Using Rainbow Tables & Hashcat (Hacking-104)There are many reasons you may need to crack a password. Perhaps you are examining breach data or have stolen credentials and only have hashed passwords, or maybe you forgot the encryption keys to…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Scanning A Target For Vulnerabilities(Hacking-103b)Have you ever wondered how hackers find ways to break into a system? In this hands-on tutorial we're going to cover step by step methods of finding ways into systems. Even better we will do all this…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Gathering OSINT Like a Hacker (Hacking-103a)Today I'm going to teach you to perform recon on a REAL organization. This is the first(and most important) step in hacking. The organization we'll be performing recon on is hyatt.com. They have an…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Practice Hacking Real Machines Safely & Legally! (Hacking-102)Today we're going to set up a purposely vulnerable machine to practice our hacking and get those 1337 ski11z. The machine we'll use is specifically chosen b/c it let introduces us to some of the…hack-tha-world (58)in linux • 5 years agosteemCreated with Sketch.Become a Terminal Ninja! Common Linux Commands( Linux 101 )In this tutorial we're going to learn CLI commands everyone should know. If this is your first time messing with the CLI(aka terminal) and you find it daunting don't worry! Today you'll learn…hack-tha-world (58)in travel • 5 years agosteemCreated with Sketch.Hacking The Airlines: How To Save Up To 80% on Flights!I love seeing corporations get the middle finger from your average consumer, and today I'm going to show you how to do just that. Forget about Priceline and all those other sites that claim to…hack-tha-world (58)in security • 5 years agosteemCreated with Sketch.Make a Forensic Copy of a File/Disk(Forensics-101)In this hands-on tutorial you'll learn how forensic professionals make a forensic(bit-by-bit) copy of a file or hard disk. These same techniques are also used by the US military. There are several…hack-tha-world (58)in hacking • 5 years agosteemCreated with Sketch.Hacking Methodology- A Step-by-Step Primer(Hacking-101)Today we'll cover the tools and tactics a hacker or pentester takes to go about an operation. Every tool and step will be elaborated upon in depth in future tutorials but before we can get to that…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Buying Gift Cards & Burner Electronics Anonymously(PerSec109a)It may seem simple to buy something in cash and be safe doing so but there are a few things you should keep in mind. This short but sweet guide will cover how to buy gift cards and burner…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Make Private & Anonymous Fiat Purchases Online(PersSec109b)Your online payment info will one day be leaked. It's a matter of when, not if. And when it does criminals will have access to some of your most private data(though they probably already do). In…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Harden Your Browser Against Tracking & Attacks!(PersSec108)Lurking within your browser are some very dangerous threats to your security. These threats are so severe that even with the best security practices if you don't address them it can result in…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.How To Delete Meta-Data From Files To Maintain Your Privacy/Anonymity(PersSec107)You've probably heard of how photos can have GPS location and camera model but did you know there are many more examples of files containing information that can identify you. In this tutorial I'm…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Encrypt Your Texts & Phone/Video Calls Using Signal on Windows, Linux, Android & IOS(PersSec106)Have you ever wondered how you can keep the government and hackers from listening to your phone calls? How about being able to make a call or text that leaves no trace? That's exactly what we're…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Cover Your Tracks Like a Master Hacker Using Dual-VPN & TOR-VPN(PersSec105c)Today I'm going to show you some of the most extreme ways you can cover your tracks & identity online. There are some situations in life where you REALLY need to be untraceable and not being so is a…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Create Virtual Machines For Hacking(Kali), 100% Anonymity(Whonix) & Increased Security(Windows)In this post I'm going to teach you how to set up 3 different virtual machines that can be used for hacking as well as extreme privacy, anonymity and security. We will cover three different setups;…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Set Up a Router VPN For More Secure/Anonymous VPN Tutorial(PersSec105b)A VPN is great but it's not without it's downfalls. No matter the VPN you are still exposed to IP leaks at device start up, and possibly if the VPN app crashes. Additionally you may want to connect…hack-tha-world (58)in privacy • 5 years agosteemCreated with Sketch.Take Back Your Privacy & Online Identity With a VPN/TOR(PersSec105a)Think your online life is private? Think again. Everything you do online is tracked, cataloged and sold in hundreds of ways and they know exactly who and where you are. Everywhere you go…