Description
Cover your tracks by changing your network information and manipulating the journalctl logging utility
Write a tool to scan for network connections, and connect and listen to wireless networks
Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
Write a bash script to find potential attack targets over a range of IP addresses
Use and abuse services like MySQL, the Apache web server, and OpenSSH
Build your own hacking tools, such as remote spy cameras and password crackers






Reviews
There are no reviews yet.