Contact me

Email us at admin@kalitutorials.net or use the comments box.

16 comments:

  1. Hi
    A emergency questions:(i 'm not found answer in internet and youtube)::
    please note :i have compete complete(full) access to the victim ADSL rouer web interface,,..

    1- How can i hack(have shell to) the pc behind the router??
    3-Is it possible that i do man in the middle attack ??
    2-How can i sniff data that pass through victim router ??
    4-what other things or attack can i do with this acccess to the router ???

    **all quetions situation is when i have full access to victim router web interface out of my LAN**
    (i found a solution by change DNS to my ip and fake update with "evilgrade" on kali linux....but i don't want to wait until victim open the program and if i be lucky update it).
    my OS=kali linux
    plz answer completely and assum victim router is tp-link or d-link and tell where of router must be changed
    plz answer full and compete (with pictures if possible) plz

    my email : lordhadi20@gmail.com
    my email : lordhadi20@gmail.com

    SPECIAL TNX

    ReplyDelete
  2. i need to talk to you shashwat plz, rply to this comment

    ReplyDelete
    Replies
    1. Well my exams just got over. I'm going for a short vacation, after which I'll be active on this website. Meanwhile, what do you want to talk about?

      Delete
  3. hey, if i test your tutorials i'll go to jail ? only this tutorials without do something special for stay anonymous on internet. just with kali linux untouched

    ReplyDelete
    Replies
    1. yes you'll go to jail and your whole family will die :( sorry

      Delete
  4. Hi...Thanks for your all the tricks. Now please tell me how can i able to set proxy in terminal in kali linux.

    ReplyDelete
  5. HI, I am very new to security testing and i do not have enough idea about Kali linux.I want to know whether using Kali linux we can test the OWASP top 10 vulnerabilities like Injection
    Broken Authentication and Session Management (XSS)

    Cross Site Scripting (XSS)
    Insecure Direct Object References
    Security Misconfiguration
    Sensitive Data Exposure
    Missing Function Level Access Control
    Cross Site Request Forgery (CSRF)
    Using Components with Known Vulnerabilities
    Unvalidated Redirects and Forwards

    If so how is it done... please help me...

    ReplyDelete
  6. Please ... how it's done to access the hosts behind a router to scan them and determin how to penetrate... supposing i can't do Client side attacks while i dont know any one in that network.
    Eng.mhanafy@yahoo.com

    ReplyDelete
  7. can you tell me how to hack android by using reverse tcp! i tried but i cant succeed.

    ReplyDelete
    Replies
    1. download the exploit from exploit-db for android os vulnerabilities..

      Delete
  8. Hi, I just noticed a spelling mistake in your web, in the navigation bar it says "penEtesting", I belief this is not intended. Congrats for this amazing hacking website!

    ReplyDelete
  9. my wireless card is not compatible with kali linux ,help please !!!

    ReplyDelete
  10. Please put Kalitutorials on progenic.net

    ReplyDelete
  11. Good morning sir, I would like to thank you for all the wonderful tutorials you've created, its very hard to step into the internet security world and I believe I've been able to accomplish that thanks to you. Furthermore, I would like to encourage you to keep on going as there are so much more things to learn. Finally, I would like to give you one thing that i think would make the website much better and enhance our learning. I would like more background knowledge when performing things. I've just read your article on armitage and I'm sure it is very useful but that tool will not make us learn, I would rather know exactly what I'm doing and why, I would like to know how exactly does the metaexploit for android works as I find joy in the mental challenge Hacking provides rather than the actual exploit itself. That being said, you've created very fucking awesome tutorials man. Please, keep on :)

    ReplyDelete
  12. hello dear admins i had a small wuestion how can i check if a website like:www.example-website.com/login.JSP is vulnerable and how can i pen test it?

    ReplyDelete
  13. i facing some problem to install kali :( please anyone help me.....

    ReplyDelete

© Kali Tutorials, 2016. Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Shashwat Chaudhary and Kali Tutorials with appropriate and specific direction to the original content.
Bitcoin: 1B5aLqJcMW7zznffTxQwta8JTZsxBDPguC