If you have spent some time in tech as a hobby, or for your work, you have probably heard of Linux. What exactly is Linux, and why do people choose to use it? Well, to put it simply, it is an operating system just like Windows or Mac OSX. It …
We've all dreamed about hacking into a wifi network like they do in the movies, and luckily, this dream can come true with Kali Linux.
This is a general explanation of how to use Metasploit in Kali Linux, allowing you to get remote access to a computer.
In this article, we will be using one of Kali Linux's vast selection of hacking tools to create a trojan that we can put on someone's computer. Depending on which tool we use, we can have access to almost everything in the victim's computer.
Kali Linux is an OS used for cyber security; the OS comes with a variety of tools, known as penetration testing tools, which are very capable of testing networks and systems. Some capabilities are: sniffing for passwords on a wifi network, wifi password cracking, DNS spoofing, and creating trojan viruses.