Macphish is a tool that automatically generates applescripts that will allow you to gain remote access to a computer. By giving macphish an IP address, a listening port, a payload, and a trojan type, we can generate an applescript that will run create a backdoor.
In this article, we will be using Kali Linux to create a fake pdf that installs a trojan on a mac.
We've all dreamed about hacking into a wifi network like they do in the movies, and luckily, this dream can come true with Kali Linux.
This is a general explanation of how to use Metasploit in Kali Linux, allowing you to get remote access to a computer.
In this article, we will be using one of Kali Linux's vast selection of hacking tools to create a trojan that we can put on someone's computer. Depending on which tool we use, we can have access to almost everything in the victim's computer.
Kali Linux is an OS used for cyber security; the OS comes with a variety of tools, known as penetration testing tools, which are very capable of testing networks and systems. Some capabilities are: sniffing for passwords on a wifi network, wifi password cracking, DNS spoofing, and creating trojan viruses.