The best source of security information online
Latest articles
Disk Partitioning on Kali Linux: A beginner’s guide
Changing anything on the partitions table is an important task and can mess up your computer. In addition, on Kali Linux, you might have to do it with tools you are not used to. Don’t worry, I’ll explain everything step-by-step, and you don’t have to use tricky commands lines if…
50 Basic Linux Commands you Need to Know on Kali Linux
Even if Kali Linux includes powerful tools, that can often be used via the GUI (graphical user interface), knowing some basic Linux commands is highly recommended to do a bit more with your system and targets. That’s exactly the goal of this article, where I’ll give you 50 of the…
How To Change DNS Servers On Kali Linux (GUI & Commands)
Configuring a specific DNS server on Kali Linux is an essential step, yet the process might not be as straightforward as expected. While my usual go-to was editing the resolv.conf file, this method no longer holds for Kali Linux. I tested several methods (with or without GUI) and will share…
How To Login As Root On Kali Linux? (GUI & SSH)
On Kali Linux, as well as on most Debian-based Linux distributions, the administrator user (root) is no longer available by default. In this tutorial, I’ll explain why it’s like that, and how you can enable it if needed. On Kali Linux, administrator privileges can be used temporarily by using the…
Time Synchronization on Kali Linux (GUI & Commands)
It’s important to keep the clock synchronized with a server at all time. And even if Kali Linux has this feature enabled by default, it’s not necessarily clear when you use the interface, and can quickly become complicated if you try to edit the configuration. In this article, I will…
How To Install the Latest Python Version on Kali Linux?
Python is always getting new updates, with many versions available at the same time. Different programs on your computer might need different versions of Python. This guide is here to help you install and use the Python version you need, even if it’s not in your Kali Linux’s default list…
Recommended reading
How To Install Hashcat on Windows In 2023
Hashcat is my favorite password cracker. You can use it on any operating system or distribution, but it’s often easier to use Windows to avoid drivers issues (especially with a recent GPU). Anyway, I will explain how to install it on Windows in this tutorial. Hashcat is officially supported on Windows, binaries files can be…
How To Install Hashcat On Ubuntu In 2023
Hashcat is an important tool to have in your tool belt (on your computer at least ^^). I already wrote several tutorials on how to use Hashcat, but today we’ll stay focus on the installation, especially on a Linux distribution like Ubuntu. The easiest way to install Hashcat on Ubuntu is to use the package…
MD5 vs SHA256: Which is Better? (Speed, Safety, …)
MD5 and SHA256 are two popular cryptographic algorithms, used to store sensitive data (passwords for example). In this article, we’ll see the difference between them, and which one you should use and why. As a whole, SHA-256 is better than MD5 because the output size is twice longer and the probability of collisions is lower….
How to Decrypt MD5 Passwords in Python?
The big question many beginners have about MD5 is how to decrypt hashes after encryption.In this post, I’ll explain you this, and specifically, how to do this in Python. How to Decrypt MD5 Passwords in Python?The MD5 cryptographic algorithm is not reversible.A word can be encrypted into MD5, but it’s not possible to create the…
What’s The Difference Between MD5 And SHA1?
MD5 and SHA1 are often used following a random pick by the developer, but it’s not the same thingIn this post, I’ll introduce these two solutions and explain how they differ. The main difference between SHA1 and MD5 is that MD5 produces a 32-character message digest, while SHA1 produces a 40-character hexadecimal. Also, the MD5…
How MD5 Decryption Works?
MD5 stands for “Message Digest 5 algorithm” and is a well-known cryptographic hash function.They designed this function to make it impossible to decrypt, but today, it’s not yet the case …With the growth of computing and storage through years, we can now use these tools to decrypt a lot of MD5 hash. As there is no…