Loading…

READY TO HACK?

Click on "START HACKING" for the latest hacking tutorials
Start Hacking

Important Hacking Sources And Links

In this article I have compiled important Hacker sources and links. Of course, not everyone needs all of these sources and links. That’s why I’ve divided them up according to certain areas of application. If you are missing an important source, I would be happy if you could write it to me in the comments […]

Lepin 256-Bit-AES-XTS Encrypted USB Stick

If you want to keep your data safe and protect it from strangers, you should encrypt your hard drives, for example. The Lepin 256 Bit AES XTS USB stick offers a mobile alternative. The USB stick is secured with 256-bit encryption, which can be overridden with a PIN code. In this post I want to […]

Wi-Fi adapter for Kali Linux 2020

In this post I will introduce some Wi-Fi adapters for Kali Linux. Not every Wi-Fi adapter works with Kali Linux for Wi-Fi hacking. This is due to the different chipsets which are installed in the adapters. The chipsets must be put into monitor mode and they must support packet injection to hack both WEP and […]

Fake Nintendo Amiibos with Android

Amiibos are plastic figures based on games released for Nintendo consoles, some of which have a high collector’s value. The figures include a small NFC chip in the base that allows users to unlock special bonuses when used with specific games. For example, there are many Amiibos for the game “The Legend of Zelda”. The […]

RFID Writer – Tutorial

Already in my post “Hacking like Mr. Robot Part 3 – Cloning RFID Cards” I wrote about the Tastic RFID Thief by Bishop Fox. With this Deviveit is possible to read and write the RFID information, for example, from a key card. I also mentioned a cheaper alternative with a Raspberry Pi and an RFID […]

Kaspersky Cyber Attack Map

I recently introduced the FireEye Cyber ​​Threat Map, which clearly illustrates all cyberattacks in real time. Another well-presented alternative is Kaspersky’s Cyber ​​Attack Map. Link to the Kaspersky Cyber ​​Attack Map Link to the Kaspersky Cyber ​​Attack Map  

AirDrive Keylogger – Forensic Keylogger Cable

Some time ago I reported about the AirDrive keylogger. It has a Wi-Fi function and sets up its own network for this. Now AirDrive has released a new product, a keylogger in the form of a USB extension.   Overview Works as a WiFi hotspot, connectivity from any computer, smartphone or tablet Access to keystroke […]

USB Password Stealer Turorial

Every security system has a vulnerability and all security systems have the same vulnerability – Human. Most people simply tick “Remember Me” on the websites they visit, as this is convenient. This happens especially often on private computers, which are not used by others, but often also on service devices, to which a hacker has […]

Fireeye Cyber Threat Map

FireEye, Inc. is a publicly traded company based in Milpitas, California, USA that provides network security software and services. It gained notoriety among other things with the discovery of several zero-day gaps in Microsoft’s Internet Explorer and participation in investigations of and actions against several botnets. A free Fireeye service is the browser-based Fireeye Cyber […]

Hack Excel Passwords

In Excel you can protect tables with the so-called leaf protection with a password. In this tutorial, I’ll show you how to remove the password if you have forgotten it. The following tutorial may of course only be used for your own files, otherwise you would be liable to prosecution. Please note the disclaimer. Required […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 7 – Yagi Antenna

In one episode, Darlene comes into a room and you see how she sets up a strange device with a tripod on the windowsill. This device is a Wi-Fi Yagi antenna, sometimes referred to as “Cantenna”. A Yagi antenna is a directional antenna and it can greatly expand the wireless range. Yagi antennas are available […]

Kali Linux – Difference between update and upgrade

Before any installation in Kali Linux, or Linux in general, the operating system should be updated. This is usually done through the terminal with an update and an upgrade command. But what are the differences? And is the succession important? How to install Kali Linux on the Raspberry Pi, I’ll show you in this tutorial […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 6 – Rubber Ducky

In an episode of Mr. Robot, Mobley gives Angela a Rubber Ducky. If she does not get the femtocell up and running, Mobley says she can simply plug in the USB flash drive, wait a few seconds and then pull out. What’s it all about? The USB Rubber Ducky is a keystroke injection tool disguised […]

Kali Linux – The Lazy Script

The lazy script for Kali Linux makes your life easier, because it makes some processes faster. The developer Aris Melachroinos wrote the lazy script (also known as lscript) for Kali Linux to automate many processes. In this tutorial, I’ll show you step by step how to install the lazy script in Kali Linux. How to […]

Man-in-the-Middle – Pumpkin Pi – WiFi Pumpkin

A man-in-the-middle attack puts you between the victim and the Internet and pretends to be a Wi-Fi network, while every packet that flows through the connection is secretly intercepted. WiFi Pumpkin is a rogue AP framework that lets you easily create these fake networks. In this tutorial, I’ll show you how to install this framework […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 5 – Malware USB Sticks

USB sticks actually serve as storage media, but USB sticks can also be used as attack tools. The curiosity of what is probably for data on a found USB stick, entices many people to simply plug the USB stick into their computer. Once that happens, attackers have many options. In this tutorial, I’ll show you […]

Differences between Surface Web, Deep Web and Dark Web

In the media, the terms Deep Web and Dark Web appear more and more often. The terms are often used interchangeably, but this is wrong. So what are the differences between Surface Web, Deep Web and Dark Web? In this article I would like to give you a small overview. Surface Web The Surface Web […]

Kali Linux hard disk installation

The Kali Linux hard disk installation is a simple process. First, you need compatible computer hardware. Kali is supported on i386, amd64 and ARM platforms. The hardware requirements are minimal although better hardware naturally offers better performance. In this tutorial, I will install Kali Linux on a Dell Latitude E6500 with a hard drive as […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 4 – Social Engineering

You would not borrow your phone to a stranger in a hoodie? In one episode, Elliot asks Krista’s friend if he can use his cell phone to make a phone call. Then he calls himself and gets the phone number  of the victom and finally, access to many more private information. The exploitation of trust […]

Surf the Internet anonymously

Surf the Internet anonymously. How do hackers hide their IP address from prying eyes? Hackers are known to invade most web servers around the world and yet are not caught. One of the main reasons for this is that they hide their IP addresses from the prying eyes of the authorities and system administrators. Using […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 3 – Cloning RFID Cards

To gain access to Sentinel, Darlene applies a well-known hardware hack and exploits her relationship with an FBI agent – Cloning RFID Cards Darlene invites FBI Agent Dom to the bar, where they first talked in person. Dom comes with all her usual FBI utensils, such as her badge, her gun, and the RFID card that […]

Hackerspace Diplomatic Passport

Hackerspace Diplomatic Passport

In this article, I do not introduce a tutorial, but the hackerspace diplomatic passport. The developer Mitch Altman, who, for example, also developed the TV-B-Gone, created together with Matthew Borgatti the Hackerspace diplomatic passport. Of course this is not a true diplomatic passport and the idea is pretty simple. Hackerspace Diplomatic Passport A hacker who comes around a […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 2 – Deepsound

Elliot is hacking people in his life and stores all the information he finds on CDs. Then he labels them with classic band names. Many wonder why he does it and how sure that is. Hide information The answer is that Eliot hides the data on these CDs. He actually copies music to these CDs […]

Kali Linux Terminal Befehle

Kali Linux Terminal Commands A – Z

Overview of the most important Kali Linux Terminal commands (shell commands) sorted from A – Z. If you are using more commands that are not listed here, I´m looking forward to a note in the comments at the end of the article. How to install Kali Linux on a Raspberry Pi I show you in […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 1 – Raspberry Pi

Personally, I really like the TV series Mr. Robot, as the hacks are presented realistically. No animated viruses moving across the screen, as shown in many other series and movies, but, for example, real command lines in Kali Linux. Raspberry Pi 3 The Hacking Raspberry Pi in Episode 4 In episode 4 of Season One, […]

Kali Linux BASH Shortcuts

Kali Linux BASH Shortcuts

The BASH has many important shortcuts that can be very useful in everyday use with the BASH. I have listed the most important BASH shortcuts here. The function of BASH Shortcuts is provided by the GNU Readline library. Tutorial – Kali Linux Hard Disk Installation Tutorial – Installing Kali Linux on the Raspberry Pi Shortcut […]

Kali Linux auf dem Raspberry Pi Installieren

Install Kali Linux on the Raspberry Pi

The Raspberry Pi is also suitable for hacking along with many other applications and you can install Kali Linux on the Raspberry Pi. Of course, one should not expect extreme benefits from the computer the size of a credit card, but there are many practical uses such as for a mobile hacking station and with […]

Eine Facebook Phishing-Seite erstellen

Create a Facebook phishing page

In this tutorial, I’ll show you how to create a Facebook phishing page to catch usernames and passwords that can hack other users’ Facebook accounts. But this knowledge should never be used to hack foreign Facebook accounts. It is simply not legal, in Germany it violates the Criminal Code StGB § 202c. Please also read […]

Google Dork Liste 2018

4500+ Google Dork List

In this article, I’ve put together a Google Dork list. Google Dorks are mostly used over the Internet to attack SQL injections, such as website hacking. However, before a SQL injection can be performed, a vulnerability must be found. Google Dorks are the little codes that can help you find the flaws in Google search […]

AirDrive - Hardware USB Keylogger mit Wi-Fi

AirDrive Keylogger – Hardware USB Keylogger with Wi-Fi

The AirDrive Keylogger is one of the smallest keyloggers on the market. He has a Wi-Fi function and builds his own network. For about 50 euros the hardware USB keylogger with Wi-Fi is available on Amazon. Overview Smallest keylogger on the market with a length of only 0.8 “(21mm) Works as a WiFi hotspot, connectivity […]

Long Range Wi-Fi Tutorial

Long Range Wi-Fi Tutorial

In this Long Range Wi-Fi tutorial, I will show you how to significantly improve the reception of a USB Wi-Fi adapter. A long-range Wi-Fi setup is part of the basic Wi-Fi hacking system, allowing you to attack from a distance. Prerequisite for the amplification of the reception is a Wi-Fi adapter with SMA / RP-SMA […]

Hello World!

Welcome to the website www.conzu.de. Here you will find tutorials and videos about hacking. Please read the disclaimer before trying any of the tutorials. All videos and tutorials on this website and on the YouTube channel are for informational and educational purposes only. The tutorials and videos provided on this website are intended for those […]