User contributions for Vegard
Jump to navigation
Jump to search
17 May 2025
- 17:5917:59, 17 May 2025 diff hist +296 Ip link set / `ifconfig No edit summary
- 17:5417:54, 17 May 2025 diff hist +2,976 N Ip link set / `ifconfig Created page with "= ip link set / ifconfig = == Introduction == The ip link set and ifconfig commands are used in Linux environments to manage network interfaces. These tools allow users to configure interface parameters, including the MAC (Media Access Control) address. On Windows systems, similar functionality can be accessed through network adapter settings or PowerShell. Changing a MAC address is commonly performed for testing, research, or evasion purposes. == What is a MAC Addres..."
- 17:5017:50, 17 May 2025 diff hist +19 Sniffing & Spoofing No edit summary current
- 17:4817:48, 17 May 2025 diff hist +15 Sniffing & Spoofing No edit summary
- 17:4717:47, 17 May 2025 diff hist +110 Sniffing & Spoofing No edit summary
- 17:4517:45, 17 May 2025 diff hist +2,512 N Sniffing & Spoofing Created page with "== Sniffing & Spoofing == Sniffing inspects network traffic in real-time, extracting headers, payloads, and session metadata. It uncovers credentials, tokens, and protocol weaknesses, and establishes situational awareness before or during exploitation. === Common Techniques === Capturing raw packets with promiscuous or monitor mode interfaces Filtering traffic by IP, port, or protocol to isolate valuable data Reassembling TCP streams to read clear-text credentials Fol..."
16 May 2025
- 23:0723:07, 16 May 2025 diff hist +246 Information Gathering No edit summary
- 21:3321:33, 16 May 2025 diff hist +1,886 Basic Linux Commands →Examples
- 21:2921:29, 16 May 2025 diff hist +340 Basic Linux Commands →Navigation & File Management
- 21:2821:28, 16 May 2025 diff hist +115 Basic Linux Commands →Navigation & File Management
- 21:1821:18, 16 May 2025 diff hist +1,431 N Can hacking be learned? Created page with "= Can Hacking Be Learned? = Hacking is a discipline that builds on structured knowledge, practical skills, and analytical thinking. It involves understanding how systems operate, how information flows, and how logic governs digital environments. Like any technical field, hacking follows principles that can be studied, practiced, and refined over time. Learning to hack involves both theoretical foundations and hands-on experience. Core concepts include system architectu..." current
- 21:1621:16, 16 May 2025 diff hist +1,765 N What tools do hackers use? Created page with "= What Tools Do Hackers Use? = Hackers use a wide range of tools designed to analyze, manipulate, and interact with digital systems. These tools support various phases of hacking, including information gathering, vulnerability discovery, exploitation, privilege escalation, and persistence. Reconnaissance tools assist in collecting data about systems, networks, or users. This information helps form a clearer understanding of the target environment, revealing potential e..." current
- 21:1221:12, 16 May 2025 diff hist +2,271 N What are the types of hackers? Created page with "= What Are the Types of Hackers? = Hackers are often categorized based on their intent, methods, and objectives. These categories help describe how individuals interact with digital systems and what outcomes they pursue. While the term "hacker" broadly refers to someone skilled in navigating and manipulating technology, distinctions arise from context and purpose. == White Hat == White hat hackers work with permission to identify and resolve security issues. Their acti..." current
- 21:0921:09, 16 May 2025 diff hist +1,439 N What makes hacking ethical? Created page with "= What Makes Hacking Ethical? = Ethical hacking is defined by intention, consent, transparency, and respect for boundaries. It occurs when individuals use their technical skills to identify vulnerabilities, improve security, or support system resilience with the knowledge and approval of the system owner. Clear authorization is central to ethical hacking. When a system owner grants permission to examine digital infrastructure, the hacker operates within a structured ag..." current
- 21:0721:07, 16 May 2025 diff hist +1,552 N When does hacking become illegal? Created page with "= When Does Hacking Become Illegal? = Hacking becomes subject to legal frameworks when actions involve unauthorized access, data manipulation, or disruption of services within systems protected by law. Legal definitions vary by jurisdiction, but common factors include intent, consent, and the impact of the activity on system integrity, confidentiality, or availability. In many legal systems, accessing a system without explicit permission is addressed through statutes r..." current
- 21:0521:05, 16 May 2025 diff hist +1,313 N Who becomes a hacker? Created page with "= Who Becomes a Hacker? = A hacker is someone who develops the ability to understand, modify, or interact with systems in creative and unconventional ways. Individuals who become hackers often possess a strong curiosity for how things work, a desire to solve complex problems, and an interest in exploring the boundaries of technology. Hackers emerge from diverse backgrounds. Some gain early exposure to computers, networks, or code through self-initiated experimentation...." current
- 21:0321:03, 16 May 2025 diff hist +1,610 N Where does hacking happen? Created page with "= Where Does Hacking Happen? = Hacking takes place across digital environments where information systems, networks, or software interact. These environments include public and private infrastructures, internet-connected devices, corporate systems, personal computers, and embedded platforms. Each environment presents different surfaces for exploration, depending on its structure, purpose, and exposure. In many cases, hacking occurs remotely through the internet. This in..." current
- 21:0121:01, 16 May 2025 diff hist +1,595 N Why do people hack? Created page with "= Why Do People Hack? = People engage in hacking for a variety of reasons, often shaped by personal interests, technical curiosity, or broader motivations related to access, control, or influence. The act of hacking reflects an interaction between the individual and the system, where knowledge and action converge to create a specific outcome. Some view hacking as a challenge — a way to test the boundaries of technology and explore hidden mechanics. Others pursue it a..." current
- 20:5820:58, 16 May 2025 diff hist +1,695 N How is hacking done? Created page with "= How is Hacking Done? = Hacking is carried out through a sequence of steps that involve reconnaissance, analysis, and system interaction. These actions are based on logic, precision, and an understanding of how digital systems function. The process begins by identifying a target system or component, followed by studying its behavior, structure, and surface-level responses. One common approach involves mapping exposed services or interfaces. This provides insight into..." current
- 20:5420:54, 16 May 2025 diff hist +42 MediaWiki:Common.css No edit summary current
- 20:5320:53, 16 May 2025 diff hist +1,484 N What is hacking? Created page with "= What is Hacking? = '''Hacking''' is the practice of exploring, understanding, and manipulating computer systems, networks, or digital technologies in ways that exceed or transcend their intended design. It involves deep knowledge of system internals, creative problem-solving, and an ability to see patterns, flaws, and logic beyond the surface. The concept originated in early computing cultures where individuals sought to push machines to their limits. Over time, hack..." current
- 20:4820:48, 16 May 2025 diff hist +255 MediaWiki:Common.css No edit summary
13 May 2025
- 18:4818:48, 13 May 2025 diff hist +1,680 N Dnsdumpster Created page with "= Dnsdumpster = '''Dnsdumpster''' is an online and CLI-based reconnaissance tool for DNS enumeration. It maps a domain's external attack surface by collecting passive DNS records, subdomains, and network infrastructure using publicly available data sources. Dnsdumpster is commonly used in the reconnaissance phase of penetration testing. == <span id="features"></span>Core Features == === DNS Record Enumeration === {| class="wikitable" ! Output !! Description |- | A ||..." current
- 18:3018:30, 13 May 2025 diff hist +499 Nslookup No edit summary current
- 18:2418:24, 13 May 2025 diff hist +2,183 N Nslookup Created page with "= Nslookup = '''Nslookup''' is a classic DNS‑query utility used to obtain hostnames, IP addresses, and DNS record details. It supports both interactive and non‑interactive modes, making it useful for troubleshooting, enumeration, and passive reconnaissance during the information‑gathering phase. == <span id="options"></span>Common Options == === Query Types === {| class="wikitable" ! Option !! Description |- | <code>-type=A</code> || Request an IPv..."
- 18:1318:13, 13 May 2025 diff hist −631 Whois No edit summary current
- 18:1218:12, 13 May 2025 diff hist +101 Whois No edit summary
- 18:0918:09, 13 May 2025 diff hist +684 Whois No edit summary
- 18:0418:04, 13 May 2025 diff hist −2 Whois No edit summary
- 18:0118:01, 13 May 2025 diff hist −38 Whois No edit summary
- 17:5617:56, 13 May 2025 diff hist +2,254 N Whois Created page with "= Whois = '''Whois''' is a passive reconnaissance tool used to gather public registration data about domain names, IP addresses, and ASNs. It queries public WHOIS databases to retrieve ownership, administrative contacts, creation/expiry dates, and registrar details — all without touching the target server directly. Whois is essential in early recon phases for identifying ownership chains, domain infrastructure, and legal responsibility. == <span id="options"></span>..."
- 14:4614:46, 13 May 2025 diff hist +59 Nmap →Full Insight Scan
- 14:4514:45, 13 May 2025 diff hist +267 Nmap →Examples
- 09:2009:20, 13 May 2025 diff hist +4,981 Basic Linux Commands No edit summary
- 09:0609:06, 13 May 2025 diff hist +724 Basic Linux Commands →Linux Commands
- 09:0409:04, 13 May 2025 diff hist +1,141 Basic Linux Commands →Navigation & File Management
- 09:0209:02, 13 May 2025 diff hist +1,141 Basic Linux Commands →Viewing & Text Processing
- 09:0109:01, 13 May 2025 diff hist +1,107 Basic Linux Commands →System & User Info
- 08:5908:59, 13 May 2025 diff hist +4 Basic Linux Commands No edit summary
- 08:5608:56, 13 May 2025 diff hist +1,555 Basic Linux Commands No edit summary
12 May 2025
- 19:1219:12, 12 May 2025 diff hist +45 Basic Linux Commands →Common Commands
- 18:5118:51, 12 May 2025 diff hist +290 Basic Linux Commands No edit summary
- 18:4618:46, 12 May 2025 diff hist +494 Basic Linux Commands No edit summary
- 18:3718:37, 12 May 2025 diff hist −122 Main Page →📂 Categories Tags: Reverted Visual edit
- 18:3118:31, 12 May 2025 diff hist +963 Main Page →📂 Categories Tag: Reverted
- 18:0618:06, 12 May 2025 diff hist −162 Basic Linux Commands No edit summary
- 15:3815:38, 12 May 2025 diff hist +2,192 Basic Linux Commands No edit summary
- 15:3715:37, 12 May 2025 diff hist −50,152 Nmap Undo revision 35 by Vegard (talk) Tags: Replaced Undo
- 15:3715:37, 12 May 2025 diff hist +50,152 Nmap No edit summary Tag: Reverted
- 15:3415:34, 12 May 2025 diff hist +3,448 N Basic Linux Commands Created page with "= Linux Commands = '''Linux command-line tools''' are the building blocks of interaction, enumeration, file manipulation, and system control during any hacking operation. This page breaks down commonly used Linux commands, their usage, categories, and real-world hacking relevance. == <span id="basics"></span>Essential Commands == === Navigation === {| class="wikitable" ! Command !! Description !! Example |- | <code>pwd</code> || Show current working directory || <code..."