Subhash Maurya

Hello everyone, I am “Subhash Maurya” founder of Tech Code Community. I am a computer science graduate and white hat hacker. I love to find bugs and viruses in computer system as well as network infrastructure. Stay Connected, share your thoughts and help build the community. Share your thoughts on how we can grow.

How to create penetration testing Lab in vmware

Metasploitable 2 installation and configuration First we need to download the Metasploitable 2 virtual machine which contains the vulnerable host machine we will be practicing on in the upcoming tutorials. Make sure you have sufficient resources on your host system for installing and running the virtual machine. You need to have at minimum 10 gigabytes of …

How to create penetration testing Lab in vmware Read More »

Introduction to Ethical Hacking

To crack passwords or to steal data? No, it is much more than that. Ethical hacking is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weak points or loopholes in a computer, web applications or network and reports them to the organization. So, let’s explore more about Ethical Hacking step-by-step.

Basics of Computer Networking

An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the purpose of sending/receiving data or media. Computer networks can also include multiple devices/mediums which help in the communication between two different devices; these are known as Network devices and include things such as routers, switches, hubs, and bridges.

How To Change Mac-Address In Linux

First, let’s see how we can use macchanger to change network card’s hardware MAC address to a random address. We can start by investigating our current MAC address of eg eth0 network interface. To do this we execute macchanger with an option -s and an argument eth0.

How To Use ProxyChains in Kali Linux

How do hackers or cybersecurity researchers cover their tracks during visiting or scanning any website or any cyber attack? Today, in this article we will discuss an important concept which is Proxying. Proxying is a technique bouncing your internet traffic through multiple machines to hide the real identity of your original machine. For achieving this goal we can use a tool which is ProxyChains. So in this article, I am gonna show how to setup Proxychains in Kali Linux.

How to install Kali Linux 2021.1 in VMware Workstation Player 16

VMware Workstation player is available free of cost. Earlier it was not free, but I see that VMware has made it available for free for non Commercial users. For commercial usage, VMware Workstation Pro is more suitable. VMware Workstation Player is the limited capability free version of VMware Workstation . That is, it is just as …

How to install Kali Linux 2021.1 in VMware Workstation Player 16 Read More »

Shopping Cart