Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Understand how websites have sub domains that help to separate different pages;
Understand how knowing the sub domains of a website is helpful in “ethical” hacking;
Use recon-ng to map websites.
Component Number (Box Case)
Raspberry Pi + Case
Kali SD Card
Power Supply Unit
Within the penetration testing industry there are multiple companies dedicated to web application hacking. Its popularity has increased as more industries are connecting a range of services to their websites and creating subdomains which can access sensitive information if you can get inside (legitimately or illegally). Multiple resources are dedicated to protect these portals and this is why it is important to understand how both the internet works and how websites/domains work and their relationship to subdomains. Knowing how a domain is laid out is like having a map, instead of stumbling in the dark, hoping you might accidentally come across a vulnerable subdomain you can see exactly where it is and not waste time getting to it.