Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Kali Linux

  1. Home>
  2. Linux>
  3. Kali Linux>
  4. Page 4
Read more about the article Importing nessus6 scan results into metasploit

Importing nessus6 scan results into metasploit

  • Post author:jonathansblog
  • Post published:June 2, 2015
  • Post category:Kali Linux/Metasploit/Pentest
  • Post comments:0 Comments

This is a quick post about importing nessus6 scan results into metasploit. This can be very useful for adding a ton of information into a new Metsploit database, or adding…

Continue ReadingImporting nessus6 scan results into metasploit
Read more about the article What is an sql injection attack

What is an sql injection attack

  • Post author:jonathansblog
  • Post published:May 5, 2015
  • Post category:Development/Kali Linux/Methodology/Pentest/SQL
  • Post comments:0 Comments

What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…

Continue ReadingWhat is an sql injection attack
Read more about the article Fixing the cmd and fn keys with an apple keyboard in linux

Fixing the cmd and fn keys with an apple keyboard in linux

  • Post author:jonathansblog
  • Post published:February 10, 2015
  • Post category:Kali Linux/Linux
  • Post comments:0 Comments

I use an apple keyboard at work, I also use ubuntu. There are two things that I need to do to fix the cmd and fn keys with an apple…

Continue ReadingFixing the cmd and fn keys with an apple keyboard in linux
Read more about the article OpenVas tutorial for beginners using web and metasploit

OpenVas tutorial for beginners using web and metasploit

  • Post author:jonathansblog
  • Post published:September 20, 2014
  • Post category:Kali Linux/Metasploit/Pentest
  • Post comments:1 Comment

This is a basic openvas tutorial for beginners. I will explain a little of how to use openvas web ui to perform a test of your systems. It will give…

Continue ReadingOpenVas tutorial for beginners using web and metasploit
Read more about the article Kali linux arachni tutorial

Kali linux arachni tutorial

  • Post author:jonathansblog
  • Post published:September 20, 2014
  • Post category:Kali Linux/Pentest
  • Post comments:0 Comments

This tutorial is a basic Kali linux arachni tutorial: to get arachni up and running on your kali linux system and perform a basic scan. Arahni is a vulnerability scanner…

Continue ReadingKali linux arachni tutorial
Read more about the article Nikto tutorial for kali linux

Nikto tutorial for kali linux

  • Post author:jonathansblog
  • Post published:September 9, 2014
  • Post category:jonathansblog/Kali Linux/Pentest
  • Post comments:0 Comments

This is a basic nikto tutorial for kali linux. For advanced usage, see 'man nikto' or the cirt website Nikto is an open-source web server scanner that performs comprehensive tests…

Continue ReadingNikto tutorial for kali linux
Read more about the article Plecost tutorial

Plecost tutorial

  • Post author:jonathansblog
  • Post published:September 6, 2014
  • Post category:Kali Linux/Pentest
  • Post comments:0 Comments

This is a basic plecost tutorial. Plecost is a commandline utility that will scan your wordpress host and identify lots of information leaks that could potentially help crackers breaking in…

Continue ReadingPlecost tutorial
Read more about the article Pentesterlab – teach yourself how to learn penetration testing

Pentesterlab – teach yourself how to learn penetration testing

  • Post author:jonathansblog
  • Post published:May 24, 2013
  • Post category:Kali Linux
  • Post comments:0 Comments

pentesterlab.com is a very cool site. its built with bootstrap too ;) they have various exercises and assets for those exercises available. each exercise has a vmware image, so you…

Continue ReadingPentesterlab – teach yourself how to learn penetration testing
Read more about the article Wpscan wordpress vulnerability scanner

Wpscan wordpress vulnerability scanner

  • Post author:jonathansblog
  • Post published:July 18, 2011
  • Post category:Kali Linux/Pentest/Wordpress
  • Post comments:0 Comments

Wpscan wordpress vulnerability scanner. WPScan is a vulnerability scanner which checks the security of WordPress installations using a black box approach. WpScan checks the security of your wordpress installation by…

Continue ReadingWpscan wordpress vulnerability scanner
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Latest Posts

  • A Guide to Open-WebUI: Using It with Ollama
  • How to install ollama and run deepseek
  • Operation Triangulation: Unraveling a Sophisticated Cyber Espionage Campaign
  • Digit Expo 2024
  • Modifying my guitar hardware
  • Mkcert on Laravel Homestead for trusted SSL certs
  • Bash & Zsh Command History Hacks: Say Goodbye to history | grep
  • WordPress Yoast add focus keywords to all posts without focus keywords
  • Configure azure notification hub for ios android and web
  • Azure static website hosting with blob storage and CDN
  • Azure Notification Hubs for push notifications in laravel and nextjs
  • How to block calls on your iphone
  • WildCard SSL certificates with Letsencrypt in Azure App-Service
  • Azure Wildcard Subdomains
  • New Guitar Day

Popular Posts

  • How to install ollama and run deepseek
  • DIY Skateboard Light
  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Ubuntu on the chuwi hi10 pro
  • Linux commands for networking with command line
  • Wapiti tutorial
  • Nikto tutorial for kali linux
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - WordPress Theme by OceanWP