MetaSploit tutorial for beginners
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
This is a quick post on how to cross-grade from regular kali linux to kali-purple:1) make sure you have the correct kali sources for rolling-releases cat /etc/apt/sources.list # See https://www.kali.org/docs/general-use/kali-linux-sources-list-repositories/…
Leading on from the prev article - An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with…
nc netcat opening listening ports - Netcat scan examplesEstablish a connection to a remote port if open: [~]# nc -vn 192.168.2.101 22Ncat: Connected to 192.168.2.101:22.SSH-2.0-OpenSSH\_7.6 As you see, netcat was…
zmap is an opensource network scanner, most often used to scan whole external internet networks in this tutorial I'll show you how to run zmap on a local network. One…
Investigating uPNP with python for fun and profit. SSDP is an interesting uPNP protocol - devices advertise their capabilities on the network and leak valuable information. SSDP is very similar…
A breif look at the tools you need as a web developer in 2020, running Linux on the desktop as a web developer. OSX is my os of choice, but…
I recently saw this tweet from kali linux https://twitter.com/kalilinux/status/1209615382224547840?s=19 on installing rootless nethunter on an unrooted android device. This is my attempt to do so. The tweet linked here: https://www.kali.org/docs/nethunter/nethunter-rootless/…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…