Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Kali Linux

  1. Home>
  2. Linux>
  3. Kali Linux>
  4. Page 4
Read more about the article Importing nessus6 scan results into metasploit

Importing nessus6 scan results into metasploit

  • Post author:jonathansblog
  • Post published:June 2, 2015
  • Post category:Kali Linux/Metasploit/Pentest
  • Post comments:0 Comments

This is a quick post about importing nessus6 scan results into metasploit. This can be very useful for adding a ton of information into a new Metsploit database, or adding…

Continue ReadingImporting nessus6 scan results into metasploit
Read more about the article What is an sql injection attack

What is an sql injection attack

  • Post author:jonathansblog
  • Post published:May 5, 2015
  • Post category:Development/Kali Linux/Methodology/Pentest/SQL
  • Post comments:0 Comments

What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…

Continue ReadingWhat is an sql injection attack
Read more about the article Fixing the cmd and fn keys with an apple keyboard in linux

Fixing the cmd and fn keys with an apple keyboard in linux

  • Post author:jonathansblog
  • Post published:February 10, 2015
  • Post category:Kali Linux/Linux
  • Post comments:0 Comments

I use an apple keyboard at work, I also use ubuntu. There are two things that I need to do to fix the cmd and fn keys with an apple…

Continue ReadingFixing the cmd and fn keys with an apple keyboard in linux
Read more about the article OpenVas tutorial for beginners using web and metasploit

OpenVas tutorial for beginners using web and metasploit

  • Post author:jonathansblog
  • Post published:September 20, 2014
  • Post category:jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:1 Comment

This is a basic openvas tutorial for beginners. I will explain a little of how to use openvas web ui to perform a test of your systems. It will give…

Continue ReadingOpenVas tutorial for beginners using web and metasploit
Read more about the article Kali linux arachni tutorial

Kali linux arachni tutorial

  • Post author:jonathansblog
  • Post published:September 20, 2014
  • Post category:Kali Linux/Pentest
  • Post comments:0 Comments

This tutorial is a basic Kali linux arachni tutorial: to get arachni up and running on your kali linux system and perform a basic scan. Arahni is a vulnerability scanner…

Continue ReadingKali linux arachni tutorial
Read more about the article Nikto tutorial for kali linux

Nikto tutorial for kali linux

  • Post author:jonathansblog
  • Post published:September 9, 2014
  • Post category:jonathansblog/Kali Linux/Pentest
  • Post comments:0 Comments

This is a basic nikto tutorial for kali linux. It will get you started with nikto. For advanced usage, see 'man nikto' or the cirt website Nikto is a web…

Continue ReadingNikto tutorial for kali linux
Read more about the article Plecost tutorial

Plecost tutorial

  • Post author:jonathansblog
  • Post published:September 6, 2014
  • Post category:Kali Linux/Pentest
  • Post comments:0 Comments

This is a basic plecost tutorial. Plecost is a commandline utility that will scan your wordpress host and identify lots of information leaks that could potentially help crackers breaking in…

Continue ReadingPlecost tutorial
Read more about the article Pentesterlab – teach yourself how to learn penetration testing

Pentesterlab – teach yourself how to learn penetration testing

  • Post author:jonathansblog
  • Post published:May 24, 2013
  • Post category:Kali Linux
  • Post comments:0 Comments

pentesterlab.com is a very cool site. its built with bootstrap too ;) they have various exercises and assets for those exercises available. each exercise has a vmware image, so you…

Continue ReadingPentesterlab – teach yourself how to learn penetration testing
Read more about the article Wpscan wordpress vulnerability scanner

Wpscan wordpress vulnerability scanner

  • Post author:jonathansblog
  • Post published:July 18, 2011
  • Post category:Kali Linux/Pentest/Wordpress
  • Post comments:0 Comments

Wpscan wordpress vulnerability scanner. WPScan is a vulnerability scanner which checks the security of WordPress installations using a black box approach. WpScan checks the security of your wordpress installation by…

Continue ReadingWpscan wordpress vulnerability scanner
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Latest Posts

  • Securing an Agile World – NatWest
  • 2023 State of Operational Technology
  • DIGIT EXPO 2023
  • Kali purple cross-grade
  • Testing an API for hackers
  • subdomains brute force enum and finding tools
  • Vagrant for Beginners
  • Regular Software Updates: The Foundation of Mac Security
  • Understanding Gatekeeper: Controlling App Installations on macOS
  • User Account Management for Enhanced macOS Security
  • Data Encryption on macOS: Keeping Your Files Secure
  • Brewdog Rattle & Rum
  • Safe Browsing: Protecting Your Mac from Online Threats
  • Mead
  • Firewall Configuration and Management on macOS

Popular Posts

  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Linux commands for networking with command line
  • Wapiti tutorial
  • 4 types of service in an SOA system
  • OpenVas tutorial for beginners using web and metasploit
  • Nikto tutorial for kali linux
  • How to enable spotlight indexing on a network drive
Mastodon
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - OceanWP Theme by OceanWP