Skip to content
JONATHANS BLOG
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Kali Linux
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mail.app
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Music
    • Ableton
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
Menu Close
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Kali Linux
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mail.app
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Music
    • Ableton
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio

Address

Home > Address
Read more about the article MetaSploit tutorial for beginners

MetaSploit tutorial for beginners

  • Post author:Jonathan Mitchell
  • Post published:January 10, 2021
  • Post category:Commandline/jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:10 Comments

MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…

Continue ReadingMetaSploit tutorial for beginners
Read more about the article Culture

Culture

  • Post author:Jonathan Mitchell
  • Post published:August 28, 2019
  • Post category:Turing Fest 2019
  • Post comments:0 Comments

Im listening to a great talk about culture inside a company - aira.net defining culture: you have to address the culture and define what you want it to be, it…

Continue ReadingCulture
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

OS Detection Techniques

  • Post author:Jonathan Mitchell
  • Post published:July 14, 2019
  • Post category:jonathansblog/Methodology/Pentest
  • Post comments:0 Comments

Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…

Continue ReadingOS Detection Techniques
Read more about the article Kioptrix Walkthrough Guide

Kioptrix Walkthrough Guide

  • Post author:Jonathan Mitchell
  • Post published:April 19, 2019
  • Post category:Kali Linux/OSCP/Pentest
  • Post comments:0 Comments

I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…

Continue ReadingKioptrix Walkthrough Guide
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

WordPress Security

  • Post author:Jonathan Mitchell
  • Post published:March 20, 2019
  • Post category:jonathansblog/Pentest/Wordpress
  • Post comments:0 Comments

This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…

Continue ReadingWordPress Security
Malware detection on Plesk systems

Malware detection on Plesk systems

  • Post author:Jonathan Mitchell
  • Post published:March 10, 2019
  • Post category:Apache/Commandline/Linux/Wordpress
  • Post comments:0 Comments

Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…

Continue ReadingMalware detection on Plesk systems
Metasploit for website pentest

Metasploit for website pentest

  • Post author:Jonathan Mitchell
  • Post published:February 13, 2019
  • Post category:jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:1 Comment

Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…

Continue ReadingMetasploit for website pentest
Read more about the article service-oriented architecture and frameworks – SOA frameworks

service-oriented architecture and frameworks – SOA frameworks

  • Post author:Jonathan Mitchell
  • Post published:September 22, 2018
  • Post category:Methodology

service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…

Continue Readingservice-oriented architecture and frameworks – SOA frameworks
Read more about the article How to use metasploit to scan for vulnerabilities

How to use metasploit to scan for vulnerabilities

  • Post author:Jonathan Mitchell
  • Post published:August 28, 2018
  • Post category:Commandline/jonathansblog/Kali Linux/Linux/Metasploit/Networking/Pentest
  • Post comments:1 Comment

Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…

Continue ReadingHow to use metasploit to scan for vulnerabilities
Read more about the article Privacy settings

Privacy settings

  • Post author:Jonathan Mitchell
  • Post published:April 28, 2018
  • Post category:Iphone and ipad/Osx/Safari
  • Post comments:0 Comments

This post is a combination of previous posts about privacy settings in mac and ios. Safari do not track: Safari gives users the option to enable the 'do not track'…

Continue ReadingPrivacy settings
Read more about the article Burpsuite beginners tutorial – how to use burp suite

Burpsuite beginners tutorial – how to use burp suite

  • Post author:Jonathan Mitchell
  • Post published:April 11, 2018
  • Post category:jonathansblog/Kali Linux/Pentest
  • Post comments:0 Comments

This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…

Continue ReadingBurpsuite beginners tutorial – how to use burp suite
Read more about the article Mining monero in osx using xmring

Mining monero in osx using xmring

  • Post author:Jonathan Mitchell
  • Post published:November 20, 2017
  • Post category:Alt coins/Commandline/Mining
  • Post comments:0 Comments

There are a couple of things you need for mining monero in osx using xmring: 1) A monero wallet (get one from mymonero.com) 2) Homebrew (brew.sh) mining monero in osx…

Continue ReadingMining monero in osx using xmring
Read more about the article Kali linux wpa_supplicant cli config

Kali linux wpa_supplicant cli config

  • Post author:Jonathan Mitchell
  • Post published:July 5, 2017
  • Post category:Kali Linux
  • Post comments:3 Comments

Kali linux wpa_supplicant cli config. To setup a wifi connection using wpa_supplicant on the cli in kali, first you have to bring up your network interface ifconfig wlan0 up Next,…

Continue ReadingKali linux wpa_supplicant cli config
Read more about the article Linux commands for networking with command line

Linux commands for networking with command line

  • Post author:Jonathan Mitchell
  • Post published:November 19, 2016
  • Post category:Commandline/jonathansblog/Networking/Pentest
  • Post comments:0 Comments

This post has a collection of Linux commands for networking. There are basic linux network commands, advanced linux network commands and some centos network configuration commands, but I've tried to…

Continue ReadingLinux commands for networking with command line
Read more about the article Pihole on a raspberry pi

Pihole on a raspberry pi

  • Post author:Jonathan Mitchell
  • Post published:May 22, 2016
  • Post category:Hardware hacking/Networking/raspberry pi
  • Post comments:0 Comments

Pihole on a raspberry pi - making a network wide advert blocker with a raspberry pi. I have a router using dnsmasq with adblocking setup on my router. I also…

Continue ReadingPihole on a raspberry pi
Read more about the article Ddwrt dnsmasq caching dns server

Ddwrt dnsmasq caching dns server

  • Post author:Jonathan Mitchell
  • Post published:September 20, 2015
  • Post category:Hardware hacking/Networking
  • Post comments:0 Comments

This post will explain ddwrt dnsmasq caching dns server configuration Using a ddwrt dnsmasq caching dns server lets machines in your LAN resolve DNS from a machine inside your local…

Continue ReadingDdwrt dnsmasq caching dns server
Read more about the article Using dnsmasq as an internal DNS server to block online adverts

Using dnsmasq as an internal DNS server to block online adverts

  • Post author:Jonathan Mitchell
  • Post published:June 6, 2015
  • Post category:Networking
  • Post comments:0 Comments

This post will show you how to setup dnsmasq in order to serve dns requests for (multiple) internal domains - using dnsmasq as an internal DNS server. Using this setup…

Continue ReadingUsing dnsmasq as an internal DNS server to block online adverts
Read more about the article Multiple ip addresses on one physical NIC using virtual NICs in centos

Multiple ip addresses on one physical NIC using virtual NICs in centos

  • Post author:Jonathan Mitchell
  • Post published:May 25, 2015
  • Post category:Networking
  • Post comments:0 Comments

Multiple ip addresses on one physical NIC. I have a gigabyte brix running esxi to host a few virtualised servers. I have one server for my web development. I have…

Continue ReadingMultiple ip addresses on one physical NIC using virtual NICs in centos
Read more about the article What is an sql injection attack

What is an sql injection attack

  • Post author:Jonathan Mitchell
  • Post published:May 5, 2015
  • Post category:Development/Kali Linux/Methodology/Pentest/SQL
  • Post comments:0 Comments

What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…

Continue ReadingWhat is an sql injection attack
Read more about the article 4 types of service in an SOA system

4 types of service in an SOA system

  • Post author:Jonathan Mitchell
  • Post published:January 8, 2015
  • Post category:Development/jonathansblog/Methodology
  • Post comments:0 Comments

4 types of service in an SOA system. Business services Domain services Integration services Foundation / Utility services Business Services Provide high-level functionality Provides abstraction of the interface Provides integration of…

Continue Reading4 types of service in an SOA system
wordpress and cloudflare

WordPress and cloudflare flexible ssl configuration

  • Post author:Jonathan Mitchell
  • Post published:October 31, 2014
  • Post category:Wordpress
  • Post comments:0 Comments

This is a short tutorial showing how to setup wordpress and cloudflare flexible ssl. Cloudflare offer a service called 'flexible ssl' this means that cloudflare encrypts your content between the…

Continue ReadingWordPress and cloudflare flexible ssl configuration
Read more about the article OpenVas tutorial for beginners using web and metasploit

OpenVas tutorial for beginners using web and metasploit

  • Post author:Jonathan Mitchell
  • Post published:September 20, 2014
  • Post category:jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:1 Comment

This is a basic openvas tutorial for beginners. I will explain a little of how to use openvas web ui to perform a test of your systems. It will give…

Continue ReadingOpenVas tutorial for beginners using web and metasploit
Read more about the article 2013 Advent Calendar Day 8

2013 Advent Calendar Day 8

  • Post author:Jonathan Mitchell
  • Post published:December 8, 2013
  • Post category:2013
  • Post comments:0 Comments

RCA 6226 Aeropessure Type microphone The “Aeropressure” was a rugged radio announcing and public address microphone designed for on-location use, featuring exceptional wind noise suppression. During its some five decades…

Continue Reading2013 Advent Calendar Day 8
Read more about the article Ios7 fix iMessage not sending to your cell number

Ios7 fix iMessage not sending to your cell number

  • Post author:Jonathan Mitchell
  • Post published:October 22, 2013
  • Post category:Iphone and ipad
  • Post comments:0 Comments

I had an issue with people trying to send iMessages to my phone number. for some reason ios7 had set iMessages to only send to my email address and not…

Continue ReadingIos7 fix iMessage not sending to your cell number
Read more about the article Subnetting class C networks

Subnetting class C networks

  • Post author:Jonathan Mitchell
  • Post published:August 5, 2013
  • Post category:Methodology/Networking
  • Post comments:0 Comments

Subnetting class C networks Benefits of Subnetting: Reduced Network Traffic Optimised Network Performance - as a result of reduced traffic Simplified management Facilitated spanning of large geographical distances   How…

Continue ReadingSubnetting class C networks
Read more about the article Ubuntuforums.org hacked – all usernames and passwords stolen

Ubuntuforums.org hacked – all usernames and passwords stolen

  • Post author:Jonathan Mitchell
  • Post published:July 21, 2013
  • Post category:Pentest
  • Post comments:0 Comments

Ubuntuforums.org has been hacked and all of the email addresses, usernames and passwords have been taken. there are 1.8 million users on that forum :| from the announcement: There has…

Continue ReadingUbuntuforums.org hacked – all usernames and passwords stolen
Read more about the article Ipv6 – check if you are ready..

Ipv6 – check if you are ready..

  • Post author:Jonathan Mitchell
  • Post published:March 29, 2013
  • Post category:Networking
  • Post comments:0 Comments

this site from google will tell you if your dns servers are ready for ipv6. if they arent then you could add googles public dns [8.8.8.8] or the opendns ip…

Continue ReadingIpv6 – check if you are ready..
Read more about the article Adding pdf ebooks to your ipad / ipad mini

Adding pdf ebooks to your ipad / ipad mini

  • Post author:Jonathan Mitchell
  • Post published:November 17, 2012
  • Post category:Iphone and ipad
  • Post comments:0 Comments

This post will list the various ways to get pdf ebooks (or anything in a pdf) on to your iphone / ipad / ipad mini there are a few ways…

Continue ReadingAdding pdf ebooks to your ipad / ipad mini
Read more about the article How to fix cannot verify login with facetime

How to fix cannot verify login with facetime

  • Post author:Jonathan Mitchell
  • Post published:November 2, 2012
  • Post category:Ichat / messages
  • Post comments:1 Comment

When trying to login you get a message similar to cannot verify login with facetime or messages on osx. warning: this is quite a complex set of instructions. In the…

Continue ReadingHow to fix cannot verify login with facetime
Read more about the article How to sync imessages between iphone ipad and mac osx

How to sync imessages between iphone ipad and mac osx

  • Post author:Jonathan Mitchell
  • Post published:September 22, 2012
  • Post category:Ichat / messages/Iphone and ipad
  • Post comments:0 Comments

How to sync imessages between iphone ipad and mac osx Once you have setup your mac and iOS device to use the same method to send and receive iMessages then…

Continue ReadingHow to sync imessages between iphone ipad and mac osx
Read more about the article How to sync your LinkedIn contacts with your iPhone addressbook

How to sync your LinkedIn contacts with your iPhone addressbook

  • Post author:Jonathan Mitchell
  • Post published:May 29, 2012
  • Post category:Iphone and ipad/Social networking
  • Post comments:0 Comments

This post will show you how to sync your LinkedIn contacts with your iPhone addressbook. Goto the LinkedIn app Goto the 'you' section Click the gear Click on 'download connections'…

Continue ReadingHow to sync your LinkedIn contacts with your iPhone addressbook
Read more about the article How to sync Facebook contacts with iphone

How to sync Facebook contacts with iphone

  • Post author:Jonathan Mitchell
  • Post published:May 23, 2012
  • Post category:Iphone and ipad/Social networking
  • Post comments:0 Comments

This post will show you how to sync all of your Facebook contacts details with the contacts in your iPhones addressbook. It will only add the information that your Facebook…

Continue ReadingHow to sync Facebook contacts with iphone
Read more about the article Lookup any address from chrome or safari on google maps

Lookup any address from chrome or safari on google maps

  • Post author:Jonathan Mitchell
  • Post published:January 12, 2012
  • Post category:Google chrome/Safari
  • Post comments:0 Comments

This one is pretty cool :) in chrome or safari on osx simply highlight the address you want to find a map for right click the highlighted address click on…

Continue ReadingLookup any address from chrome or safari on google maps
Read more about the article Make your AFP NAS more responsive

Make your AFP NAS more responsive

  • Post author:Jonathan Mitchell
  • Post published:December 9, 2011
  • Post category:Networking/Osx
  • Post comments:0 Comments

I have a western digital mybook word NAS. Using the afp protocol file transfers were very slow. I knew there had to be a way to make your AFP NAS…

Continue ReadingMake your AFP NAS more responsive
Read more about the article Quickly add any url from any app to safari reading list

Quickly add any url from any app to safari reading list

  • Post author:Jonathan Mitchell
  • Post published:December 9, 2011
  • Post category:Safari
  • Post comments:3 Comments

This one is cool: Quickly add any url from any app to safari reading list! highlight a url (in the address-bar in chrome or firefox) goto the services menu (appname…

Continue ReadingQuickly add any url from any app to safari reading list
Read more about the article Change default email account address in iphone and ipad

Change default email account address in iphone and ipad

  • Post author:Jonathan Mitchell
  • Post published:October 10, 2011
  • Post category:Iphone and ipad
  • Post comments:1 Comment

In ios5 and above you can change the default email account - allowing you to send emails from a specified account. To do this goto: settings > mail, calendars and…

Continue ReadingChange default email account address in iphone and ipad
Read more about the article How to change the from address in iphone mail.app

How to change the from address in iphone mail.app

  • Post author:Jonathan Mitchell
  • Post published:September 28, 2011
  • Post category:Iphone and ipad
  • Post comments:0 Comments

This will show you how to change the from: address when you send an email in iphone mail.app compose a new mail click on the address in the from: field…

Continue ReadingHow to change the from address in iphone mail.app
Read more about the article Safari omnibar – search by typing in safari addressbar

Safari omnibar – search by typing in safari addressbar

  • Post author:Jonathan Mitchell
  • Post published:August 3, 2011
  • Post category:Safari
  • Post comments:2 Comments

This will show you how to remove the search box from safari and perform your searches from the addressbar, like you do in google chrome its really easy, just go…

Continue ReadingSafari omnibar – search by typing in safari addressbar
Read more about the article Make snow leopard more like lion

Make snow leopard more like lion

  • Post author:Jonathan Mitchell
  • Post published:June 30, 2011
  • Post category:Osx
  • Post comments:0 Comments

Make snow leopard more like lion: you can use most of the features of osx lion / icloud right now. using google. mail: to sync all your mail on all…

Continue ReadingMake snow leopard more like lion
  • 1
  • 2
  • Go to the next page

Latest Posts

  • Odins Beard
  • Ooni Pizza Oven!
  • Beavertown Neck Oil
  • York – 2021
  • Cider batch 5
  • Amazfit Bip U Pro
  • Ardbeg Uigedail
  • Golden Stag Ale bottling!
  • Adding hops to the Golden Stag
  • nc netcat opening listening ports
  • Homebrew IPA Beer battered haddock and chips
  • zmap on a local network
  • Festival Golden Stag Homebrew
  • Suntory Whisky Toki
  • Jameson Stout Edition and Guiness

Popular Posts

  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Linux commands for networking with command line
  • Wapiti tutorial
  • 4 types of service in an SOA system
  • OpenVas tutorial for beginners using web and metasploit
  • Nikto tutorial for kali linux
  • How to enable spotlight indexing on a network drive
  • Privacy Policy
  • Jonathan Mitchell BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - OceanWP Theme by OceanWP