Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Backtrack

  1. Home>
  2. Blog>
  3. Backtrack
Read more about the article MetaSploit tutorial for beginners

MetaSploit tutorial for beginners

  • Post author:jonathansblog
  • Post published:January 10, 2021
  • Post category:Commandline/jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:10 Comments

MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…

Continue ReadingMetaSploit tutorial for beginners
Read more about the article Kali on the Chuwi Hi10 Pro – updated for Kali 2020

Kali on the Chuwi Hi10 Pro – updated for Kali 2020

  • Post author:jonathansblog
  • Post published:March 18, 2017
  • Post category:Hardware hacking/Kali Linux
  • Post comments:0 Comments

This post is now updated with install information for using 2020 versions of Kali on the Chuwi Hi10 Pro. When I first wrote this post I seriously wouldn't have recommended…

Continue ReadingKali on the Chuwi Hi10 Pro – updated for Kali 2020
Read more about the article Backtrack linux bluetooth scanning tutorial

Backtrack linux bluetooth scanning tutorial

  • Post author:jonathansblog
  • Post published:May 29, 2011
  • Post category:Kali Linux/Pentest
  • Post comments:3 Comments

This is a short linux bluetooth scanning tutorial with some tools you can use in backtrack linux (now kali linux) or any distribution you prefer to perform bluetooth scans. Its…

Continue ReadingBacktrack linux bluetooth scanning tutorial
Read more about the article Nessus tutorial – Vulnerability scanning with Nessus

Nessus tutorial – Vulnerability scanning with Nessus

  • Post author:jonathansblog
  • Post published:July 24, 2010
  • Post category:jonathansblog/Kali Linux/Pentest
  • Post comments:5 Comments

This is a short nessus tutorial to help you get to grips with nessus. Nessus is a vulnerability scanner. Nessus can scan your assets for network security vulnerabilities. Nessus allows…

Continue ReadingNessus tutorial – Vulnerability scanning with Nessus
Read more about the article Install backtrack repo in ubuntu

Install backtrack repo in ubuntu

  • Post author:jonathansblog
  • Post published:May 29, 2010
  • Post category:Kali Linux
  • Post comments:6 Comments

This post will show you how to Install backtrack repo in ubuntu - I got an HP mini netbook a couple of days ago. I'm mostly going to use it…

Continue ReadingInstall backtrack repo in ubuntu

Latest Posts

  • Securing an Agile World – NatWest
  • 2023 State of Operational Technology
  • DIGIT EXPO 2023
  • Kali purple cross-grade
  • Testing an API for hackers
  • subdomains brute force enum and finding tools
  • Vagrant for Beginners
  • Regular Software Updates: The Foundation of Mac Security
  • Understanding Gatekeeper: Controlling App Installations on macOS
  • User Account Management for Enhanced macOS Security
  • Data Encryption on macOS: Keeping Your Files Secure
  • Brewdog Rattle & Rum
  • Safe Browsing: Protecting Your Mac from Online Threats
  • Mead
  • Firewall Configuration and Management on macOS

Popular Posts

  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Linux commands for networking with command line
  • Wapiti tutorial
  • 4 types of service in an SOA system
  • OpenVas tutorial for beginners using web and metasploit
  • Nikto tutorial for kali linux
  • How to enable spotlight indexing on a network drive
Mastodon
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - OceanWP Theme by OceanWP