Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Machine

  1. Home>
  2. Blog>
  3. Machine
person writing on notebook
Photo by Julia M Cameron on Pexels.com

MetaSploit tutorial for beginners

  • Post author:jonathansblog
  • Post published:January 10, 2021
  • Post category:Commandline/jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:10 Comments

MetaSploit tutorial for beginners This MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it before. It assumes…

Continue ReadingMetaSploit tutorial for beginners
Read more about the article You got served: How deliveroo improved the ranking of restaurants

You got served: How deliveroo improved the ranking of restaurants

  • Post author:jonathansblog
  • Post published:August 29, 2019
  • Post category:Turing Fest 2019
  • Post comments:0 Comments

Jonny Brooks-Bartlett - Data Scientist at deliveroo They use predictive modelling and machine learning. Their hypothesis is "if they can show you more relevant places you will spend money" given…

Continue ReadingYou got served: How deliveroo improved the ranking of restaurants
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

OS Detection Techniques

  • Post author:jonathansblog
  • Post published:July 14, 2019
  • Post category:jonathansblog/Methodology/Pentest
  • Post comments:0 Comments

Os Detection Techniques and OS fingerprinting https://www.youtube.com/watch?v=1zqsJSlPxpo Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os…

Continue ReadingOS Detection Techniques
Read more about the article Kioptrix Walkthrough Guide

Kioptrix Walkthrough Guide

  • Post author:jonathansblog
  • Post published:April 19, 2019
  • Post category:Kali Linux/OSCP/Pentest
  • Post comments:0 Comments

I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…

Continue ReadingKioptrix Walkthrough Guide
Read more about the article Raspberry Pi hacking

Raspberry Pi hacking

  • Post author:jonathansblog
  • Post published:February 27, 2019
  • Post category:Hardware hacking/Kali Linux/raspberry pi
  • Post comments:0 Comments

This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…

Continue ReadingRaspberry Pi hacking
Read more about the article Vagrant ssh forwarding

Vagrant ssh forwarding

  • Post author:jonathansblog
  • Post published:February 20, 2019
  • Post category:Vagrant
  • Post comments:0 Comments

If you have ssh with keys for authentication setup on your system, and you use vagrant then you can combine the two to have all your ssh keys automatically shared with your…

Continue ReadingVagrant ssh forwarding
Read more about the article Vagrant with sshfs and public network

Vagrant with sshfs and public network

  • Post author:jonathansblog
  • Post published:December 19, 2018
  • Post category:Commandline/Development/Networking/Osx/Vagrant
  • Post comments:0 Comments

Vagrant with sshfs. You can use sshfs in vagrant with only a private network. This is fine if you are doing all your devlopment from a single machine and dont…

Continue ReadingVagrant with sshfs and public network
Read more about the article Google Home Coffee Machine

Google Home Coffee Machine

  • Post author:jonathansblog
  • Post published:November 18, 2018
  • Post category:Hardware hacking
  • Post comments:0 Comments

We recently got a 'smarter coffee' coffee machine at work - it has wifi, an app, and also an ifttt integration. We also have a google home in the office…

Continue ReadingGoogle Home Coffee Machine
Read more about the article Installing metasploitable with vagrant

Installing metasploitable with vagrant

  • Post author:jonathansblog
  • Post published:October 6, 2018
  • Post category:Kali Linux/Metasploit/Pentest
  • Post comments:0 Comments

Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…

Continue ReadingInstalling metasploitable with vagrant
  • 1
  • 2
  • 3
  • 4
  • …
  • 8
  • Go to the next page

Latest Posts

  • A Guide to Open-WebUI: Using It with Ollama
  • How to install ollama and run deepseek
  • Operation Triangulation: Unraveling a Sophisticated Cyber Espionage Campaign
  • Digit Expo 2024
  • Modifying my guitar hardware
  • Mkcert on Laravel Homestead for trusted SSL certs
  • Bash & Zsh Command History Hacks: Say Goodbye to history | grep
  • WordPress Yoast add focus keywords to all posts without focus keywords
  • Configure azure notification hub for ios android and web
  • Azure static website hosting with blob storage and CDN
  • Azure Notification Hubs for push notifications in laravel and nextjs
  • How to block calls on your iphone
  • WildCard SSL certificates with Letsencrypt in Azure App-Service
  • Azure Wildcard Subdomains
  • New Guitar Day

Popular Posts

  • How to install ollama and run deepseek
  • DIY Skateboard Light
  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Ubuntu on the chuwi hi10 pro
  • Linux commands for networking with command line
  • Wapiti tutorial
  • Nikto tutorial for kali linux
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - WordPress Theme by OceanWP