MetaSploit tutorial for beginners
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
This is a quick chat from David Irvine, CEO of MadeSafe The world forces us to change. Private and public info is everywhere now. It was fine, till the companies…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…
Spidering a web application using website crawler software in kali linux There are lots of tools to spider a web application (an companies which are based on this tech, eg…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…
Vagrant with sshfs. You can use sshfs in vagrant with only a private network. This is fine if you are doing all your devlopment from a single machine and dont…
Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
Crypto Asset Convergence This was a really good talk - A company called New Alchemy from Seattle 4 categories of crypto currencies exist to be money utility tokens exist to…
build your own blockchain application in less than an hour Edward Ciggaar developer advocate IBM I've been looking forward to this one for a while now :D starting with an…
I joined a few older posts together (and redirected those old posts here) to create a single place for my public dns services list and instructions. Short list of IP…
This post is a combination of previous posts about privacy settings in mac and ios. Safari do not track: Safari gives users the option to enable the 'do not track'…
This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…
This is a short post on how to setup a dvwa vagrant box for your testing. I recommend this method when installing and testing new tools (and even for developing…
Vagrant with NFS and public_network. You can use NFS in vagrant, but it requires a private_network to work; This is fine if you are doing all your devlopment from a…
Blackarch pacman package groups Install with pacman -S groupname to quickly install a bunch of tools in one command: This info is available in the blackarch developers guide here: https://blackarch.org/blackarch-guide-en.pdf…
Blackarch on the chuwi hi10pro - prereq's a usb hub a usb flashdrive a usb mouse a usb wifi adaptor (at least for the initial setup) Download blackarch from https://blackarch.org/downloads.html…
Kali linux wpa_supplicant cli config. To setup a wifi connection using wpa_supplicant on the cli in kali, first you have to bring up your network interface ifconfig wlan0 up Next,…
This post has a collection of Linux commands for networking. There are basic linux network commands, advanced linux network commands and some centos network configuration commands, but I've tried to…
Pihole on a raspberry pi - making a network wide advert blocker with a raspberry pi. I have a router using dnsmasq with adblocking setup on my router. I also…
This post will explain ddwrt dnsmasq caching dns server configuration Using a ddwrt dnsmasq caching dns server lets machines in your LAN resolve DNS from a machine inside your local…
My brother and his wife got me a raspberry pi for my birthday :D So far I haven't decided what to do with it, But I have lots of ideas…
This post will show you how to setup dnsmasq in order to serve dns requests for (multiple) internal domains - using dnsmasq as an internal DNS server. Using this setup…
[et_pb_section fb_built="1" admin_label="section" _builder_version="3.0.47"][et_pb_row admin_label="row" _builder_version="3.0.48" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.0.47" parallax="off" parallax_method="on"][et_pb_text admin_label="Text" _builder_version="3.0.74" background_size="initial" background_position="top_left" background_repeat="repeat"] This is a short post on Installing vagrant on centos 7. First,…
Multiple ip addresses on one physical NIC. I have a gigabyte brix running esxi to host a few virtualised servers. I have one server for my web development. I have…
M-business Security Threats: Device as an attack vector with mobile devices widespread they are commonly being used as attack vectors Virii While not many viruses exist for mobile devices themselves,…
This post is a collection of things to form a best practice for mac security. 1) enable password after sleep or screensaver. settings > security > require a password immediately…
Subnetting class C networks Benefits of Subnetting: Reduced Network Traffic Optimised Network Performance - as a result of reduced traffic Simplified management Facilitated spanning of large geographical distances How…
Osx has a lot of built in tools. there is a wifi analyser / packet capture tool to open it, just hold down ALT + click on the wifi icon…
What to do when your mac or ipad or iphone is stolen. This is a horrible post to have to write. My house just got broken in to and my…
This post shows you how to fix Netflix is currently unavailable on apple tv. When you first try to access Netflix on the apple tv you see that 'Netflix is…
To join a wireless network on an ipad or an iphone all you have to do is: go to settings > wifi wait for a second for the iphone or…
To stop you iphone or ipad asking you to join lots of different wifi networks all you have to do is: go to settings > wifi at the bottom you…
This command will force spotlight to reindex your drive. It is useful if your spotlight index isnt returning results you know it should. This post will help you force spotlight…
Automount network drive on startup osx. This will show you how to automount a network drive when you login to osx lion. This method will persist through a reboot, so…
This short blog post will show you how to enable spotlight indexing on a network drive. I have also added the commands to disable spotlight indexing on network drive that's…