Jonathans BlogJonathans Blog
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Kali Linux
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mail.app
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Music
    • Ableton
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio

Secure

image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
jonathansblog

OS Detection Techniques

Os Detection Techniques and OS fingerprinting Os Detection Techniques – Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection Techniques I can find for remote operating system identification – there is a massive list of sources at the end. Read more…

By Jonathan Mitchell, 2 years7 months ago
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
jonathansblog

WordPress Security

This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a WordPress site. Used by more than 60 million websites, including 30% of the top 10 million websites as of April 2018, WordPress is the most popular website management system in use. Read more…

By Jonathan Mitchell, 2 years7 months ago
Hardware hacking

Raspberry Pi hacking

This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi – by the end of this guide you will have a Kali Raspberry Pi hacking tool with lots of tools ready for use! Install Kali on the Raspberry Pi Following Read more…

By Jonathan Mitchell, 2 years2 years ago
Commandline

How to use metasploit to scan for vulnerabilities

Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial will be to gather information on a host and its running services and their versions and vulnerabilities, rather than to Read more…

By Jonathan Mitchell, 2 years7 months ago
Amsterdam Blockchain

Keynote panel: An E2E approach to tackling data security challenges of the IoT

keynote panel: An E2E approach to tackling data security challenges of the IoT Right now we have lots of theory about security, so intellectually we are good. in practice we are terrible – old devices, devices that cant update, etc when you learn dev you dont learn security – you Read more…

By Jonathan Mitchell, 3 years2 years ago
Iphone and ipad

Privacy settings

This post is a combination of previous posts about privacy settings in mac and ios. Safari do not track: Safari gives users the option to enable the ‘do not track’ feature. It’s easy to enable: safari > preferences > privacy > Ask websites not to track me Safari prevent cross-site Read more…

By Jonathan Mitchell, 3 years3 years ago
jonathansblog

Burpsuite beginners tutorial – how to use burp suite

This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a basic http proxy to intercept traffic for analysis and playback, a web application security scanner, a tool to perform automated Read more…

By Jonathan Mitchell, 3 years6 months ago
Kali Linux

Blackarch pacman package groups for tools

Blackarch pacman package groups Install with pacman -S groupname to quickly install a bunch of tools in one command: This info is available in the blackarch developers guide here: https://blackarch.org/blackarch-guide-en.pdf – this post is a copy-paste of that info – there are a lot of red-team things in the list, Read more…

By Jonathan Mitchell, 3 years3 years ago
Apache

Configuring free SSL certs with Letsencrypt in centos

Configuring free ssl certs with letsencrypt in centos Using letsencrypt in centos requires a few modifications to your centos before you can run the letsencrypt client. The setup for vhosts in centos is different from the setup in debian based distros. This is how I modified my centos install to Read more…

By Jonathan Mitchell, 5 years2 years ago
Development

Portfolio – Jonathan Mitchell MSc BSc MBCS

Jonathan Mitchell Portfolio About Me I have a BSc in Electronic Engineering, and an MSc in Advanced Computer Systems Development with Distinction. I was awarded the University Court Medal for excellence twice – in my PGDIP year, and in my MSc year. I am also a professional member of the Read more…

By Jonathan Mitchell, 7 years3 months ago
Security

Best practice for mac security

This post is a collection of things to form a best practice for mac security. 1) enable password after sleep or screensaver. settings > security > require a password immediately after sleep or screensaver. This will stop anyone who sneaks up on your machine when your not there from using Read more…

By Jonathan Mitchell, 7 years5 years ago
Iphone and ipad

Use siri to generate secure passwords

Finally a use for siri! you can use siri to generate secure passwords. thanks to the wolfram alpha integration inside siri you can ask: wolfram alpha password and siri will grab you a random password from wolfram! {sourced from cult of mac but I thought it was cool enough to Read more…

By Jonathan Mitchell, 8 years7 years ago
News

The nifty minidrive secure digital SD card sits flush with mac case

this is just what ive been looking for. its an adaptor for a micro sd card that sits flush with the edge of your macbook air or macbook pro case. it means that you can add in an extra 64GB of storage space. hopefully by the time it gets launched Read more…

By Jonathan Mitchell, 9 years8 years ago
Social networking

Enable secure https twitter browsing

How to enable secure https twitter browsing 1) goto twitter 2) goto settings > account 3) at the very bottom you will find a checkbox for HTTPS Only 4) tick the box now whenever you log in to twitter your entire session will be encrypted, not just the login part.

By Jonathan Mitchell, 10 years8 years ago
Social networking

Enable secure https facebook browsing

How to enable secure https facebook browsing 1) goto facebook 2) goto account > account settings 3) under account security hit ‘change’ 4) tick the box labeled ‘Secure browsing (https)’ now whenever you log in to facebook your connection will be encrypted.

By Jonathan Mitchell, 10 years8 years ago
Kali Linux

Install backtrack repo in ubuntu

This post will show you how to Install backtrack repo in ubuntu – I got an HP mini netbook a couple of days ago. I’m mostly going to use it to check sites at home in IE; but it will also have another use: hacking =) I need to check Read more…

By Jonathan Mitchell, 11 years5 years ago
Development

Mcaffee and PCI complience

One of the sites that I made for work now has mcaffeeand pci complience. the site is www.e-security-exchange.com some of the features of the site are : CMS, e-commerce platform, secure video streaming (you get a certain ammount of views of the videos you have paid for), mcaffee secure, PCI Read more…

By Jonathan Mitchell, 11 years8 years ago
Top Posts
  • How to use metasploit to scan for vulnerabilities
  • MetaSploit tutorial for beginners
  • Website crawler software kali linux
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • Mount sftp folder with finder
  • How to enable spotlight indexing on a network drive
  • Airplay from iphone or ipad to linux target
  • Burpsuite beginners tutorial - how to use burp suite
  • Install xdebug in centos7 with php7
  • Adding cordova to an existing vue app
Recent Posts
  • Arran the bodega sherry cask single malt
  • Stirfry
  • Investigating uPNP with Python for fun and profit
  • Ethan John Mitchell
  • Beer52 Melbourne Craft beers Jan 2021
  • Aerston Sea Cask 10 year old single malt
  • snapcraft building arm snaps on raspberry PI
  • MetaSploit tutorial for beginners
  • Building custom blocks for WordPress
  • Cubot Note 20

  • Privacy Policy
  • Jonathan Mitchell BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect