OS Detection Techniques
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
Installing and configuring the fail2ban centos service fail2ban is a service for linux systems that checks log files for failed login attempts and automatically inserts firewall rules to block further…
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…
If you have ssh with keys for authentication setup on your system, and you use vagrant then you can combine the two to have all your ssh keys automatically shared with your…
Vagrant with sshfs. You can use sshfs in vagrant with only a private network. This is fine if you are doing all your devlopment from a single machine and dont…
Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
It turns out that coding in php on android is possible (even if its not as good as on a mac, linux or even windows). In this blog post I'll…
This is a short post on how to setup a dvwa vagrant box for your testing. I recommend this method when installing and testing new tools (and even for developing…
I have a router running dd-wrt. sometimes the dd-wrt web ui crashes and you cant access the interface, but your WAN connection works, and you can still login via ssh…
Pihole on a raspberry pi - making a network wide advert blocker with a raspberry pi. I have a router using dnsmasq with adblocking setup on my router. I also…
Hardening ssl ciphers. I wrote a post previously about disabling sslv2 and enabling sslv3 and tlsv1. Times have changed since then, its been best-practice for a long time now to…
This post will explain ddwrt dnsmasq caching dns server configuration Using a ddwrt dnsmasq caching dns server lets machines in your LAN resolve DNS from a machine inside your local…
[et_pb_section fb_built="1" admin_label="section" _builder_version="3.0.47"][et_pb_row admin_label="row" _builder_version="3.0.48" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.0.47" parallax="off" parallax_method="on"][et_pb_text admin_label="Text" _builder_version="3.0.74" background_size="initial" background_position="top_left" background_repeat="repeat"] This is a short post on Installing vagrant on centos 7. First,…
This post will show you how to mount a remote ssh filesystem as a 'drive' in osx using a bash script, osxfuse and brew. There are a few ways to…
Since I released my first public wordpress theme (I have made lots of themes over the years, but have never released any as open-source) I decided I would share the…
While probably not the best platform to do web development on, an ipad can be used to create code for your website. I use my ipad mini (in emergencies) to…
mc for mac osx! GNU Midnight Commander - mc - is an excellent orthodox text mode file manager. mc runs in your console, and has mouse support. It also has…
I wanted to delete my old time machine backup from my western digital mybook world i didnt need it for anything, as I have a backup of it :D i…
This will show you how to mount a remote directory in finder using sftp. (Mount sftp folder with finder). There is a link at the bottom to a post to…
This post will show you a few of the cool useful linux and osx commandline tools that I use every day. They are mostly available for osx, but some require…
This will show you how to use ssh with keys for authentication. this has a couple of advantages over using passwords: 1) you can enable key only logins. 2) you…
This blog post is quite easy, it shows you how to install rkhunter on a linux machine and how to configure rkhunter to run periodically using a cron job. RKhunter…
Yesterday I was securing a server to pass the PCI tests and the Mcaffee tests for a client of our's. We have a Basic iptables firewall for linux that we…
This post is old. the information is not kept up-to-date. for the current best-practice, including how to disable sslv2, please see this post This is something that comes up all…