MetaSploit tutorial for beginners
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
By now in out Building a PWA vuejs app with wordpress API journey, we have a basic vuejs app which can fetch data from a Wordpress API using axios and…
talk by split experimentleaks.com use data to drive the decisions. A/B testing, multivariant - controlled experiments reduce external influences. it can allow us to distinguish from noise and real signal.…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
It turns out that adding cordova to an existing vue app is pretty easy. If only I'd known this before trying at least 10 different ways: First, make sure your…
Spidering a web application using website crawler software in kali linux There are lots of tools to spider a web application (an companies which are based on this tech, eg…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
What is a WAF A WAF is a web application firewall. A Web Application Firewall protects HTTP applications (eg websites) using a set of rules to protect against various common…
Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…
Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…
My iPhone 6 plus was going slow, so I got a battery from ebay and followed the ifixit iPhone battery replacement tutorial - my phone is now much faster (it…
Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
Making a WordPress Theme. From Scratch. Research + Information Architecture Introduction Making a new WordPress theme from scratch can seem daunting, but it's pretty easy if you know the steps.…
building smart contracts in c# stratis - they have their own platform first they built a compiler in c# that compiles down to solidity first so instead they built a…
This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…
This is a short post on how to setup a dvwa vagrant box for your testing. I recommend this method when installing and testing new tools (and even for developing…
At work we had a mac mini 2014 that needed an ssd harddrive upgrade. This post has a short video and some info on the process documenting how to remove…
Blackarch pacman package groups Install with pacman -S groupname to quickly install a bunch of tools in one command: This info is available in the blackarch developers guide here: https://blackarch.org/blackarch-guide-en.pdf…
Blackarch on the chuwi hi10pro - prereq's a usb hub a usb flashdrive a usb mouse a usb wifi adaptor (at least for the initial setup) Download blackarch from https://blackarch.org/downloads.html…
How to install birdwatcher in kali linux Birdwatcher is an OSINT data analysis and data gathering tool for twitter. Birdwatcher has been designed to feel like metasploit or recon-ng, so…
Keyword research for organic SEO used to be easy. You didn't need any keyword research tools. Put up some content, let google index the content and watch in analytics as…
Ive completed my MSc Thesis! I was awarded a grade A (81%) and an MSc with distinction :D The abstract from my thesis is below: SQL injection vulnerabilities remain one…
Hardening ssl ciphers. I wrote a post previously about disabling sslv2 and enabling sslv3 and tlsv1. Times have changed since then, its been best-practice for a long time now to…
I ordered a Pibow Ninja Coupe a few days ago, and got it delivered to work this morning. This post is full of photos, unboxing the case and assembling the…
My brother and his wife got me a raspberry pi for my birthday :D So far I haven't decided what to do with it, But I have lots of ideas…
This is a quick post about importing nessus6 scan results into metasploit. This can be very useful for adding a ton of information into a new Metsploit database, or adding…
Jonathan Mitchell Portfolio About Me I have a BSc in Electronic Engineering, and an MSc in Advanced Computer Systems Development with Distinction. I was awarded the University Court Medal for…
Oracle forms overview. Oracle internet platform consists of 3 components: oracle application server (forms service + OC4J) oracle developer suite (forms developer + object navigator + form module) oracle database…
Since I released my first public wordpress theme (I have made lots of themes over the years, but have never released any as open-source) I decided I would share the…
First: why should you link audit competitors? Second: who are your competitors and how to find them. Third: doing the link audit. Fourth: use the link audit to build links…
We recently upgraded plesk to v11.0.9 at work We use an external DNS service, so dont need plesk to handle it for us. it turns out that there isnt a…
In osx when you install xcode, the commandline version of git is not automatically installed. This post will show you how to install git in osx. to install git, follow…
I have a few posts already about twitter i spent a year recording my twitter activity to find patterns in what twitter users react to, and I have written about…
If your audio midi setup takes an age to load, and you get the message 'the midi server cant be opened' it might be to do with protools. i run…
Some cool SEO tools for you to try out - I'm always looking for SEO tools, the more tools I try out, the more I understand what the general consensus…
RTAS (real time audio suite) plugins are plugins for protools systems. You can get free rtas plugins for protools if you know where to look. There are a lot of…