OS Detection Techniques
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…
Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
After trying Kali on the hi10 pro (its totally not ready for the bay-trail / cherry-trail platforms) I decided to give ubuntu on the chuwi hi10 pro a go (after…
This post is now updated with install information for using 2020 versions of Kali on the Chuwi Hi10 Pro. When I first wrote this post I seriously wouldn't have recommended…
Multiple ip addresses on one physical NIC. I have a gigabyte brix running esxi to host a few virtualised servers. I have one server for my web development. I have…
4 Layers in an SOA There are 4 layers in an SOA: Business Processes Business Services Integration Services Enterprise Resources Enterprise Resources existing applications COTS systems (consumer, off the shelf)…