MetaSploit tutorial for beginners
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
MetaSploit tutorial for beginners This (updated for 2021) MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it…
By now in out Building a PWA vuejs app with wordpress API journey, we have a basic vuejs app which can fetch data from a Wordpress API using axios and…
Building a PWA vuejs app with wordpress API - Part 1 The aim in this is to make an offline-first PWA with vuejs / axios / bootstrap using wordpress as…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…
Spidering a web application using website crawler software in kali linux There are lots of tools to spider a web application (an companies which are based on this tech, eg…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
What is a WAF A WAF is a web application firewall. A Web Application Firewall protects HTTP applications (eg websites) using a set of rules to protect against various common…
Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…
Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
It turns out that coding in php on android is possible (even if its not as good as on a mac, linux or even windows). In this blog post I'll…
Making a WordPress Theme. From Scratch. Research + Information Architecture Introduction Making a new WordPress theme from scratch can seem daunting, but it's pretty easy if you know the steps.…
Conversation Design for Google Assistant with Kimberly Harvey, Voice Interface Design, Google This is an excellent presentation about designing the interface to your system for use with google assistantThere are…
This is a short post detailing how to manually setup php fpm with apache on centos7. php fpm is a great solution (especially when used with nginx, but you may…
This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…
This is a simple Vega scanner tutorial for beginners on XSS scanning with vega scanner in kali linux. VEGA is an open-source web security scanner, written in java with a…
Tracking cryptocoin price changes can become difficult when you have more than a couple of coins. Fortunately there are a few altcoin exchanges and apps out there which can help…
I have a router running dd-wrt. sometimes the dd-wrt web ui crashes and you cant access the interface, but your WAN connection works, and you can still login via ssh…
There are a couple of different ways to install php7 on centos7 - Installing yum-plugin-replace and inline-replaceing the whole php subsystem seems to be the easiest way: You need to…
Ive completed my MSc Thesis! I was awarded a grade A (81%) and an MSc with distinction :D The abstract from my thesis is below: SQL injection vulnerabilities remain one…
Hardening ssl ciphers. I wrote a post previously about disabling sslv2 and enabling sslv3 and tlsv1. Times have changed since then, its been best-practice for a long time now to…
This post is a wapiti tutorial. You'll find various wapiti options, how to import wapiti scan results into metasploit and how you can disable wapiti modules to speed up your…
This post will show you how to setup dnsmasq in order to serve dns requests for (multiple) internal domains - using dnsmasq as an internal DNS server. Using this setup…
This is a quick post about importing nessus6 scan results into metasploit. This can be very useful for adding a ton of information into a new Metsploit database, or adding…
Multiple ip addresses on one physical NIC. I have a gigabyte brix running esxi to host a few virtualised servers. I have one server for my web development. I have…
What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…
This is a basic openvas tutorial for beginners. I will explain a little of how to use openvas web ui to perform a test of your systems. It will give…
This tutorial is a basic Kali linux arachni tutorial: to get arachni up and running on your kali linux system and perform a basic scan. Arahni is a vulnerability scanner…
This is a basic nikto tutorial for kali linux. It will get you started with nikto. For advanced usage, see 'man nikto' or the cirt website Nikto is a web…
Here is a selection of podcasts I subscribe to [RSS] PARANORMAL PODCAST[RSS] Practical Backpacking™ Podcast[RSS] Sasquatch Chronicles[RSS] The Unexplained with Howard Hughes[RSS] The Gralien Report[RSS] The Bigfoot Field Guide[RSS] The…
Jonathan Mitchell Portfolio About Me I have a BSc in Electronic Engineering, and an MSc in Advanced Computer Systems Development with Distinction. I was awarded the University Court Medal for…
Oracle forms overview. Oracle internet platform consists of 3 components: oracle application server (forms service + OC4J) oracle developer suite (forms developer + object navigator + form module) oracle database…
This is a very cool thing I just found in safari on osx mavericks. if you have your twitter account linked to your os [it asks you the first time…
While probably not the best platform to do web development on, an ipad can be used to create code for your website. I use my ipad mini (in emergencies) to…
pentesterlab.com is a very cool site. its built with bootstrap too ;) they have various exercises and assets for those exercises available. each exercise has a vmware image, so you…
The google plus app for iphone has been updated. now, rather than being just a wrapper to the mobile web version, it a native iphone app. it looks really good,…
This will show you how to use spotlight to search google and display the results in chrome, firefox or any other browser 1) open safari 2) go to preferences >…