Metasploit for website pentest
Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…
Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
It turns out that coding in php on android is possible (even if its not as good as on a mac, linux or even windows). In this blog post I'll…
Making a WordPress Theme. From Scratch. Research + Information Architecture Introduction Making a new WordPress theme from scratch can seem daunting, but it's pretty easy if you know the steps.…
Conversation Design for Google Assistant with Kimberly Harvey, Voice Interface Design, Google This is an excellent presentation about designing the interface to your system for use with google assistantThere are…
This is a short post detailing how to manually setup php fpm with apache on centos7. php fpm is a great solution (especially when used with nginx, but you may…
This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…
This is a simple Vega scanner tutorial for beginners on XSS scanning with vega scanner in kali linux. Vega is an open-source web vulnerability scanner designed for finding security issues…