Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Website

  1. Home>
  2. Blog>
  3. Website
Read more about the article What happens when everybody’s website is fixed

What happens when everybody’s website is fixed

  • Post author:jonathansblog
  • Post published:August 28, 2019
  • Post category:Turing Fest 2019
  • Post comments:0 Comments

by jonoalderson Everything is changing, except peoples businesses.

Continue ReadingWhat happens when everybody’s website is fixed
Read more about the article Culture

Culture

  • Post author:jonathansblog
  • Post published:August 28, 2019
  • Post category:Turing Fest 2019
  • Post comments:0 Comments

Im listening to a great talk about culture inside a company - aira.net defining culture: you have to address the culture and define what you want it to be, it…

Continue ReadingCulture
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

OS Detection Techniques

  • Post author:jonathansblog
  • Post published:July 14, 2019
  • Post category:jonathansblog/Methodology/Pentest
  • Post comments:0 Comments

Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…

Continue ReadingOS Detection Techniques
Read more about the article NCSC Excercise in a box launch

NCSC Excercise in a box launch

  • Post author:jonathansblog
  • Post published:April 25, 2019
  • Post category:CYBERUK19
  • Post comments:0 Comments

Online tool to help you judge your cyber resilience and provide training The tool is available on the NCSC website. It's available for free and helps an organisation practice in…

Continue ReadingNCSC Excercise in a box launch
Read more about the article Kioptrix Walkthrough Guide

Kioptrix Walkthrough Guide

  • Post author:jonathansblog
  • Post published:April 19, 2019
  • Post category:Kali Linux/OSCP/Pentest
  • Post comments:0 Comments

I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…

Continue ReadingKioptrix Walkthrough Guide
Website crawler software kali linux

Website crawler software kali linux

  • Post author:jonathansblog
  • Post published:April 13, 2019
  • Post category:jonathansblog/Kali Linux/Metasploit/Pentest/SEO
  • Post comments:1 Comment

Spidering a web application using website crawler software in kali linux There are lots of tools to spider a web application (an companies which are based on this tech, eg…

Continue ReadingWebsite crawler software kali linux
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

WordPress Security

  • Post author:jonathansblog
  • Post published:March 20, 2019
  • Post category:jonathansblog/Pentest/Wordpress
  • Post comments:0 Comments

This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…

Continue ReadingWordPress Security
Metasploit for website pentest

Metasploit for website pentest

  • Post author:jonathansblog
  • Post published:February 13, 2019
  • Post category:jonathansblog/Kali Linux/Metasploit/Pentest
  • Post comments:1 Comment

Metasploit for website pentest using wmap. This is a short tutorial on using the wmap module inside metasploit. Wmap is a web application scanner that runs within metasploit. We can…

Continue ReadingMetasploit for website pentest
Read more about the article How to use metasploit to scan for vulnerabilities

How to use metasploit to scan for vulnerabilities

  • Post author:jonathansblog
  • Post published:August 28, 2018
  • Post category:Commandline/jonathansblog/Kali Linux/Linux/Metasploit/Networking/Pentest
  • Post comments:1 Comment

Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…

Continue ReadingHow to use metasploit to scan for vulnerabilities
  • 1
  • 2
  • 3
  • 4
  • …
  • 6
  • Go to the next page

Latest Posts

  • Securing an Agile World – NatWest
  • 2023 State of Operational Technology
  • DIGIT EXPO 2023
  • Kali purple cross-grade
  • Testing an API for hackers
  • subdomains brute force enum and finding tools
  • Vagrant for Beginners
  • Regular Software Updates: The Foundation of Mac Security
  • Understanding Gatekeeper: Controlling App Installations on macOS
  • User Account Management for Enhanced macOS Security
  • Data Encryption on macOS: Keeping Your Files Secure
  • Brewdog Rattle & Rum
  • Safe Browsing: Protecting Your Mac from Online Threats
  • Mead
  • Firewall Configuration and Management on macOS

Popular Posts

  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Linux commands for networking with command line
  • Wapiti tutorial
  • 4 types of service in an SOA system
  • OpenVas tutorial for beginners using web and metasploit
  • Nikto tutorial for kali linux
  • How to enable spotlight indexing on a network drive
Mastodon
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - OceanWP Theme by OceanWP