This is a simple guide on how to change GRUB …
Read More »
November 18, 2020
How to install the noip2 on Ubuntu and run via systemd systemctl (noIP Dynamic Update Client)
This post attempts to fix that problem by installing required packages to run the make command, inst…
April 23, 2020
Accessing ESXi console screen from an SSH session
I’ve had this issue many times where Firewall ports to iDrac, iLo or RSA were not open and I c…
April 23, 2020
Accessing the RAID setup on an HP Proliant DL380 G7
When the HP Proliant DL380 G7 boots up the only displayed BIOS options are F9 for Setup, F11 for the…
October 7, 2019
Change IP address in packet capture file (faking IP)
I'm sure you bumped into situations where you needed to fake IP address in a capture file. This mayb…
September 25, 2019
SamSam Ransomware
The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Cent…
September 24, 2019
New Exploits for Unsecure SAP Systems
A presentation at the April 2019 Operation for Community Development and Empowerment (OPCDE) cyberse…
September 23, 2019
Microsoft Operating Systems BlueKeep Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this Activity Alert to provid…
April 24, 2019
A .vimrc config file everyone should use
Ever had that issue when you login to a Linux terminal, editing a file and the texts are just blue a…
April 19, 2019
Remove cloud-init from Ubuntu
Cloud images are operating system templates and every instance starts out as an identical clone of e…
January 8, 2019
How to Prevent DOM-based Cross-site Scripting
There’s no denying the role that JavaScript has played in making web applications the sleek, interac…
Recent Posts
-
Advantages disadvantages of using Proxy vs VPN vs TOR vs TOR and VPN together.
What makes you truly anonymous and leaves next to no …
Read More » -
A very detailed guide on how to setup VPN on Kali Linux and Ubuntu
-
Enable VPN on Kali Linux – fix VPN grayed out problem
-
Free VPN providers of 2015
-
How to Install Google Chrome in Kali Linux? – Part 3 – Running Chrome
Continued from How to Install Google Chrome in Kali Linux? …
Read More » -
A detailed guide on installing Kali Linux on VirtualBox
-
How to install CAL++ in Kali Linux?
-
Auto login root user at system start in Kali Linux – GNOME and KDE
-
Cyber Actors Target Home and Office Routers and Networked Devices Worldwide
DHS and FBI recommend that all SOHO router owners power cycle …
Read More » -
Wireless WPA2 password cracking using KRACK attacks
-
802.11 Recommended USB Wireless Cards for Kali Linux
-
Cracking WPA2 WPA with Hashcat in Kali Linux (BruteForce MASK based attack on Wifi passwords)
-
Kali Linux Cheat Sheet for Penetration Testers
Penetration testing (also called pen testing) is the practice of …
Read More » -
Find Linux Exploits by Kernel version
-
Side-Channel Vulnerability Variants 3a and 4 – Spectre and Meltdown
-
FBI hacked iPhone and wont disclose details
-
Automatically crack WiFi password with besside-ng
besside-ng is a tool like Wesside-ng but it support also …
Read More » -
SecLists – Security Tester’s Companion
-
Forging ARP, UDP, ICMP or custom packets with packetforge-ng
-
Automated Penetration Testing with APT2 Toolkit
-
Crack a WEP key of an open network without user intervention with Wesside-ng
-
A .vimrc config file everyone should use
Ever had that issue when you login to a Linux …
Read More » -
Kill all matching processes on Windows from command prompt
-
Find exact installation date of Linux
-
Mass delete files in FTP server
-
PuTTY alternatives