RDPY is a Microsoft RDP Security Tool developed in pure Python with RDP Man in the Middle proxy support. This allows a user to record sessions and develop honeypot functionality. It supports both Microsoft RDP (Remote Desktop Protocol) protocol client and server side. RDPY supports standard RDP security layer, RDP …
Read More »Buffer overflow attack in Kali Linux
This is a great video made by Assistant Professor Dr Mike Pound on how to make yourself root user on a computer using a buffer overflow attack in Kali Linux. Assistant Professor Dr Mike Pound details how it’s done in the following video:
Read More »Format Linux USB Drive to recover full disk space in Windows 10
This is quite a common problem when you have a USB Disk that was used to burn a Bootable Linux distro is dd mode. You plug in the USB drive in Windows 10 (or any windows for that fact) and all you see is a Drive with zero MB disk …
Read More »Export VMware Workstation Virtual Network Settings
I am using VMware® Workstation 12 Pro and setup a very complex networking config with multiple NIC’s, DHCP, Host-Only and VLANs. I have 10 active VM’s that needs to setup a complex environment and most of these VM’s needs 3.5GB to 2GB RAM to run with 2vCPU each. I could …
Read More »Fix Java error Unsigned application requesting unrestricted access to system
Tried to login to one of my server that requires Java and immediately got this error: Unsigned application requesting unrestricted access to system. The following resource is signed with a weak signature algorithm MD5withRSA and is treated as unsigned After some research on Google I found that the root cause …
Read More »