Since Microsoft started planning and building Windows 10, they’ve been talking to a lot of users about what users would like to see in Windows to make it a great place for users to build awesome apps, sites and services for all platforms and all devices. Many users told Microsoft that …
Read More »Android vulnerability allows attackers root access
In an Android Security Advisory issued on March 18th, Google revealed it was notified of at least one unidentified rooting app available in Google Play and third-party marketplaces using a local elevation of privilege vulnerability in the Linux kernel of Android devices. This Android vulnerability advisory was published just before …
Read More »Handy MySQL Commands
I’ve compiled a list of handy MySQL commands that I use very frequently in a headless server. I am not a MySQL guru, so I decided to braindump everything in here. This covers random issues from WordPress slowness, Query Cache Modification, User Creation, Database dumping and importing, rsync’ing large files …
Read More »Use arp-scan to find hidden devices in your network
The Address Resolution Protocol uses a simple message format containing one address resolution request or response. The size of the ARP message depends on the upper layer and lower layer address sizes, which are given by the type of networking protocol (usually IPv4) in use and the type of hardware …
Read More »Evade monitoring by IP spoofing in Kali Linux with torsocks
torsocks allows you to use most applications in a safe way with TOR. It ensures that DNS requests are handled safely and explicitly rejects any traffic other than TCP from the application you’re using. In this post we will cover IP spoofing in Kali Linux with torsocks which will allow users …
Read More »