April 5, 2020
  • 5:30 pm Kaboom – Automatic Pentest Bash Script
  • 8:26 pm Archery – A Security Tool
  • 2:51 pm Commix – Automated All-in-One OS command injection and exploitation tool
  • 12:28 pm RouterSploit – Exploitation Framework for Embedded Devices
  • 12:23 pm Dunkin Donuts Hacked & User Information Stolen
nikto

Below is a helpful infographic for basic commands and usage with the tool Nikto

READ MORE
openvpn

How To Avoid DNS Leaks Within OpenVPN DNS leaks occur when DNS information is sent over insecure channels. This is usually the result of network configurations. Using sites such as the following you can check to see if you’re vulnerable to DNS leaks whilst using a VPN which could reveal you’re information https://www.dnsleaktest.com/ Add the […]

READ MORE

Using Wireshark: https://www.wireshark.org/ we break down extracting HTTP passwords from a packet capture file.

READ MORE

What is Domain Isolation Domain Isolation separates members of a domain from those who don’t have domain credentials. This is achieved through the use of Active Directory and IPsec. These policies are enforced onto Domain member computers and prevents computers outside of the domain from communicating with those within. Though they are isolated on the […]

READ MORE

Metasploit Start the Metasploit console with The first time you run Metasploit it needs to build its database and initialize all of its exploits so it will take a few minutes to initially startup. Once Metasploit initiates you will see the “msf > ” indicating you are ready to begin. First you can type the […]

READ MORE

What is a mac address? MAC stands for “Media Access Control”. To summarize is a unique identifier thats embedded onto the ROM of the network interface card. On networks the mac address is whats used for communication(ARP resolves IPs to mac adresses). Figures out what More Info: http://en.wikipedia.org/wiki/MAC_address How Is A Mac Address Assigned? Every […]

READ MORE

This is the first a few tutorials I will be posting based on GPG. http://www.gnupg.org/ What is GNU Privacy Guard: GPG is an encryption technology. Its first version was designed in 1991 as a public cryptographic system called “Pretty Good Privacy(PGP)”. Then it got rewritten and licensed under the Gnu Public License. This new system […]

READ MORE