Using Wireshark: https://www.wireshark.org/ we break down extracting HTTP passwords from a packet capture file.
Linux Exploit Suggester; based on operating system release number. As the name suggests, this is a Linux Exploit Suggester, with no frills and no fancy features; just a simple script to keep track of vulnerabilities […]
What is Domain Isolation Domain Isolation separates members of a domain from those who don’t have domain credentials. This is achieved through the use of Active Directory and IPsec. These policies are enforced onto Domain […]
Terminator, IRobot, Wall-E and many other movies depict artificial intelligence going rouge and taking a stand against humanity. For right now though we have robots that work in warehouses and ones that clean floors while […]
This is a short script I put together that allows for easy creation of Apache Virtual Host along with a new attached user. #!/bin/bash echo “Enter Username:” read username echo “Enter URL:” read url useradd […]
Metasploit Start the Metasploit console with msfconsole The first time you run Metasploit it needs to build its database and initialize all of its exploits so it will take a few minutes to initially startup. […]
What is a mac address? MAC stands for “Media Access Control”. To summarize is a unique identifier thats embedded onto the ROM of the network interface card. On networks the mac address is whats used […]
This is the first a few tutorials I will be posting based on GPG. http://www.gnupg.org/ What is GNU Privacy Guard: GPG is an encryption technology. Its first version was designed in 1991 as a public […]