Overview As part of reconnaissance stage of a pentest, you may wish to capture home pages of an organizations’ websites. One option to do just that is HTTPscreenshot. HTTPscreenshot has been toute...
Working with httpscreenshot
Overview As part of reconnaissance stage of a pentest, you may wish to capture home pages of an organizations’ websites. One option to do just that is HTTPscreenshot. HTTPscreenshot has been toute...
Securing SSH
Secure Shell or SSH is a cryptographic network protocol that operates at the application layer of the OSI model. Its typical usage is for remote access to Unix systems. SSH was developed as a repla...
Securing SSH
Secure Shell or SSH is a cryptographic network protocol that operates at the application layer of the OSI model. Its typical usage is for remote access to Unix systems. SSH was developed as a repla...
Browsing Anonymously With Tor
Overview Looking to browse the internet “anonymously” using off-the-shelf hardware? Heading down to your local coffee shop to “borrow” wifi to upload the latest ISIS targets is no longer a viable ...
Browsing Anonymously With Tor
Overview Looking to browse the internet “anonymously” using off-the-shelf hardware? Heading down to your local coffee shop to “borrow” wifi to upload the latest ISIS targets is no longer a viable ...
Centralizing syslog data
Overvie I recently set up a few servers out in “the cloud.” I needed a way to ship all the logs generated by these hosts to my splunk instance. Since shipping raw syslog data across the internet is...
Centralizing syslog data
Overvie I recently set up a few servers out in “the cloud.” I needed a way to ship all the logs generated by these hosts to my splunk instance. Since shipping raw syslog data across the internet is...
Offline Windows Password Reset
Recently, I had to reset a user account password on an Acer netbook. Recovery can take some time, unless you have the right tools such as hashcat and a few gtx 780 TI cards laying around. Resetting...
Offline Windows Password Reset
Recently, I had to reset a user account password on an Acer netbook. Recovery can take some time, unless you have the right tools such as hashcat and a few gtx 780 TI cards laying around. Resetting...