The Office: Doomsday Device Writeup
Posted on March 8, 2023
| 11 minutes
| 2200 words
Disclaimer: This post demonstrates hacking techniques and could be considered dangerous. I’m doing this for my own personal research using freely available tools and information, and testing against a vulnerable machine specifically designed for security assessments that has been installed in my own personal lab isolated from the public Internet. Please do not use these techniques against any computer system that you either do not own or do not have permission to work on.
[Read More]
EternalBlue
Posted on December 29, 2022
| 2 minutes
| 340 words
Disclaimer: This post demonstrates hacking techniques and could be considered dangerous. I’m doing this for my own personal research using freely available tools and information, and testing against a vulnerable machine specifically designed for security assessments that has been installed in my own personal lab isolated from the public Internet. Please do not use these techniques against any computer system that you either do not own or do not have permission to work on.
[Read More]
Rickdiculously Easy Writeup
Posted on December 10, 2022
| 5 minutes
| 932 words
Disclaimer: This post demonstrates hacking techniques and could be considered dangerous. I’m doing this for my own personal research using freely available tools and information, and testing against a vulnerable machine specifically designed for security assessments that has been installed in my own personal lab isolated from the public Internet. Please do not use these techniques against any computer system that you either do not own or do not have permission to work on.
[Read More]
WebDeveloper 1 Writeup
Posted on December 10, 2022
| 5 minutes
| 953 words
Disclaimer: This post demonstrates hacking techniques and could be considered dangerous. I’m doing this for my own personal research using freely available tools and information, and testing against a vulnerable machine specifically designed for security assessments that has been installed in my own personal lab isolated from the public Internet. Please do not use these techniques against any computer system that you either do not own or do not have permission to work on.
[Read More]
Kioptrix Writeup
Posted on December 6, 2022
| 10 minutes
| 1957 words
Disclaimer: This post demonstrates hacking techniques and could be considered dangerous. I’m doing this for my own personal research using freely available tools and information, and testing against a vulnerable machine specifically designed for security assessments that has been installed in my own personal lab isolated from the public Internet. Please do not use these techniques against any computer system that you either do not own or do not have permission to work on.
[Read More]
Vulnerability Scanning with Nessus
Posted on December 6, 2022
| 3 minutes
| 526 words
Tenable Nessus is an industry standard vulnerability scanner that can be installed for free for basic network scanning. I’ve also had the opportunity to deploy Nessus agents across a fleet of hundreds of Linux servers and run extensive scans from Tenable cloud.
In this article I’ll describe setting up Nessus in Linux to scan remote hosts. Having knowledge of the vulnerabilities present in your environment is critical in defending against Cyber attack.
[Read More]
Keeping your WordPress site secure
Posted on September 4, 2021
| 7 minutes
| 1370 words
WordPress currently powers over 40% of the Web which is a massive number of Websites. One of the key selling points for using WordPress is how easy it is to get started, particularly for non-technical people.
I started using WordPress around 2008 as an easy way to build websites for clients because I could easily install a site in a few clicks of the cPanel and install one of many free themes in the WordPress directory.
[Read More]
Testing the security of your WordPress users
Posted on July 18, 2021
| 4 minutes
| 710 words
Disclaimer: This post demonstrates hacking techniques and could be considered dangerous. I’m doing this for my own personal research using freely available tools and information, and testing against a vulnerable machine specifically designed for security assessments that has been installed in my own personal lab isolated from the public Internet. Please do not use these techniques against any computer system that you either do not own or do not have permission to work on.
[Read More]