Latest Posts

  • Trending

    How To Setup Your Terminal For Pentesting

    As a penetration tester, you will be spending most of your time working in the Linux terminal, as a result, it is vitally important to know how to set up your terminal to be as efficient as possible so as to improve your efficiency and workflow. In this case, we will be taking a look […] More

  • Docker Security Essentials eBook

    This eBook focuses on securing the Docker platform on Linux. Follow along with the techniques demonstrated in this guide. All you need is a Linux server with Docker installed. The eBook is structured and organized as follows: In The Docker Platform section, we will begin the process by explaining the various components that make up the Docker […] More

  • How To Secure phpMyAdmin

    What is phpMyAdmin? phpMyAdmin is a free, open-source, and cross-platform PHP based web application that offers a simple, powerful, and convenient browser-based GUI for interacting and working with MySQL databases It makes the process of creating, modifying, and configuring MySQL databases simpler and much more efficient. Why should you secure phpMyAdmin? phpMyAdmin is widely adopted […] More

  • Trending

    Docker Security Best Practices

    What is Docker? Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries, and configuration files; they can communicate with each other through well-defined channels. It is a platform as a service […] More

  • Cybertalk – EP10 – Interview With GhostSec

    In this episode, we will be interviewing the co-founder of GhostSec, GhostSec is a vigilante hacking group that has been active for a while and gained mainstream notoriety in 2015 when they shut down and defaced hundreds of ISIS websites and social media accounts in the wake of the Charlie Hebdo attacks that took place […] More

  • DEF CON DC9111 – Docker For Pentesting & Bug Bounty Hunting

    In this presentation, I explain the importance of Docker and how it can be utilized for pentesting & bug bounty hunting. I also showcase how to set up Kali Linux, OWASP Juice Shop & Bug Bounty Toolkit on Docker. Docker is a set of platform as a service products that use OS-level virtualization to deliver […] More

  • Docker Security Course

    Docker is an incredibly popular platform to quickly create, deploy and host web applications, databases, and other business-critical solutions. The adoption of Docker continues to grow by companies and organizations, and raises an important question, how should users better secure their Docker containers? The process of securing Docker is multi-faceted and requires a procedural approach […] More

  • Trending

    Open Source Computer Science Degree

    The OSSU curriculum is a complete education in computer science using online materials. It’s not merely for career training or professional development. It’s for those who want a proper, well-rounded grounding in concepts fundamental to all computing disciplines, and for those who have the discipline, will, and (most importantly!) good habits to obtain this education largely on their own, […] More

  • HackerSploit & Linode: Securing Commonly Web Apps & Databases

    Learn how to secure web applications and databases Join us for our latest Linode LIVE series, Securing Commonly Used Web Apps.  We’ve invited HackerSploit back for this two-part series covering securing your web pages, databases, and server management tools. When deploying web applications and services,  security should be evaluated throughout. A solid understanding of the fundamentals […] More

  • Linode LIVE! HackerSploit: Linux Server Security Series

    Secure Your Personal Linux Servers with HackerSploit Event Website This 12-episode Linux Security series will work as a practical guide for anyone that wants to learn how to effectively secure their servers. At a high level, viewers will learn how to set up, secure, and audit Linux servers. HackerSploit: Linux Security Server Series Part 1 […] More

  • Linux Security Auditing With Lynis

    Installing Lynis Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives. It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening. Lynis is available as a package for most Linux distributions, we […] More

  • Trending

    SSH Brute-force Protection With Fail2Ban

    Fail2Ban is an intrusion prevention framework written in Python that protects Linux systems and servers from brute-force attacks. We can set up Fail2Ban to provide brute-force protection for SSH on our server, this will ensure that the server is secure from brute-force attacks and it also allows us to monitor the strength of the brute-force […] More

  • OverTheWire Bandit – Level 0 – 6

    The OverTheWire Bandit wargame is aimed at absolute beginners. It will teach the basics needed to be able to play other wargames. Link: https://overthewire.org/wargames/bandit/ This wargame is focused on Linux essentials and is a great way to learn and practice your Linux skills. Note for beginners This game, like most other games, is organized in […] More

  • Cybertalk – EP8 – Better Bug Bounty Hunting & Reverse Engineering

    Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below.   Google form (Post your questions here): YouTube Channel: […] More

  • HackTheBox Devel – Walkthrough

    In this walkthrough, I will be taking you through some intermediate Windows exploitation and privilege escalation. The machine we will be targeting is called Devel, this is an intermediate box that requires a good understanding of enumeration, generating payloads with Msfvenom and Windows privilege escalation. From the machine matrix, we are able to deduce that […] More

  • HackTheBox Legacy – Walkthrough

    In this walkthrough, I will be taking you through the basics of Windows enumeration and exploitation. The machine we will be targeting is called Legacy, this is a fairly easy machine to exploit and is recommended for beginners to pentesting as it offers a quick and simple way to get your hands dirty with tools […] More

  • Trending

    HackTheBox Lame – Walkthrough

    In this walkthrough, I will be taking you through the basics of Linux enumeration and exploitation. The machine we will be targeting is called Lame, this is a fairly easy machine to exploit and is recommended for beginners to pentesting as it offers a quick and simple way to get your hands dirty with tools […] More

  • How To Convert VDI To VMDK

    This guide is aimed at helping you migrate your virtual machines from VirtualBox to VMware. By default, VirtualBox utilizes the VDI (Virtual Disk Image) format for storage, whereas VMware uses the VMDK format, this can make migrating from one hypervisor to another quite cumbersome as you will have to reinstall/reconfigure your VM’s. However, we can […] More

  • Trending

    Nmap – Scan Timing & Performance

    Nmap – Scan Timing & Performance Nmap allows you to speed up and slow down scans based on the type of environment you are working in or targeting. This is very important as you may be dealing with network/business-critical infrastructure that might not be able to handle heavy/noisy scans, on the other hand, you may […] More

Load More
Congratulations. You've reached the end of the internet.
Back to Top