Gutenberg Plugin: Terminal Display
Currently building a Gutenberg plugin to display Parrot OS terminal output.
Github: https://github.com/mrjamiebowman/Gutenberg-Terminal-Display
Parrot Security OS
Parrot Security OS
┌───└──╼ $ nmap -sV 127.0.0.1(Gutenberg Terminal Display)
BlackArch Default Login / Password
BlackArch Linux is a distro that is focused on pen-testing and hacking. This distro includes over 2,300 tools for pen-testing.
User: root
Password: blackarch
Changing Your Password
To bring up a terminal you will need to...
UFW VPN KillSwitch
This script will force all traffic through the tunneling adapter and deny traffic through Wi-Fi or ethernet.
https://gist.github.com/mrjamiebowman/b139da2092409054452c4b1249c0f787
https://gist.github.com/mrjamiebowman/b139da2092409054452c4b1249c0f787.js
CTF: PwnLab Init Walkthrough
https://www.vulnhub.com/entry/pwnlab-init,158/
In this walkthrough, I'll be using Parrot OS. I'll break each vulnerability down and explain it. The video won't demonstrate all of the techniques that could have been applied. I will also list the techniques I've learned from others.
Exploits / Techniques
Get the version of Parrot OS
There are several ways to identify the version of Parrot OS.
The easiest way to get the version of Parrot OS is to use a Linux command
(Terminal)
Another way to access the version...
https://www.youtube.com/watch?v=R6khqRpVHes
"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us."
Hector Monsegur "Sabu" talks about hacking Tunisia and how they shut down an entire country's Internet.
As a hacktivist group, Anonymous went after Tunisia because they were doing suspicious things to...
Can you trace an IP Address to a hacker?
This is a very open-ended question with a lot of variables that come into play. Depending upon how skilled the hacker is, determines how and if the hacker can mask or hide their true identity. It's also very critical to know exactly when the hacker...
Attempted Hack
I was recently looking through some docker logs for a web server container and I saw some suspicious commands being passed to the web server. It was very obvious with a quick glance that it was a hacker trying to compromise the web server. Out of curiosity, I decided to reverse engineer...