45.3 F
High Point
Gutenberg Plugin: Terminal Display Currently building a Gutenberg plugin to display Parrot OS terminal output. Github: https://github.com/mrjamiebowman/Gutenberg-Terminal-Display Parrot Security OS Parrot Security OS ┌───└──╼ $ nmap -sV Terminal Display)
BlackArch Default Login / Password BlackArch Linux is a distro that is focused on pen-testing and hacking. This distro includes over 2,300 tools for pen-testing. User: root Password: blackarch Changing Your Password To bring up a terminal you will need to...
UFW VPN KillSwitch This script will force all traffic through the tunneling adapter and deny traffic through Wi-Fi or ethernet. https://gist.github.com/mrjamiebowman/b139da2092409054452c4b1249c0f787 https://gist.github.com/mrjamiebowman/b139da2092409054452c4b1249c0f787.js
CTF: PwnLab Init Walkthrough https://www.vulnhub.com/entry/pwnlab-init,158/ In this walkthrough, I'll be using Parrot OS. I'll break each vulnerability down and explain it. The video won't demonstrate all of the techniques that could have been applied. I will also list the techniques I've learned from others. Exploits / Techniques
Parrot OS
Get the version of Parrot OS There are several ways to identify the version of Parrot OS. The easiest way to get the version of Parrot OS is to use a Linux command (Terminal) Another way to access the version...
Hector Monsegur interview Operation Tunisiavideo
https://www.youtube.com/watch?v=R6khqRpVHes "We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us." Hector Monsegur "Sabu" talks about hacking Tunisia and how they shut down an entire country's Internet. As a hacktivist group, Anonymous went after Tunisia because they were doing suspicious things to...
Can you trace an IP Address to a hacker? This is a very open-ended question with a lot of variables that come into play. Depending upon how skilled the hacker is, determines how and if the hacker can mask or hide their true identity. It's also very critical to know exactly when the hacker...
Attempted Hack I was recently looking through some docker logs for a web server container and I saw some suspicious commands being passed to the web server. It was very obvious with a quick glance that it was a hacker trying to compromise the web server. Out of curiosity, I decided to reverse engineer...
Software Developer, Designer, WordPress, XRM, InfoSec, DevOps, Hapkidoist and Explorer


High Point
clear sky
45.3 ° F
50 °
41 °
61 %
1 %
59 °
63 °
47 °
43 °
36 °