Parrot OS
Parrot OS Configuration This is how I set up my Parrot OS after installation. There are a few things I believe are missing that should be installed or done. I like to keep things as real as possible so this will be hackers set up. UFW VPN Kill Switch This script will disallow traffic through the ethernet and WiFi port and allow...
Customize PowerShell in Windows Terminal The all-new Windows Terminal is truly amazing and packed with many features. It is also fully customizable! I highly recommend configuring Windows Terminal to have a customized background and to install Oh My Posh. Setting a Custom Background If you go to the settings under Windows Terminal it will open a "settings.json" file that is editable. Settings Vim I'm a...
Ubiquiti Edgerouter Lite
Upgrading Firmware on a Ubiquiti Edgerouter Lite with SSH The Ubiquiti Edgerouter Lite provides the ability to create a virtual LAN (vLAN) for $129 dollars. This is a quality VPN solution that was highly recommend from someone who owns a data center. Seriously... well worth the money. Upgrading my router from firmware version 1.2 was difficult because there is a bug...
Command Line MySQL for Hackers Learning to connect to a MySQL server via command line is extremely useful in many situations especially for penetration testing. It's quick, easy to learn and the fastest way to get in. General MySQL CLI Connect to the Database This command will log you into the MySQL server with user "user" on host address 192.168.0.26. ┌───└──╼ $ nmap -sV...
Offensive .NET: theZoo If you've never heard of theZoo and you're in the security space with some .NET development skills this is a real treat for you. The GitHub repository, "theZoo", is a collection of binaries and source code of captured and caged malware. Digging through this I found some .NET malware that you may want to study. Most of...
Ethical Hacking Interview Questions My friend, and primary organizer of the GSO InfoSec meetup is currently trying to break into a Cyber Security career as a penetration tester. I've asked him to let me know what kind of questions they ask during interviews. I'll be posting those here... Q: How would you use nmap (or an equivalent tool) to scan a...
Docker for Pentesters Docker is truly one of the most fascinating changes to come to software development over the last 10 years. While the concept of containerization has been around since 1979; starting with the advent of chroot. Docker has revolutionized how containerization works. Docker made it easy to not only use containers but downloading fully functional environments can be...
How to Learn Really Fast! One of the hallmarks of my personality and best traits is that I'm a life-long-self-learner who has mastered and perfected the art of learning technology really fast. I have a very effective way of learning technologies rather quickly. This article is aimed at people who want to continuously grow within the IT-sphere. Awareness and Finding "The...
Offensive .NET: C# Reverse Shell https://www.youtube.com/watch?v=NqwpwusH6WU Creating a .NET C# reverse shell that is undetectable is very easy. In this example, I'm going to use BankSecurity's reverse shell that I forked. This is a real basic reverse shell. Some of the more advanced code will be obfuscated and do some sort of process injection which would include shellcode. I'll show you how...

SSH Tunneling

SSH Tunneling When you need to access a server/client behind a firewall that doesn't allow port forwarding you can use SSH tunneling to bypass that if an SSH server is running. Pivoting is a sneaky technique that hackers use to access computers, servers, and services behind firewalls. These examples will use OpenSSH. I think most examples don't explain this well...
Jamie Bowman
Software Architect

WEATHER

St Louis
clear sky
84 ° F
86.3 °
81.2 °
64 %
2.6mph
0 %
Tue
88 °
Wed
82 °
Thu
78 °
Fri
82 °
Sat
78 °

FOLLOW ME

354FollowersFollow
16SubscribersSubscribe

Random article