The Ninja Ducky Toolkit is a set of basic scripts for setting up a means to exfiltrate data via USB keyboard implant devices (like the awesome and original Rubber Ducky from Hak5). You can retrieve th ...
Last year I wrote on article on deploying the C2 application on AWS LightSail, as a number of things have changed since then, including an updated version of the application, I thought I’d updat ...
UPDATE: I wrote an updated version of this tutorial (as of July 2022) available here: https://bobmckay.com/i-t-support-networking/ethical-hacking/deploy-hak5-cloud-c2-on-aws-lightsail-2022/ So I treat ...
I’ve created an updated version of my original Raspberry Pi 3 Honey Pot tutorial after I discovered it does work with newer versions of the Linux operating systems. After banging my ahead agains ...
I’ve returned to HTB recently after a lack of ethical hacking and decided to dip my toe in the water with their “Starting Point” series of challenges. I thought I’d do a write ...
A common frustration for Kali Linux users when they create a VPN connection to Hack The Box is that often, Internet access disappears like a fart in the wind. It’s often more of a nuisance than ...
I always liked the idea of a cost-effective honey pot that could be dropped on to a physical network with the minimum of fuss. As is cost-effective host which, combined with a and the OpenCanary soft ...
After a few months off, I decided to update my Kali laptop today and return to some ethical hacking shenanigans and also to see if the frustrating bug present in OpenVas 8 was still there (where you c ...
As we all know, one of the biggest threats/risks to an organisations security are its users – every presentation you see has the ‘surprising’ statistic of just how many breaches star ...