Somewhere along the way in delving in to cyber security, I’ve also gained an interest in encryption. While this might seem obvious, I’m more interested in the classical cryptography such a ...
I came across a product on Amazon today that I clicked on for entertainment because I assumed it was satirical but much to my dismay, it turned out to be 100% real. It’s a product called the , b ...
So you want to tinker with Kali Linux huh? This aims to be a (very) brief quick start guide and it assumes you have installed Kali on a machine, on a bootable kali USB drive or in a virtual environme ...
I thought I’d write a quick update guide on installing Kali Linux from USB as I’m hoping to encourage more friends to install an instance and start playing. This guide assumes you’re ...
IMPORTANT NOTE: At the time of writing, Metasploitable 2 has no synthetic drivers for Hyper-V and so cannot communicate with the server via a virtual switch, even using the drives from the Linux Integ ...
There’s a slight stir in the media of late about a vulnerability discovered in the Remote Desktop Services service on Microsoft Windows systems. It’s CVE reference is CVE-2019-0708 but is ...
As I’ve done previously when writing articles about exploits and/or vulnerabilities I’ve had to design a logo as I couldn’t find a royalty free version to use for myself. As before, ...
Its with a (slightly) heavy heart I write this as I’m a fan boy of ‘s networking gear. For those that don’t know, put business-class networking firmly in the consumer price bracket. ...
If you receive the following error message when install Kali Linux from a USB drive: Your installation CD-ROM couldn’t be mounted. This probably means that the CD-ROM was not in the drive. If ...