The Ninja Ducky Toolkit is a set of basic scripts for setting up a means to exfiltrate data via USB keyboard implant devices (like the awesome and original Rubber Ducky from Hak5). You can retrieve th ...
After deploying the new HAK5 C2 Cloud instance on AWS LightSail (tutorial here), I found that my wouldn’t connect if I had https enabled on my C2 instance. I didn’t feel comfortable not u ...
Updated 2 May 2022 Updated due to changes in the Microsoft 365 admin section To access DKIM now, you must: Login to the Microsoft 365 Defender Portal (AKA Security & Compliance Center) here: https ...
UPDATE: I wrote an updated version of this tutorial (as of July 2022) available here: https://bobmckay.com/i-t-support-networking/ethical-hacking/deploy-hak5-cloud-c2-on-aws-lightsail-2022/ So I treat ...
I’ve created an updated version of my original Raspberry Pi 3 Honey Pot tutorial after I discovered it does work with newer versions of the Linux operating systems. After banging my ahead agains ...
UPDATED: 24th July 2021, I updated the design to fix the inner/outer ring label, to tweak the sizing and to add paper tabs to the outer ring that can hold the inner ring for those that don’t hav ...
UPDATED Jan 2021: A few tweaks required for Kali 2020.4 distribution I’ve always found installing Dropbox on Kali linux a bit hit-and-miss but the more recent distributions of Kali linux seem to ...
After a few months off, I decided to update my Kali laptop today and return to some ethical hacking shenanigans and also to see if the frustrating bug present in OpenVas 8 was still there (where you c ...
As we all know, one of the biggest threats/risks to an organisations security are its users – every presentation you see has the ‘surprising’ statistic of just how many breaches star ...
Somewhere along the way in delving in to cyber security, I’ve also gained an interest in encryption. While this might seem obvious, I’m more interested in the classical cryptography such a ...