The Ninja Ducky Toolkit is a set of basic scripts for setting up a means to exfiltrate data via USB keyboard implant devices (like the awesome and original Rubber Ducky from Hak5). You can retrieve th ...
After deploying the new HAK5 C2 Cloud instance on AWS LightSail (tutorial here), I found that my [easyazon_link keywords=”HAK5 KeyCroc” locale=”US” tag=”bobmckay-20″ ...
Updated 2 May 2022 Updated due to changes in the Microsoft 365 admin section To access DKIM now, you must: Login to the Microsoft 365 Defender Portal (AKA Security & Compliance Center) here: https ...
UPDATE: I wrote an updated version of this tutorial (as of July 2022) available here: https://bobmckay.com/i-t-support-networking/ethical-hacking/deploy-hak5-cloud-c2-on-aws-lightsail-2022/ So I treat ...
I’ve created an updated version of my original Raspberry Pi 3 Honey Pot tutorial after I discovered it does work with newer versions of the Linux operating systems. After banging my ahead agains ...
Update: July 2023, I’ve also uploaded a sheet for teachers and parents to give to their kids of sample codes to break. They are simply but get progressively harder, download it here: Caeser-Cip ...
UPDATED Jan 2021: A few tweaks required for Kali 2020.4 distribution I’ve always found installing Dropbox on Kali linux a bit hit-and-miss but the more recent distributions of Kali linux seem to ...
After a few months off, I decided to update my Kali laptop today and return to some ethical hacking shenanigans and also to see if the frustrating bug present in OpenVas 8 was still there (where you c ...
As we all know, one of the biggest threats/risks to an organisations security are its users – every presentation you see has the ‘surprising’ statistic of just how many breaches star ...
Somewhere along the way in delving in to cyber security, I’ve also gained an interest in encryption. While this might seem obvious, I’m more interested in the classical cryptography such a ...