I always liked the idea of a cost-effective honey pot that could be dropped on to a physical network with the minimum of fuss. As is cost-effective host which, combined with a and the OpenCanary soft ...
As we all know, one of the biggest threats/risks to an organisations security are its users – every presentation you see has the ‘surprising’ statistic of just how many breaches star ...
I came across a product on Amazon today that I clicked on for entertainment because I assumed it was satirical but much to my dismay, it turned out to be 100% real. It’s a product called the , b ...
So you want to tinker with Kali Linux huh? This aims to be a (very) brief quick start guide and it assumes you have installed Kali on a machine, on a bootable kali USB drive or in a virtual environme ...
IMPORTANT NOTE: At the time of writing, Metasploitable 2 has no synthetic drivers for Hyper-V and so cannot communicate with the server via a virtual switch, even using the drives from the Linux Integ ...
There’s a slight stir in the media of late about a vulnerability discovered in the Remote Desktop Services service on Microsoft Windows systems. It’s CVE reference is CVE-2019-0708 but is ...