Blog
2024
Hostpital
·354 words·2 mins·
loading
·
loading
Yapping-Journaling
Life
Trouble
Sanity
At home, W.
Spaceship
·818 words·4 mins·
loading
·
loading
Yapping-Journaling
Life
Trouble
Sanity
On the drive back work the White Rabbit saw fellow rabbits on the way like he always does which gave him the idea to feed them carrots on a next visit.
Part 7 Advanced Network Penetration Testing Post Exploitation
·2946 words·14 mins·
loading
·
loading
Walkthrough
Networking
Love
Yapping-Journaling
Disclaimer : This blog post is a work of fiction.
16 06 2024 Love
·1159 words·6 mins·
loading
·
loading
Yapping-Journaling
Love
Life
Trouble
Noise
Hello friend,
Part 6 All on Networking Penetration Baby
·3977 words·19 mins·
loading
·
loading
Walkthrough
Networking
Password-Attacks
Another sunny day here down the sea front, slight morning breeze, have a runny nose and sunsets are starting to look purple which are quite the site.
Part 5 Understanding Reverse and Binding Shell
·1064 words·5 mins·
loading
·
loading
Walkthrough
Networking
Shells
Hey it’s me again , I know you’ve been missing me and I have to same to you as well.
Part 4 Performing Vulnerability Assessments
·1379 words·7 mins·
loading
·
loading
Walkthrough
OSINT
Vulnerability
Ever wondered what would be an effective way to find vulnerabilities within your organisational systems with easeļ¹ Well in this section I will be covering vulnerability scanners for overall systems and websites which provide amazing reports within minutes!
Part 3 Exploring Active Reconnaissance Techniques
·1327 words·7 mins·
loading
·
loading
Walkthrough
OSINT
DNS
Scratching the surface of the vast world of active recon, exploring tools which provide juicy information such as nmap, metasploit, netdiscover and more.
Part 2 Reconnaissance and Footprint
·1163 words·6 mins·
loading
·
loading
Walkthrough
OSINT
Anonymity
Techniques to avoid traces back to identity, browsing the web to collect information on a target and social media account leaks.
Part 1 Building a Penetesting Lab
·709 words·4 mins·
loading
·
loading
Walkthrough
Lab
Pentesting
Building virtual machines, installing Kali Linux, Metasploitable 2&3, OWASP web applications and windows machines for advanced testing.