Google Cloud Shell [Link] – Free cloud service that allows running shell commands on a Debian-based customized distribution. This service […]
Installing Hak5 C2 3.1.1 in a Docker
Running Hak5 C2 with HTTPS will required ports 80 and 443 necessarily, changing the listening ports will not work. To […]
Web App Penetration Testing
Burp Suite is the main tool for Web App pentesting and it is very often used with the FoxyProxy add-on […]
SNMP and SYSLOG on Cisco Devices
Enabling SNMPv2c on a Cisco Router, for example. enable configure terminal snmp-server community PASSWORD_STRING ro snmp-server community PASSWORD_STRING rw Now […]
PHP / SQL Injection Prevention
Basic usage of the main PHP native functions. See PHP documentation for more details, examples and versions that they apply. […]
Creating a Service for “rc.local” to Run Script on Startup (Boot)
There are some ways to run a script, application, or command when the system loads. The easiest way is to […]
Port-Secutiry on Cisco Devices
Showing the current configuration before starting: do show vlan brief do show mac address-table do show mac address-table int g0/1 […]
How to Crack WIFI: WEP and WPA/WPA2
This whole blog and including this post is just for educational purposes and do not do anything to a WIFI […]
RIPng (IPv6) on Cisco Devices
Just go the all the routers that are directly connected and in each interface enable as follows making sure all […]