Phishing Catcher by x0rz

Recently I was shown a tool by a friend that I can honestly say left me in awe of its simplicity, yet how powerful it could be. Working in technical support for sometime means I have lost count of the number of people I have come across who have fallen for phishing scams. One method…

Initial Steps with Nmap

Browsing through the many tools a good pen tester needs, nearly all other tools refer to Nmap. This isn’t surprising as at its core; Nmap is primarily about finding intelligence on a target, such as what services and ports are running and how aggressive the firewall protecting it, if any, may be. While on the…

Vault 8

Shortly before the weekend Wikileaks published Vault 8, their analysis and the source code they used as part of their Vault 7 leaks that document how the CIA execute their cyber offence strategy. As the days go by and more people are given a chance to analyse and review the source code contained as part…

Setting Up

As a template I’ve been following Penetration Testing: A Hands-On introduction to Hacking by Georgia Weidman, so have been attempting to install the tools mentioned in the book. The major one being Kali Linux. Pairing this with the free Virtual Box on my MacBook Air is a great way of still being able to use macOS and all…

First

For a few weeks I’ve been focusing on improving my skills within the field of penetration testing and after getting some advice, it was recommend I started my own blog to document what I’m doing and also to share some of the challenges I’m having. As time goes on I intend for this blog to…