Category: Linux

A Cyber Security Research Dumpsite

Infrastructure Pentesting: Databases

Databases store a lot of important information that businesses do not want to be accessed by unauthorized personal. There are also a lot of different database types that a cyber professional needs to be able to understand.

Metasploit Console

Msfconsole: Exploit/Multi/Handler To load Multi/Handler: use exploit/multi/handler show exploits – Lists the exploits you can run. show payloads – Lists the payloads you can execute on the exploited system. info exploit [exploit name] – Lists a description of a specific exploit + various options and requirements. info payload [payload name] – Lists a description of…
Read more

Web Application Part 1: Page Source and Directory Traversal

Page Source Review:  Viewing the source code within a web browser may identify hidden content or comments within the code that may infer more information about the end site or program logic. Example: Go to the web page, you can either right click and select page source or if you are using Mozilla you can…
Read more

Meterpreter Cheat Sheet

What is Meterpreter? Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime.

Msfvenom Cheat Sheet

A quick cheat sheet for Msfvenom

Metasploit

Developed by Rapid7, Metasploit is a project started in 2003 that provides information about security vulnerabilities and aids in penetration testing and Intrusion Detection System (IDS) signature development. Metasploit Framework is a tool for developing and executing exploit code against a remote target machine. Metasploit Framework was developed in Perl before being re-written in Ruby.…
Read more

Linux Terminal Cheat Sheet

A cheat sheet for the Linux commands that I run through. This is to be used as a quick reminder whenever I need it.

Honeypot: The Basics

A honeypot can be either very simple or very complex depending on your goals. In “Honeypot: The Basics”, I aim to provide a basic overall understanding of honeypots.

Graylog Installation Tutorial

Following the ELK tutorial, I wanted to try out a different log management/analysis tool. The next on the list that I wanted to try, without having to sell my kidney (Splunk) was Graylog. Therefore, in this simple Graylog installation tutorial – I will show how to install and configure Graylog to ingest Windows Event Logs…
Read more

Installing ELK and Beats on Linux and Windows

In this tutorial I aim to provide a clarification on how to install ELK on Linux (Ubuntu 18.04) and its Beats on Windows. I will also be providing configuration for each of the installation we make.