Installing Kali Linux in VirtualBox

Kali Linux is a Debian-based Linux distribution aimed at advance Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security. It was released on the 13th March 2013 as a complete top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards. The first thing to get straight is if…

Find Cached WiFi Passwords in Windows

You don’t have to work long in a computer support role before you get the question ” What is my WiFi password” and this can sometimes mean, you have to reset the WiFi password on the router\access point, as the password is stared out for security reasons and then wait for the fall out of calls after. If there is a windows box still connected to the WiFi you can run the commands below…

Mr Robot:1 CTF Walkthrough

  Mr Robot: 1 CTF (Capture the Flag) is a downloadable Virtual Machine from Vulnhub.  Which is a site that has purposely built Virtual machines for you to hack. Each one varies in difficulty and allows you to hone your skills and even pick up new ones.   If your interested in giving it a go yourself, this Virtual Machine can be downloaded here https://download.vulnhub.com/mrrobot/mrRobot.ova Description: Based on the show Mr Robot. This VM has three…

Hacking Digital Billboards

About a month ago a member of hack forums called Gangs posted a tutorial on how to hack digital billboards with a simple SQL injection, I thought it cant be that simple and tested it out myself, To my surprise, even in 2016 SQL injection is still a valid attack vector on sites connected to the internet, I’m guessing that’s why its still in the OWASP (Open Web Application Security Projects) Top 10. Click this…

How to Recreate a Corrupt Profile on Windows 7 / 8 /10

Recreating a windows profile used to be as easy as just renaming the old profile, then rebooting the PC and logging in again to create a fresh profile, but since windows 7 you have to delve into the registry and make a few changes other wise the user will get stuck with a tempory profile every time they login. Restart your PC to realises the locks on your profile Log on with another administrative account. Rename or Delete the…

Delete Stale or Inactive Computer Accounts from Active Directory

I recentley found this post from Santhosh Sivarajan’s blog which gives you an easy way to identify and delete inactive or stale computers in an Active Directory enviroment. Using the dsquery command you can easliy find all of the computers in the directory that have not been logged into in a given time interval or disabled. The following command will return all computers that have been inactive or stale for 2 weeks: dsquery computer…

Testing Email Connections with Telnet

This is one of the essential troubleshooting tricks that an Exchange administrator needs to know, sending an email using telnet from command prompt. Lets say you’ve just configured a relay connector and want to test it from the server that you wish to allow relay from before you let that server’s owner know that it is all set up for them. Or perhaps you want to quickly test whether a another email server on…

Secure Shell (SSH)

Secure Shell or SSH is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The…

Restrict RDP Access by IP Address with Windows Firewall

You can restrict RDP access to your server, either by IP address or a range of IP addresses, using the rules in the Windows firewall. You can actually use this same method for any open port, on any Windows PC, running Windows firewall. One thing before we start. If you are thinking about using this so that you can open RDP up to the internet, Don’t. Even though it would work, always try to…

Sync Time from an External Time Source

This is a quick post to how to sync your domain controllers with an external time source (0.uk.pool.ntp.org). By default, all machines in a domain will sync time from the domain controller which is the internal time server- if you have more then one Dc then time will sync from the DC that holds the PDC emulator FSMO role. To Check which DC is PDC emulator in your domain you need to run netdom…

Scroll to top