HackThisSite Basic Missions!

HackThisSite.org I'll be going through the HackThisSite  basic missions in this walk-through/experience. I'll be completing all missions through the Firefox web browser. Basic Missions 1. The first basic mission is beyond easy. Simply inspect the element of the page and when you get near the password form html code there is a comment containing the... Continue Reading →

Advertisements

The Metasploit Framework

As I continue gaining experience in my virtual lab and reading of how to conduct countless exploits a tool used in nearly every scenario is Metasploit. I figured it is important to know exactly what this tool is, what it does, how it's made, etc... Choosing and configuring an exploit (code that enters a target... Continue Reading →

What is Nmap?

"Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service up time. Nmap uses raw IP packets in novel ways to determine what hosts... Continue Reading →

Setting Up Metasploitable2 + Kali

So lately I have been playing with Metasploitable 2. This is an image that is purposely designed to contain vulnerabilities that are easily exploitable for learning purposes. You can download the virtual machine image here. The download provides the VMX file which is perfect as I am doing these practice simulations in a virtual machine. Therefore... Continue Reading →

The Journey Begins

Hey there, welcome to my blog. I am a student pursuing a bachelors degree in Computer Engineering. I really enjoy all things related to technology but what has always stood out the most to me has been topics related to security. Using technology the way it was intended for is great and all, but why... Continue Reading →

Create a website or blog at WordPress.com

Up ↑