Geolocation of SSH Attacks
If you've ever looked at firewall logs on a public facing machine, you know that anything on the internet is constantly being probed and attacked - seeing hard evidence of this is enough
If you've ever looked at firewall logs on a public facing machine, you know that anything on the internet is constantly being probed and attacked - seeing hard evidence of this is enough
The PWK Course [https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/] was something that had been on my radar for years and I'd been wanting to take it for quite a while. Having heard of
Once upon a time before the age of cellphones, there were things called "landlines". During these dark ages, you had to be at home to make or receive calls - life was hard
This was a pretty fun machine. Nothing tricky here, just good old enumeration and exploitation. As usual, we start off with a nmap scan: Checking out the webserver shows this in the source
I finally got around to playing with some Digisparks [http://digistump.com/products/1] I bought a few months ago and one of the popular uses is to grab wifi passwords from a
I attended BSidesSF 2019 and skipped this presentation based on the title because I assumed it was going to be some cheesy IronMan thing. I could not have been more wrong. While Burp