nslookupThis will give you an overview of the nslookup tool and how to use it. Nslookup is a tool used to lookup DNS information about a specified domain. nsl…Posted: 6 December, 2019
PingPing is a fairly simple tool you can use to get basic information about a network. It's available in Linux, MacOS, and Windows. ping www.example.com…Posted: 6 December, 2019
Packet Analysis ToolsThis tutorial will give an overview of packet analysis tools such as Wireshark, Tshark, TCPDump, and NGrep. Wireshark Wireshark is one of the most…Posted: 6 August, 2019
VagrantExcerpt: Vagrant is a tool that can be used to automate the creation of virtual machines. This allows you to easily spin up and configure virtual environments.…Posted: 28 May, 2020
DockerExcerpt: Docker is an incredibly useful tool for containerising applications. This tutorial will give you some of the basics for using the application and…Posted: 11 August, 2019
MySQLExcerpt: This will give you an overview of MySQL and how to use it. To Login to a MySQL server: mysql -u root -p -u - The user you want to login as. -p - you…Posted: 11 August, 2019
Secure Connections via SSH and SCPExcerpt: This will show you the basics of securely connecting to hosts via SSH. SSH This should give you some of the basic commands required for using SSH to…Posted: 23 July, 2019
Mounting, Configuring and Formatting DrivesExcerpt: This will show you how to mount configure and format drives in Linux. This will mostly be a command based tutorial with descriptions on which command…Posted: 22 July, 2019
Add Linux PartitionsExcerpt: This will show you how to add a partition on a separate drive. The tutorial looks at a Windows drive but it can be changed for any OS. Find Windows…Posted: 21 July, 2019
Arch Tips and TricksExcerpt: This is small set of fairly basic tutorials regarding different hints and tips you can use to configure a fresh installation of Arch, or some other…Posted: 21 July, 2019
Display Server Installation and Display Manager ConfigurationExcerpt: Brief instructions on installing the display server and display driver on a fresh install of Arch. Display Server For the installation of the display…Posted: 20 July, 2019
Xorg ConfigurationExcerpt: This is small set of fairly basic tutorials regarding the setup of keyboards, monitors, and mice for the Xorg display server. Before we start please…Posted: 20 July, 2019
System MonitoringExcerpt: nmon nmon is a tool that can show you performance information for the following things: CPU Memory Network Disk I/O Kernel stats Top processes Resour…Posted: 30 January, 2022
Process MonitoringExcerpt: This page will go over some of the process monitoring tools you might want to use at some point. There are a lot of reasons you might want to get a…Posted: 19 December, 2021
hping3Excerpt: hping3 is a tool for sending arbitrary packets to network hosts. It's similar to the ping command, but works specifically for TCP/IP packets. Given…Posted: 29 March, 2020
Bash ExpectExcerpt: Bash expect is a useful tool to automate shell scripts, in this tutorial I'll show you how to use the command to provide passwords to the SSH command.…Posted: 11 August, 2019
Screen CommandExcerpt: This is a simple tutorial regarding the use of the Screen command. Screen is useful where you are using distributions that do not have a GUI. You can…Posted: 11 August, 2019
Find CommandExcerpt: This is a tutorial for the find command. find is a pretty useful command for finding files in Linux. It can be used if your looking for your own file…Posted: 4 August, 2019
Text ManipulationExcerpt: This section gives some of the basic usage of different text manipulation. The idea is not to give a full overview of them as there are plenty of…Posted: 4 August, 2019
Miscellaneous Linux TipsExcerpt: This page is for tips and tricks that don't really fit anywhere else. Installing from .deb To install a package from a .deb file enter the following…Posted: 23 July, 2019
Networking ToolsExcerpt: This will show you how to use some of the networking tools in Linux, such as ip and netctl. IP Command N.B. The ipconfig command provided by the net…Posted: 22 July, 2019
HTTPRecon ToolExcerpt: HTTPRecon allows you to fingerprint a web server to give you a better understanding on how it's configured. This can therefore be used in the initial…Posted: 6 May, 2020
UniscanExcerpt: Uniscan is a tool for fingerprinting web servers in Kali Linux. Simply typing 'uniscan' into the command line will show you options available to you.…Posted: 6 May, 2020
WPScanExcerpt: WPScan is a tool for scanning WordPress sites. This can be used to find vulnerabilities within a WordPress site. For the purpose of this I'll be using…Posted: 6 May, 2020
ResponderExcerpt: Responder is a tool that listens to NBT-NS (NetBIOS Name Service) and LLMNR (Link-Local Multicast Name Resolution) requests and responds to them as…Posted: 12 April, 2020
Enum4LinuxExcerpt: Enum4Linux is a tool used to enumerate data from Windows and Samba hosts. This is a Linux alternative to the enum.exe tool that you can use in Windows…Posted: 11 April, 2020
SuperScanExcerpt: SuperScan is a network scanning and enumeration tool. It's available on Windows only, that is unless it works on Linux using Wine but I haven't tested…Posted: 10 April, 2020
Cain & AbelExcerpt: Cain and Abel is a great tool for performing Man-In-The-Middle (MITM) attacks. This will allow you to sniff traffic on the network and conduct an ARP…Posted: 6 April, 2020
Covert_TCPExcerpt: Covert_TCP allows data to be exfiltrated via the unused fields present in TCP/IP headers. This is a useful technique to avoid detection when…Posted: 6 April, 2020
CurrPortsExcerpt: CurrPorts is a tool that can help you analyse processes and the network ports they are using. This can be useful to help you troubleshoot problems…Posted: 6 April, 2020
HOICExcerpt: The High Orbit Ion Cannon (HOIC) is a tool used to perform Distributed Denial of Service (DDoS) attacks. This tools allows you to create scripts to…Posted: 6 April, 2020
JPS Virus MakerExcerpt: JPS is a tool for creating viruses. It's fairly simple and easy to use but a fairly well-known tool so easy to spot with an antivirus. When you open…Posted: 6 April, 2020
MSFVenomExcerpt: MSFVenom is a tool used to create malicious payloads for the Metasploit framework. The Metasploit framework is a tool for developing and executing…Posted: 6 April, 2020
NessusExcerpt: Nessus is one of the industries most well know vulnerability scanners, there are plenty of others out there but this one is one that I've used most…Posted: 6 April, 2020
NiktoExcerpt: Nikto is a web server vulnerability scanner. This will scan the target and discover any 'known' vulnerabilities on the target system. This is quite…Posted: 6 April, 2020
NjRATExcerpt: NjRAT is a Remote Access Trojan (RAT) creation tool. This allows the attacker to create a trojan which gives them full control of the victim's system.…Posted: 6 April, 2020
OllyDbgExcerpt: OllyDbg is a Windows tool to analyse binary files. This is good when the original source code is not available to you, which is a likely case if you…Posted: 6 April, 2020
OpenStegoExcerpt: Steganography is the art of hiding information within other information. This is a fairly simple, yet powerful, technique that allows information to…Posted: 6 April, 2020
ProRatExcerpt: ProRat is another Remote Access Trojan (RAT) creation tool. It works on Windows systems and offers a number of features. N.B. This tutorial will…Posted: 6 April, 2020
Social Engineering Toolkit (SET)Excerpt: SET is a tool used for performing social engineering style attacks. It's a useful tool as it helps automate some of the manual tasks you would…Posted: 6 April, 2020
TheFatRatExcerpt: TheFatRat is a tool to create backdoors and payloads that can bypass anti-virus programs. For more information on this please see thePosted: 6 April, 2020
Xarp ToolExcerpt: XArp is a tool that can assist in the detection of ARP based attacks. There are different levels of detection you can set to help limit the potential…Posted: 6 April, 2020
Zed Attack Proxy (ZAP)Excerpt: The Zed Attack Proxy (ZAP) is an open source web app scanner. It's designed for web application testing and has been developed by OWASP; OWASP are an…Posted: 6 April, 2020
TheHarvesterExcerpt: TheHarvester is another reconnaissance tool. This one can gather emails, subdomains, hosts, employee names, open ports and banners from different…Posted: 26 March, 2020
Recon-ngExcerpt: Recon-ng is a useful tool for reconnaissance. It can give you useful information about an organisation and the people working for them. To launch…Posted: 23 March, 2020
MaltegoExcerpt: Maltego is a really powerful tool used to find scrape the internet for information, whether thats about a person, website, device, or anything else…Posted: 21 December, 2019
HTTrackExcerpt: HTTrack is a fairly useful too that can be used to download a website for offline use. This technique is often used in scenarios where you would like…Posted: 8 December, 2019
SnortExcerpt: Snort is a tool used for Security Information and Event Management (SIEM). This tutorial will cover the basics of snort rules. One basic snort rule is…Posted: 10 August, 2019
NMapExcerpt: NMap is a very powerful tool which allows you to scan for hosts on a network and view the open ports and services running on those hosts. This…Posted: 5 August, 2019
HydraExcerpt: Hydra is a tool used for brute forcing passwords. Please do not use this tool for anything other than testing, or where you have explicit permission…Posted: 4 August, 2019
SIFT Linux DistributionExcerpt: The SIFT linux distribution contains a number of useful tools for forensically analysing files. This page is simply intended to give an overview of…Posted: 4 August, 2019
ADExplorerExcerpt: ADExplorer is a useful tool that sits within the Microsoft Sysinternals suite of tools. This is a tool that's able to show you the structure of an…Posted: 6 April, 2020
HyenaExcerpt: Hyena is a really good tool for enumerating an Active Directory network, as well as your own machine. It can show things such as: Drives Local…Posted: 6 April, 2020
PowerShellExcerpt: This will give you an overview of some useful PowerShell commands. Most of these commands are fairly simple but give you an idea of some of the things…Posted: 27 November, 2019