I started my journey to become a pen tester about a year ago. I began working in IT as a software tester about two years ago. Prior to this I was a special needs teacher for 17 years with a specialism in science. I know. What the hell am I doing? Well I actually really […]
So you’ve been doing some research into preparing for the OSCP Penetration Testing with Kali course and certification. You have discovered that in order to stand a good chance of doing well in the exam it pays to become proficient in enumeration. Enumeration is the process by which the pen tester discovers as much as […]
How to write a basic bash script with an example of a ping sweep to return live hosts.
Understanding linux file permissions and how to change them using chmod.
Very basic Linux Terminal commands for the beginner pen tester.
So you’ve managed to get root on a linux virtual machine, congrats! However this isn’t where the fun stops. From here you can access the files containing the usernames and their hashed passwords. These files are known as the passwd and shadow files. They can be combined into one file using the unshadow tool so […]
One of the more common services open to exploitation is Netbios / SMB or Samba service. During a pen test where do you go from here?
So you have found an installation of wordpress on your vulnerable virtual machine. What next? WPScan In your browser copy the address of the wordpress installation. At the terminal in Kali type the following: wpscan –url http://172.16.195.202/wordpress/ –enumerate Replace the URL with the URL of the vulnerable wordpress installation. Once the scan has been completed […]