Other articles

  1. Logging Nessus vulnerabilities to graylog

    Sat 08 July 2017

    I've been beefing up the security of my home network recently. If you were to ask me why, I could rattle out a few good excuses, such as "it's good to maintain good computer hygiene, especially at home" or "as a fan of CTF's, I'm concerned that I'll accidentally pick …

    read more
  2. Missing USB revocation on Android with Nethunter

    Fri 05 May 2017

    Today, I came across a strange issue when trying to interact with my phone using adb. I'd recently set up Kali nethunter on a phone I use for mobile application pentests, and found that I could no longer connect to it from my machine.

    The error message is rather unhelpful …

    read more
  3. Certificate Transparency as a recon technique

    Fri 04 November 2016

    I've been using certificate transparency with increasing frequency during my network pentests. What a great source of information! I've found it so useful that I wrote a short standalone script to search for domains in a transparency log and resolve them to IP addresses.

    What's certificate transparency?

    There's an actual …

    read more
  4. Setting up Nethunter despite infinite boot

    Sun 31 July 2016

    I have recently wiped and reinstalled a Kali Nethunter instance running on my Nexus 5 phone. It gave me a bit of trouble, so I thought I'd document the work-around in case it helps anyone out there :)


    • Google Nexus 5
    • Cyanogenmod (CM) with a nightly dating back to March …
    read more
  5. Metasploit soul-searching: scanning with metasploit

    I've been trying to expand my knowledge of Metasploit recently. I've gotten training which included quite extensive coverage of the framework, for which I'm grateful; but to really get how extensive the tool's functionality is, there's nothing quite like practice.

    With this in mind, I downloaded the metasploitable VM over …

    read more

Page 1 / 6 »