Hey all and welcome to my channel! Kali Linux 2022.2 was released this week and among the many great new features in this release is the ability to install the latest GNOME 42 desktop to give your Kali a fresh modern feel. In this short video I will show you how to install the GNOME…
Category: General Cybersecurity
How hackers launch phishing attacks (Social Engineering) 🎣
In this video we will go on a little phishing trip! I will show you a two phased approach how a hacker can potentially launch a phishing attack against their victims. We will be using two tool, the first is ZPhisher, a phishing automation script, that allows us to host various login pages to harvest…
Enumerate Users & Brute Force Attack WordPress using WPScan
In this video we explore WPScan’s ability to enumerate usernames and brute force attack a vulnerable WordPress website using Kali Linux. We will also discuss possible mitigation techniques in the form of strong, unpredictable usernames and passwords, as well as explore a popular web application firewall (WAF) call Wordfence that can be used to further…
Using WPScan to Scan WordPress Sites & Setup RCE Attacks
With WordPress being as popular as it is, with and estimated 43% of websites online today using this content management system. It is super important that we as cybersecurity professionals know how to scan for vulnerabilities and protect against the many attacks these websites face on a daily basis. In this video I will show…
A Quick Way to Install Kali 2021.4 in VirtualBox
I have put together a quick how to video to show you how to install the latest version of Kali Linux 2021.4 in VirtualBox on a Windows host. The latest version of Kali comes with some nice new additions including: Improved Apple M1 processor support. Compatibility improvements for Samba. Easier switching package manager mirrors. Kaboxer…
Network Security: Passive vs Active Reconnaissance 🔎
Cyber attacks on computer systems according to The Unified Kill Chain model created by Paul Pols, describes the phased and strategic progressions a bad actor may follow to gain an initial foothold into a system, right through to the exfiltration of data and other negative impacts. Before an attacker reaches these late phases of the…
Cybersecurity vs Cyber Security: One or two words? 🤔
Hey guys, so this is officially the very first entry I am making into my snazzy new blog. I plan to share and document my adventures as I explore and learn the ever-evolving intricacies of the cybersecurity craft. I am hoping that this information will be of some use to whoever stumbles upon it. Anyway,…