How to Use nmap to Find Devices on Your Network

Share this… Facebook Pinterest Twitter Linkedin RedditToday I will show you how to use nmap to find devices on your network. Knowing which devices are available on a network is the first step to both attacking and defending your systems. It is important to identify unauthorized, or ‘rogue’, devices in order to maintain a high […]

How to Use John the Ripper

Share this… Facebook Pinterest Twitter Linkedin RedditIn this article we describe how to crack password hashes with John the Ripper (JtR). It is not unheard of to come across a file containing password hashes during a penetration testing engagement. This can be a gold mine if you can crack the password hashes. John the Ripper […]

How to Create a Kali Linux Bootable Usb

Share this… Facebook Pinterest Twitter Linkedin RedditWelcome back to our next tutorial. Today we will be creating a Kali Linux bootable USB. If you would install Kali Linux locally, check out our tutorial on Installing Kali Linux in VirtualBox. Go ahead and start the download as it will take some time on slower connections. Grab […]

How to Install MySQL on Mac

Share this… Facebook Pinterest Twitter Linkedin RedditWelcome back to another SecuringNinja tutorial. No cyber security researcher should be with out a database to practice their skills on, or just to store tons of relational data. Today we will show you how to install MySQL on a Mac. Having a local database is perfect for running […]

Install Kali Linux in VirtualBox on Mac

Share this… Facebook Pinterest Twitter Linkedin RedditToday we cover how to install Kali Linux in Virtualbox on Mac. In the tutorial below we explain all the steps needed to install Kali Linux in VirtualBox on a Mac. We also answer common questions and provide solutions to common problems people face while trying to install Kali […]

How to Build a Virtual Penetration Testing Lab

Share this… Facebook Pinterest Twitter Linkedin RedditAs a penetration tester it is important to have a controlled environment in which to hone your skills and test new techniques. Testing on systems you do not own is illegal, even if it is just harmless curiosity. In this article I will show you how to build a […]

Inside a Brute Force Router Takeover

Share this… Facebook Pinterest Twitter Linkedin RedditRouters provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, […]

Understanding the Cyber Kill Chain in the Cloud

Share this… Facebook Pinterest Twitter Linkedin RedditThe cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill […]

How to Install Metasploitable in VirtualBox

Share this… Facebook Pinterest Twitter Linkedin RedditIn this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a […]