The
Internet has made our lives easier in so many ways. However, you need to know
how you can protect your privacy and avoid fraud. With all of the personally
identifiable information we share on social sites – Hackers have only become
more adep…
PostShell – Post Exploitation Bind/Backconnect Shell
PostShell – Post Exploitation Bind/Backconnect Shell
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control.
The stub size is around 14kb and ca…
Proxmox Container with Debian 10 does not work after upgrade
I just did an apt update / upgrade of a Debian 10 container and restarted it afterwards and got following: # pct start 105 Job for pve-container@105.service failed because the control process exited with error code. See “systemctl status pve-container@105.service” and “journalctl -xe” for details. command ‘systemctl start pve-container@105’ failed: exit code 1 with a […]
The post Proxmox Container with Debian 10 does not work after upgrade first appeared on Robert Penz Blog.
Kali Linux 2019.3 Release (Cloudflare, Kali-status, metapackages, Helper-Scripts & LXD)
We are pleased to announce that our third release of 2019, Kali Linux 2019.3, is available immediately for download. This release brings our kernel up to version 5.2.9, and includes various new features across the board with NetHunter, ARM and packages…
XMR Cryptomining Targeting x86/i686 Systems
I have been playing close attention to Internet of Things (IoT) malware targeting systems with Telnet enabled, while also collecting samples targeting systems with SSH enabled on port 22. I’ve collected over 650 samples landing in my honeypot within th…
Findomain- Fastest And Cross-platform Subdomain Enumerator
FinDomain- Fastest And Cross-platform Subdomain Enumerator.
Comparison
It comparison gives you a idea why you should use findomain instead of another enumerators. The domain used for the test was Microsoft.com in the following BlackArch virtual ma…
In Conversation: The Women in Network Security
Why does network security matter? On average, there is a hacker attack every 39 seconds. If any of these attacks result in a data breach, they could cost over $150 million, with research suggesting that cyber-attacks could cost businesses over…
Major Metapackage Makeover
With our 2019.3 Kali release imminent, we wanted to take a quick moment to discuss one of our more significant upcoming changes: our selection of metapackages. These alterations are designed to optimize Kali, reduce ISO size, and better organize metapa…
Burp Suite Extension – To Monitor And Keep Track of Tested Endpoints
Burp Scope Monitor Extension
A Burp Suite Extension to monitor and keep track of tested endpoints.
Main Features
Simple, easy way to keep track of unique endpoints when testing an application
Mark individual endpoints as analyzed or not
Inst…
Edge DNS: Zone Apex Mapping & DNSSEC
Along with its DDoS resilience and impressive global footprint, Akamai Edge DNS offers zone administrators additional technical flexibility and implementation options to improve performance and simplify DNS operations. One example is zone apex mapping …