kali nullHow to build a ping server the hard wayI wanted to implement a simple server that would register source IPs which it was ping from and display it back to me. This way i wouldn’t…·3 min read·Feb 1, 2021----
kali nullHow to set up Genymotion and intercept it with Burp Suite ProxyGenymotion is so far my favorite Android emulator. It’s both powerful and easy to use. It’s widely used by developers because it’s way…4 min read·Oct 16, 2020----
kali nullHow to capture network traffic from iPhone with tcpdumpAfter returning from DefCon I wanted to make sure my iPhone is not communicating with any sketchy servers out there. So decided to run a…2 min read·Aug 12, 2019----
kali nullSSH tunneling as a VPN alternativeIt’s not uncommon that VPN connection to our client’s boxes either breaks mid testing or is blocked by some firewall or IDS. SSH tunneling…3 min read·Jul 16, 2019----
kali nullHow to add a module to Metasploit from Exploit-DBLook for the exploit you want to add: searchsploit sonicwall 8.1.0.2-14sv Make a note of the path for the exploit.2 min read·Jan 20, 2019--2--2
kali nullSquid proxy server for penetration testing drop boxesI perform network penetration testing from headless Kali boxes. This is limiting when I want to test internally available web apps. I can…2 min read·Sep 29, 2018----
kali nullHow to intercept TOR hidden service requests with BurpMy environment for this setup: MacOS, Burp Suite, Tor service, Firefox browser and brew.2 min read·Sep 16, 2018--3--3
kali nullHow to configure DD-WRT repeater mode for Atheros based routersDD-WRT does not support repeater mode for Atheros chipset based routers. Hence you will not find Repeater and Repeater Bridge options under…2 min read·Sep 10, 2018--4--4
kali nullBeEF Exploitation Framework installation on AWSI found running BeEF from Kali VirtualBox inconvenient because it requires port forwarding from VMnet, then LAN uggh… You’d really want to…2 min read·Jun 24, 2018----
kali nullPrivacy implications of email trackingWhat happens when you open an email and allow it to display embedded images and pixels? You may expect the sender to learn that you’ve read…8 min read·Jan 4, 2018----