Prologue Yet another technical blog. Does the world need another one of those, really? Isn’t that just a fad from the 2000’s that got away now that we have RSS, Medium or Wordpress? Most tech blo...
Live backups with btrfs
Intro: Backup and restore with btrfs snapshots Most tutorials and guides out there around btrfs focus on snapshots as a way to recover missing data on the same machine. Some guides explain how to...
Evil twin attack
This tutorial will guide you through the process of compromising a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply these techni...
Man in the middle attack
This tutorial will guide you through the process of compromising and phishing a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply...
Trying out an android Remote Access Trojan (RAT)
This tutorial will guide you through the process of infecting Android phones with a trojan. The author gives this example for educational purposes and does not incentivise you to apply these tec...
Exfiltrating data from a bank
This tutorial will guide you through the process of bypassing security procedures from your employer. The author gives this example for educational purposes and does not incentivise you to apply...
A simple trojan for Linux
This tutorial will guide you through the process of infecting Linux based computers with a trojan. The author gives this example for educational purposes and does not incentivise you to apply th...
A simple click-jacking exercise
This tutorial will guide you through the process of doing cross site scripting. The author gives this example for educational purposes and does not incentivise you to apply these techniques with...
Web 3.0
When you think of cryptocurrencies what is the first thing that comes to your mind? For some it might be digital gold, fast, reliable and cheap transaction fees. For others it will sound more along...
A simple phishing exercise
This tutorial will guide you through the process of writing a phishing website. The author gives this example for educational purposes and does not incentivise you to apply these techniques with...
- 1
- 1 / 1