Node.JS with MySQL

This article shows how to implement a small Node.js application that pulls data from a local MySQL server. We're doing ...
Read More

Docker for Windows – Install, run and launch a Web Server in Docker

This article shows how to install Docker for Windows 10 (and probably 11), and then start a web server in ...
Read More

Hide Apache and PHP Version Details

Sometimes we don't want the public knowing the versions of Apache and PHP running on our servers. This article shows ...
Read More

Can’t Use a Password (instead of a PIN) for Windows 10?

Windows 10 allows you to get into a situation where you can't change your PIN? Worse, you can't set a ...
Read More

My Most Used Metasploit Modules

The modules that we use are specific to our needs. But these are the most commonly used from my recent ...
Read More

Creating your own Password list

If you want to create a customised password list for a specific target (client, I hope), this article is for ...
Read More

Mount SysInternals over HTTP on Linux

This article demonstrates how to mount "https://live.sysinternals.com/tools" on Linux so that it's accessible at "/mnt/sysinternals", for example. On CentOS: yum ...
Read More

Confluence – Recover from User Directory Trouble

If you're in a situation where you can't log into Confluence because you messed up your User Directories, try these ...
Read More

IPSec Site-to-Site VPN between Unifi and pfSense

In this article, we're assuming we have multiple sites (remote offices) using Unifi networking gear, and a central network (in ...
Read More

Upgrade MariaDB to 10.3 on CentOS 7

Everything you see here is found more formally at "https://mariadb.com/docs/operations/upgrades/upgrade-community-server-cs103-centos7/". This page is basically just my notes in case I ...
Read More

Pen Testing Tools – Stuff we all need

This article is mostly a cheat sheet for things pen-testers need. Obviously there's a little picking and choosing depending on ...
Read More

Create, List, Copy and Delete Windows Shadow Copy (VSS) on Windows 10

This article lists the PowerShell (and other) commands to create, list, copy from, and delete Windows Shadow Copies, also known ...
Read More

Configure Metasploit with NMap and the Database – Advanced

This article walks you through the process of installing, configuring and running scans using Metasploit and Nmap. Both CentOS 7 ...
Read More

Create Your Own Public Half-Life 2 DM Server on CentOS 7/8

This article walks you through the process of building your own publicly accessible Half-Life 2 Death Match server on CentOS ...
Read More

Get and Crack Windows Cached Credentials

This article explains how to extract various Windows dumps of passwords from a target system. To follow along with this ...
Read More

Open letter in response to Strengthening Australia’s cyber security regulations and incentives.

Recently the Australian Government, through the Minister for Home Affairs and the Minister for Industry, Science and Technology put out ...
Read More

Windows 10 Post Install Setup

We don't tend to install Windows very often these days. It seems to be far more stable than the old ...
Read More

Synology High Disk Utilization – An Answer

This article explains the primary reason for high disk utilization on the Synology NAS. In this example, we're using the ...
Read More