Phreaklets

A quasi-random collection of security-related bits'n'pieces that I have been using. I post stuff which I needed to do a bit of work to understand rather than just grabbing something from the first page of Google search results. I hope it's useful to someone like the army of blogs out there have been useful to me over time! Follow me on Twitter: https://twitter.com/Phreaklets

Saturday, February 20, 2016

Five step guide to keeping yourself secure online

›
Five steps to take to keep yourself secure online based on how attackers actually operate. Do these 5 steps consistently and you will be we...
2 comments:
Friday, April 4, 2014

Using BEEF & Metasploit to pop a shell with Firefox on Linux

›
Ingredients Bake the following VMs (I use VMware, I guess this will work with VirtualBox too but I haven't tried it) Kali Linux ...
5 comments:
Tuesday, October 29, 2013

Sniffing WPA2-PSK encrypted wireless networks

›
Sniffing WPA2 encrypted wireless networks is actually a pretty straightforward task, which is reasonably well-documented elsewhere, except f...
4 comments:
Sunday, June 9, 2013

Free & Open Source Modbus/TCP tools

›
If you're interested in playing around with the Modbus protocol, you probably want to start with free, or preferably, open source tools....
10 comments:

Cracking WPA2 Enterprise wireless networks with FreeRADIUS WPE, hostapd and asleap & John the Ripper

›
Some wireless networks, especially in companies, don't use the pre-shared key approach (WPA2-PSK) for restricting access, but rather use...
31 comments:
Saturday, June 8, 2013

Pwning Modbus/TCP

›
Well, to be honest, although I'm not talking about specific attacks here, any access to a Modbus/TCP service is effectively a "pwn...
3 comments:

Scripting metasploit with msfcli

›
I found the tutorials on the web to not work out of the box as msfcli is very picky about the format of the arguments, this is the snippet ...
2 comments:
›
Home
View web version

About Me

RichardGold
View my complete profile
Powered by Blogger.