Recent Posts

Getting started with VSCode and Git

4 minute read

Overview This is the second post in a series of articles, that are aimed at showing you simple step by step guides to creating your own static website hos...

Walk-through of Arctic from HackTheBox

9 minute read

Machine Information Arctic is rated easy and is a fairly straightforward box. Basic troubleshooting is required to get the correct exploit functioning pro...

Walk-through of TenTen from HackTheBox

10 minute read

Machine Information Tenten is a medium difficulty machine, that demonstrates the severity of using outdated Wordpress plugins, which is a major attack vec...

Things to do with Kali after first boot

7 minute read

Kali Information In this previous guide I went through the steps of importing the VirtualBox specific pre-built image of Kali 2020.2a. Now we will walk th...

Importing Kali 2020.2a in to VirtualBox

1 minute read

VirtualBox And Kali Information Kali is one of the most popular pre-built cyber security environments. It’s well maintained and kept updated regularly, wi...

Installing VirtualBox 6.1.12 and Extensions

2 minute read

VirtualBox Information For penetration testing and capture the flag activities I use Kali as a VM within VirtualBox. There is a special VirtualBox image a...

Walk-through of Vegeta-1 from VulnHub

5 minute read

Machine Information Vegeta-1 is a beginner level Anime themed machine, based around the character Vegeta from Dragonball. It contains numerous rabbit hole...

Walk-through of Bastard from HackTheBox

8 minute read

Machine Information Optimum is rated easy and mainly focuses on enumeration of services with known exploits. There are Metasploit modules for the exploits...

Walk-through of Optimum from HackTheBox

5 minute read

Machine Information Optimum is rated easy and mainly focuses on enumeration of services with known exploits. There are Metasploit modules for the exploits...