Tag Archives: kali

Kada Anan Martial Arts Association Kali FMA Event

I’ve been doing Filipino Martial Arts since February, and Kada Anan Martial Arts Association (K.A.M.A.) put on an Open Martial Arts Gathering. It was really interesting learning some new techniques from other styles from Eskrima DeCuerdas, Lima Lama, some Fencing/Sabre … Continue reading

Posted in Event | Tagged , , , , , , , , | Comments Off on Kada Anan Martial Arts Association Kali FMA Event

Philippines Vacation: 2025

The last few weeks have been a whirlwind of activity. Literally had dinner with my Alltel crew, then drove out to Los Angeles the next morning for the Doctor Who convention, called Gallifrey1, then got home in time to eat … Continue reading

Posted in Vacation | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Philippines Vacation: 2025

Is that a Mouse in your Pocket or?

You ready to bring unauthorized hardware on my ‘secure’ network? Mouse-box, the computer in a mouse, is still in prototype. All we know right now is that it is running ChromeOS or Linux. Maybe a variant of Kali will work too. … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Is that a Mouse in your Pocket or?

The Raspberry Pi: Impact on Hacking

So, this video is a little old, but very relevant. Sure the Raspberry Pi has been available for some time now, but has the awareness about them spread out of IT and into the minds of the business leaders? Are … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Raspberry Pi: Impact on Hacking

Kali Linux on your Android Phone

Though I’ve yet to find the ARM packages to install BackTrack on a Kali Linux Chromebook, I did find this awesome tutorial on installing Kali Linux on Android. You may want to get a larger memory card prior to installing … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Kali Linux on your Android Phone

Botnet Command and Control

James Lyne explains some botnet command and control.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Botnet Command and Control

Breaking Wireless WPA2

You’ll need Backtrack with metasploit airmon-ng airodump-ng aireplay-ng aircrack Verify your wireless is up, airmon-ng start wlan0 airodump-ng mon0 Find a BSSID MAC address to become a toe (target of evaluation) Stop the program Gather the MAC address and Channel … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Breaking Wireless WPA2

Pass the Hash on Windows 8.1

On this website are instructions on how to pass the hash on Windows 8.1. Microsoft claimed that they patched the Pass the Hash exploit in October of 2013. Of course this is a proof of concept and some of the … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Pass the Hash on Windows 8.1

Installing Crouton and Kali on a Chromebook

Crouton is short for the Chromium OS Universal Chroot Environment. The below instruction will allow you to install two separate OSs on your Chromebook and allow for switching in between them (AND they will have a shared folder, downloads, to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Installing Crouton and Kali on a Chromebook

SQLmap for Auto SQL Injection

Ultimate Peter demonstrates how easy it is to find a vulnerable to SQL injection website and uses SQLmap to quickly find the users and passwords. Remember, it is against the law to perform this type of testing on systems you … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on SQLmap for Auto SQL Injection