Nessus vulnerability scanner is one of the top scanners today and offers many options for personal and enterprise use. Here is a simple setup installing Nessus (free edition) in you Kali Linux instance.

Installation

First, head to https://www.tenable.com/products/nessus and download the latest version of Nessus Essentials.

Register for an activation…


Disclaimer
This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …


Write-up on THM’s “Wreath” network.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …


Write-up on THM’s machine “Blue”, Windows machine.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …


A simple guide on how to use Tor in Kali.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes…


My write-up on HTB’s retired machine “Remote”

Disclaimer

This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …


Write-up on THM’s machine “RA”, Windows Domain Controller.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …


Guide on configuring SSH Key-Based Authentication on a Linux Server

The basic SSH authentication on you Linux server is through username and password , however, even complex passwords are susceptible to “brute-force” type of attack. Here’s a simple guide on configuring SSH Key-Based authentication.

Typical SSH authentication

Using Putty SSH…


My write-up on HTB’s retired machine “Curling”.

Disclaimer

This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …


Write-up on HTB’s retired machine “Arctic” that outlines manual exploitation.

Disclaimer

This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. …

Arcy Caparros

InfoSec, Dad, Jack of All Trades and Master of None

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store