Migrating WordPress Between Platforms

Okay so you want to move WordPress from either a Microsoft IIS server running Microsoft SQL to a Linux box running Apache and MySQL or the other way around? This seems like a daunting task (as I thought initially)¬†but as I found, it is easier than once thought. Existing WordPress Site Log into your existing… Read more »

Key-based SSH Login Authentication on Linux with Putty

This guide describes how to generate a private and public key pair to log into a Linux server over SSH using Putty. Using key based exchange allows you to disable the normal username and password authentication procedure which increases security and removes the ability to brute force logins to the server. Putty & Utilities First… Read more »

Encryption of text in images using Steghide (Steganography)

The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient could understand or view is called Steganography. According to Wikipedia, the word¬†steganography is of Greek origin and means “concealed writing” from the Greek word steganos meaning “covered or protected” and graphei, meaning “writing”…. Read more »

Forward all traffic on Linux

Turning on IP forwarding can be useful if you want to pass traffic through a server such as a firewall Linux server. To turn on IP forwarding run the following commands: Temporary Enable Permanently Enable Example Disabled Example Enabled Should you have any questions, comments or suggestions, please don’t hesitate to comment below. If you… Read more »

Restarting Management Agents on ESX Physical Hosts

Management services on physical hosts that are running VMware ESX can fail causing the following results: You cannot connect ESX/ESXi to VirtualCenter /vCenter Server You cannot connect directly to the ESX/ESXi host from the VMware Infrastructure Client / vSphere Client You cannot stop or start a virtual machine A virtual machine is shown as running… Read more »

Generate Custom Password Lists with Common User Passwords Profiler (CUPP)

If getting massive word lists and spending days if not weeks or months running attacks on targets isn’t your thing (not that I endorse this type of behaviour) then you can try a more defined approach if you know a little information about your specific target using common user passwords profiler (CUPPS). Most people generate… Read more »