Make SQL Injection Vulnerabilities Harder to Exploit

Image for post
Image for post

Get an Alert when Someone Accesses a File

Image for post
Image for post

What are Canaries?


How Hackers Clone Sites and Create Malicious Login Pages

Image for post
Image for post

Cloning our Target Login Page


A Proof of Concept Python Virus

Image for post
Image for post


And an Example Showing Memory Injection

Image for post
Image for post

Windows API Functions for Process Manipulation


Windows Registry = Digital Forensics Gold Mine

Image for post
Image for post

What is the Windows Registry?


The Malware Used in the Trojanized SolarWinds Orion Update

Image for post
Image for post

The SolarWind’s Supply Chain Attack


Exploiting an 802.11 Flaw

Image for post
Image for post

How does a Deauthentication Attack Work?


Creating new Tor identities to confidently and safely browse the Dark Web

Image for post
Image for post


2020 Setup

Image for post
Image for post

Make a Backup of Current Sources.list File

mv /etc/apt/sources.list /etc/apt/sources.list.bak

Remove currently installed Kali Updates

Alexis Rodriguez

Pythonista & Gopher | <OSCP> <CySA+> <Security+> | Part-time Cybersecurity Instructional Associate @ Fullstack Academy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store