Skip to navigation Skip to content

Michele's Blog

Madness is the emergency exit

  • About
  • Cyber-attack lifecycle
  • Cyber-Glossary
  • Malware families
  • Malware families by category
December 2020 11
Summary of Initial Attack Vectors to Active Directory
Posted By : Michele Pariani
No Comments

In this blog post, I will describe the following three attack vectors to Microsoft Active Directory: LLMNR Poisoning, SMB Relay Attack and IPv6 Attack.

Read More
November 2020 28
Brute force SSH attack on HTB Nibbles
Posted By : Michele Pariani
No Comments

I will show you how to automate a brute force attack on SSH with the help of Metasploit.

Read More
November 2020 24
HTB Jerry: Default credentials made this hack a piece of cake
Posted By : Michele Pariani
No Comments

I will explain how I hacked into the Jerry machine on Hack the Box. This hack was made easy by a combination of information disclosure, poor hygiene and use of default credentials.

Read More
November 2020 23
How I became root on HTB Devel without Meterpreter
Posted By : Michele Pariani
No Comments

Heath Adams challenged his students to get root on HTB Devel without using Meterpreter. I accepted that challenge and succeeded! This is the report of how I did it.

Read More
November 2020 15
How I hacked the Linux machine Lame on HTB
Posted By : Michele Pariani
No Comments

In this blog post, I will show the steps that I took to get root access to the Lame machine on Hack The Box (HTB).

Read More
November 2020 14
Legacy! How I hacked my first machine on HTB
Posted By : Michele Pariani
No Comments

In this blog post, I will show the steps that I took to get root access to the Legacy machine on Hack The Box (HTB).

Read More
November 2020 06
Efficient Kali and Kioptrix setup on VirtualBox for scanning and enumeration
Posted By : Michele Pariani
No Comments

This blog post shows an easy way to set-up both Kali and Kioptrix on VirtualBox for scanning and enumeration.

Read More
November 2020 01
How to change default credentials in Kali from the terminal
Posted By : Michele Pariani
Comments : 7

This blog post will explain how to change default credentials in a Kali Linux virtual machine after spinning it from a 2020.3 OVA image.

Read More
October 2020 20
How to verify the integrity and authenticity of a Kali Linux OVA image
Posted By : Michele Pariani
Comment : 1

You downloaded an image to install Kali Linux and you want to make sure that this file is an integral and authentic copy? This post is for you!

Read More
October 2020 03
How I made my website more secure
Posted By : Michele Pariani
No Comments

I will describe how I made my website more secure by integrating a free SSL certificate into my WordPress website with the Really Simple SSL plugin.

Read More

Posts navigation

Prev 1 2 3 Next

Recent Posts

  • How to connect to an Ubuntu VM via SSH with PowerShell
  • Microsoft Paint: Kernel Mode vs. User Mode
  • Emotet and “The State of IT Security in Germany in 2020”
  • A few easy tricks to improve the security of your WordPress website
  • Zeus malware. Packet capture analysis with Wireshark

Recent Comments

  • Trevor on How to change default credentials in Kali from the terminal
  • John on How to change default credentials in Kali from the terminal
  • Adolfo Enrique on How to change default credentials in Kali from the terminal
  • Michele Pariani on Microsoft Paint: Kernel Mode vs. User Mode
  • Michael on How to verify the integrity and authenticity of a Kali Linux OVA image
© 2022 Michele's Blog | WordPress Theme: Uncode