Blog

physicalsecurity
How to hack an Access Control System?

Physical security is one of the key elements in Security besides the human and technology part. The three elements basically linked together in an equal manner where hackers always try to find an.

email_spam-1414066
Securing unused domains

A lot of companies have reserved more than one domain name for their organization. Multiple of those domain name are not been used for email purpose but are a target for hackers to.

data recovery
Mounting filesystem image with CLI

Assume you have a image of an file system that needs to be mounted. This could be on a linux system in case you need to recovering data or for forensics reasons. With.

250gb_2.5inch_sata_harddisk_7200rpm_hardware4sale
Realtime LVM filesystem resize

Sometimes you need to resize your partition of your VPS system when you for example requested additional diskspace. In the below tutorial I resized my VPS hard-disk. Keep in mind that having a.

hacker
Effectieve scope voor penetratie testen

Vaak wordt door organisaties het bepalen van de scope voor een penetratie test onderschat. Het niet juist scopen van een opdracht kan resulteren in bijvoorbeeld een niet volledige test of dat er onvoldoende.

Screenshot 2020-07-03 at 16.40.31
How to build an API with Django REST Framework within 30 minutes

In this blog post, I will introduce how to develop a API Service in Django using Django REST Framework (DRF). In this example you will be introduced to DRF with minimal amount of.

Screenshot 2020-05-27 at 08.35.22
Fail2Ban log monitoring and blocking application

Lot’s of systems on the internet are been hacked trough the use of easy guessable passwords or default credentials. In many cases the source ip address is been hacked the same way. Attackers.

remove-code-signing
Securing WordPress with .htaccess
Hoe je wordpress website beveiligen met .htaccess tegen aanvallers. Met een aantal simpele filter technieken kan je aanvallers op afstand houden..
Screenshot 2020-03-24 at 11.53.07
GoPhish

What is Gophish? Gophish is a phishing framework that makes the simulation of real-world phishing attacks dead-simple. The idea behind gophish is simple – make industry-grade phishing training available to everyone. “Available” in.