Ransomware, should you really be bothered?

What is a ransomware attack? Simply put, it’s a virus attack that encrypts all the files on your computer/laptop and makes it impossible to access your data. Even though the file is still sitting on your computer/laptop, it’s just not sitting pretty anymore. You are not in a position to really do much till the time […]

Intercepting proxy and how to use it?

Given that you are here, we assume you have heard the term intercepting proxy before? If not, let us help you understand what it is and more importantly, what it does. What is an intercepting proxy? An intercepting proxy is an application that sits between your browser and the web application. Why would you want […]

Starting SSH on boot Kali 2.x

SSH won’t start at boot on Kali 2.0? Don’t worry, it’s because Kali 2.x is based on Debian 8, as opposed to Kali 1.x being based on Debian 7. Kali 1.x uses init/update-rc.d; Kali 2.x uses systemd/systemctl For Kali 1.x, the command is #update-rc.d -f ssh defaults For Kali 2.x, the command is #systemctl enable […]

Easy way to tunnel VNC over SSH?

Why would you want to tunnel VNC traffic over SSH? VNC as we know is a graphical desktop sharing system. It uses Remote Frame Buffer(RFB) protocol to remotely control another computer. By default, RFB is not a secure protocol. So in order to make it secure with encryption, we would need to tunnel traffic over […]