• +47 90103500
  • lennart.linnbar@gmail.com
  • Oslo , Norway

TCM Security — Practical Ethical Hacking Course 

The first step was to check the IP Address of the machine and that was done using ARP Scan. Then, I did the ran the NetDiscover Scan and found this below. After that, I did the old-fashioned NMAP Scan using the command : nmap -p- -T4 -A 192.168.1.5 In the NMAP-Scan I found a FTP Port Open with the Name : anonymous […]

Install hacker tools

Start I have a laptop running Kali and Virtual Box with a kali vm on it. I wanted to have a setup that is easy to copy, backup and restore and the main tools installed. Here is the steps that I took to get this setup up and running. Where did I get this information There is a lot people […]

Firewall rules not as secure as you think

This post introduces some tricks for jailbreaking hosts behind “secure” enterprise firewalls in order to enable arbitrary inbound and outbound requests over any protocol. You’ll probably find the tricks outlined in the post useful if you need to deploy software in a hostile networking environment. The motivation for these tricks is that you might be a vendor that sells software […]

NMAP

Introduction There are several opportunities to test network penetration. These penetration tests are typically carried out by businesses in order to ascertain whether or not their network and all of the devices that are connected to their internal network are secure and up to date in accordance with the policies that they have established. Imagine that a firm has hired […]

Trojan Virus

Introduction Welcome to this new article, today I will show you how to create a trojan in 5 minutes, to do this we will try to run a calculator from a well known application like Putty (SSH Windows Client).In your case you can run anything, it is only the calculator for do my tests and teach you how you can […]