securitybeans.wordpress.com Open in urlscan Pro
192.0.78.12  Public Scan

Submitted URL: http://securitybeans.ca/
Effective URL: https://securitybeans.wordpress.com/
Submission: On February 12 via api from US — Scanned from CA

Form analysis 3 forms found in the DOM

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

POST https://subscribe.wordpress.com

<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
  <div>
    <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
  </div>
  <input type="hidden" name="action" value="subscribe">
  <input type="hidden" name="blog_id" value="53935744">
  <input type="hidden" name="source" value="https://securitybeans.wordpress.com/">
  <input type="hidden" name="sub-type" value="actionbar-follow">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="7ee146403b">
  <div class="actnbr-button-wrap">
    <button type="submit" value="Sign me up"> Sign me up </button>
  </div>
</form>

POST

<form method="post">
  <input type="submit" value="Close and accept" class="accept"> Privacy &amp; Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies/" rel="nofollow">
			Cookie Policy		</a>
</form>

Text Content

Skip to content


SECURITY BEANS

 * Home
 * Blog Posts
 * Contact Us


 * February 26, 2022
   
   
   SIMPLE PERSONAL HACK LAB – 2
   
   In the previous post we had set up VirtualBox with Ubuntu so that we could
   start with creating our own lab. In-fact depending on what you want to hack,
   you may only need this one machine and some software within it. So how do we
   install that “software” without bloating our Ubuntu machine, well that…
   
   All Posts, Exploit Development, Miscellaneous
   container, docker, docker conatiners, docker images, dockerhub, hacking,
   images, log4j, log4j container, log4j vulnerability, pen-test, pentest,
   pentesting, security
   
 * November 8, 2021
   
   
   SIMPLE PERSONAL HACK LAB
   
   There is significant value in being able to set up your own simple
   environment rather than having to rely on an external party. Mainly because
   you can be very specific about what you want to test, such as a zero-day, you
   can keep sessions alive without worrying about a network connection
   disconnect. Its also a…
   
   All Posts, Exploit Development, Miscellaneous
   cyber security, docker, docker lab, hack lab, hacking, hacking lab, software
   security, test lab, virtual machine, VM
   
 * January 31, 2021
   
   
   ANTIVIRUS/EDR EVASION WITH SHELLTER
   
   A crucial segment of a Pen-test is the ability to evade EDR tools. Shellter
   is a very handy and easy to use tool to ensure that your malware is
   undetected and leads to a successful compromise of the systems you are
   testing.
   
   All Posts
   antivirus bypass, antivirus evasion, cyber security, edr bypass, edr evasion,
   ethical hacking, hacking, penetration testing, pentest, shellter, virus
   total, virustotal
   
 * October 4, 2020
   
   
   GIT CLONE – SSH
   
   SSH keys provide additional security for any git based projects specially if
   you choose to use a public key with a passphrase enabled.
   
   All Posts, Development, Miscellaneous
   git, git bash, git basics, git client, git clone, git clone ssh, github,
   github basics, gitlab, gitlab basics, linux git, mac git, private key, public
   key, rsa basics, rsa key generate, ssh key generate, windows git
   
 * September 29, 2020
   
   
   DUMMY GIT BASICS & GIT CLIENT SETUP
   
   Git is a tool/technology that allows you to create and manage shared
   resources, such as code, documents, diagrams etc. It is specially useful for
   projects that have multiple simultaneous contributors.
   
   All Posts, Development, Miscellaneous
   bitbucket, git, git bash, git basics, git client, github, gitlab, linux git,
   mac git, source control
   
 * May 20, 2018
   
   
   BUFFER OVERFLOW – EXAMPLE SETUP
   
   Now that we understand what a buffer overflow is theoretically, lets see what
   it looks like on a computer. In this blog post let me see if I can help you
   understand the code that we shall be working with. First we are going to know
   what the basic setup looks like though. I am…
   
   All Posts, Exploit Development
   
   
 * August 20, 2016
   
   
   BUFFER OVERFLOW -2 (THEORETICALLY EXPLOITING THE STACK)
   
   It’s been a while since I’ve written, owing mainly to work – work. In the
   last post I laid down the foundation for understanding the buffer overflow
   attack, and I think most of my work is complete. If the concepts about how
   the stack works are clear, understanding a basic buffer overflow should not
   be…
   
   All Posts, Exploit Development
   
   
 * February 15, 2015
   
   
   INSTALL BLINDELEPHANT
   
   What is BlindElephant: BlindElephant is a web application fingerprinting
   tool. As per their sourceforge.net page – “The BlindElephant Web Application
   Fingerprinter attempts to discover the version of a (known) web application
   by comparing static files at known locations against precomputed hashes for
   versions of those files in all all available releases. The technique is
   fast,…
   
   All Posts, Miscellaneous
   
   
 * November 9, 2014
   
   
   E-COMMERCE QUICK INTRODUCTION
   
   This term has kept me really busy, and in particular one course. E-Commerce
   Systems. As challenging as the course is, it is equally if not more
   interesting. The first thing that I will layout in this post is a brief
   theory of what e-commerce is, and what it entails. This is more of a
   overview…
   
   All Posts, Development
   e-commerce, servlet basics, tomcat
   
 * November 9, 2014
   
   
   SET UP PIDGIN AND IRC
   
   Hi guys, for those of you who have never set up IRC, I hope this post helps
   you. There are numerous clients for IRC. I personally use Pidgin, its pretty
   simple to setup. Download Here is the link to the download page Pidgin. The
   installation is pretty simple, just clicking through the wizard should get…
   
   All Posts, Miscellaneous
   IRC channels, Pidgin
   

1 2 3
Next Page

Website Powered by WordPress.com.


 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website

 * Subscribe Subscribed
    * Security Beans
      
      Sign me up
    * Already have a WordPress.com account? Log in now.

 *  * Security Beans
    * Edit Site
    * Subscribe Subscribed
    * Sign up
    * Log in
    * Report this content
    * View site in Reader
    * Manage subscriptions
    * Collapse this bar

Privacy & Cookies: This site uses cookies. By continuing to use this website,
you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Advertisements
Powered by wordads.co
We've received your report.

Thanks for your feedback!
Seen too often
Not relevant
Offensive
Broken
Report this ad