Joshua Cole
Joshua Cole's Blog

Joshua Cole's Blog

How to brute force online login credentials with Hydra

How to brute force online login credentials with Hydra

How to implement and verify checksums on Linux

How to implement and verify checksums on Linux

Anonymize traffic with Proxychains and Tor on Linux

Anonymize traffic with Proxychains and Tor on Linux

The basics of Metasploit

The basics of Metasploit

How to scan networks with NMAP

How to scan networks with NMAP

How to crack hashes with John the Ripper

How to crack hashes with John the Ripper

Working out the jug problem in python

Working out the jug problem in python

The OSI Model

The OSI Model

How the Web Works: DNS,  Domain Hierarchy and Record Types

How the Web Works: DNS, Domain Hierarchy and Record Types