In application development, networking is a huge part of the process. More often than not, your application will require loading remote data as either a functional part of your app or as a way to reduce the amount of data you need in your application on the first load.
Ajax and XMLHttpRequest
In more complex applications, especially sever side applications that leverage asynchronous operations, the usage of callbacks does not allow for efficient event handling, and can cause issues with how things are handled within an app (timing problems, overloading, blocking operations).
What is Asynchronous code?
Without over-complicating things, the easiest way to...
Functional Basics — Currying, Arrows and Callbacks
Assuming you have already read the previous tutorial on Object prototypes and constructors, you should already be familiar with how factories, classes and constructors work on a fundamental level. Now we are going to take that knowledge to the next level.
In traditional programming, to help reduce the amoun...
Advanced Scope: Execution Context and Why it Matters.
Quick overview of execution contexts
An execution context is not a concrete thing, but ra...
It is common for programmers to approach learning scope by trial and error. Scope is a complex topic that can be very powerful when it is well understood, but it can also be a double-edged sword when used sloppily.
Now that we’ve covered the Metasploit basics, let us dig into the more advanced features of Metasploit. We’ll go in-depth into some brute force attacks by running an Nmap command to map out all publicly available services on a remote IP, and then we’ll look at pivoting! Lastly, we’ll look at what you can do to set up some fake service, like SMB (Service Message Block) to catch user hashed credentials and crack the passwords of the hashes.
But first, we need to install Metasploitable. It's a virtual machine made vulnerable on purpose so that it can be used specifically for penetration testing and hacking. We are going to add it to our VirtualBox list and make some network configuration to it so that we can use it for some parts of this guide.
First off, head over to SourceForge to download the ...
This article will focus on using the Metasploit Framework together with Nessus to scan a remote target for vulnerabilities.
The Metasploit Framework is a computer application that provides information about security vulnerabilities and aids in penetration testing. It’s a tool for developing and executing exploit code against a remote target machine. You can find more information about the project here: https://www.metasploit.com/.
Metasploit can utilize several plugins, one of which we will use to scan for vulnerabilities on a local computer. The plugin is called Nessus and is a vulnerability management software to help you identify remote computers through any backdoors and other exposures. Nessus makes it easy to keep track of all your assets and provides great overview graphs and results when the scan is complete.