Skip to content
  • Home
  • Learn
    • Cyber Security
    • WSL2
    • Linux
    • pfSense
    • Web Development
    • Python
    • JavaScript
    • SysAdmin
    • Reviews
    • Miscellaneous
    • Jobs
  • About
  • Discord
  • Support
  • Store
  • Contact
Ceos3c

Ceos3c

Complicated Things - Made Easy

Cyber Security

Learn Cyber Security, Ethical Hacking, and everything you need to know about Bug Bounty. Our Cyber Security Tutorials are beginner-friendly!

Cyber Security Logo

If you are new to Cyber Security, start with these:

  • Getting Started with Cyber Security
  • Top Things to do After Installing Kali Linux
  • The Best Ethical Hacking Books
  • Install Kali Linux on Windows - Complete Beginner Guide
  • Best Ethical Hacking Tools
  • Dual Boot Kali Linux with Windows 10
  • Best WiFi Adapter for Kali Linux

How to get an Hackthebox Invite Code (Tips Only!)

September 5, 2019January 16, 2019 by Stefan
How to get an hackthebox invite code

I will give you tips and point you in the right direction on how to get an hackthebox invite code. You won't find any solution here, only mild spoilers!

Categories Cyber Security Tags hackthebox, invite code 21 Comments

How to Hack VNC with Metasploit - Ethical Hacking Tutorial

July 8, 2019January 9, 2019 by Stefan

I show you a couple of ways that you can use to possibly Hack VNC with Metasploit. Knowing a couple of VNC Exploits can really improve your hacking game!

Categories Cyber Security Tags Hacking, metasploit, vnc 2 Comments

Information Gathering with Metasploit: Wayback Machine

January 2, 2019 by Stefan
Information Gathering With Metasploit Wayback Machine

Information Gathering with Metasploit: Wayback Machine. Learn how to tailor a Social Engineering Attack using website data from the PAST!

Categories Cyber Security Tags information gathering, metasploit, wayback machine Leave a comment

Information Gathering with Metasploit: Shodan

December 26, 2018 by Stefan
Information Gathering with Metasploit

Learn the importance of Information Gathering with Metasploit. In this Article you learn how to use Shodan with Metasploit.

Categories Cyber Security Tags information gathering, metasploit, shodan 4 Comments

Vulnerability Scanning With Metasploit

December 13, 2018December 12, 2018 by Stefan

Vulnerability Scanning with Metasploit and OpenVAS. I show you how to use OpenVAS right inside of the Metasploit Framework to scan for vulnerabilities.

Categories Cyber Security Tags metasploit, scanning, vulnerability 1 Comment

Basic Pentesting 2 Walkthrough

November 12, 2018 by Stefan

A complete Basic Pentesting 2 Walkthrough. I'll show you every step I took to solve the Basic Pentesting 2 CTF.

Categories Cyber Security Tags Basic Pentesting 2 Walkthrough, CTF Leave a comment

Metasploit failed to connect to the Database: FIXED

January 31, 2019October 29, 2018 by Stefan
metasploit failed to connect to database - featured

Welcome back, fellow hackers! I recently had the Metasploit failed to connect to the Database on the ParrotSec  OS version 4.2.2. I use multiple instances of ParrotSec and I had the exact same issue on all of them. I don't know if that is a thing on Kali Linux as well, but for ParrotSec the ... Read more

Categories Cyber Security Tags metasploit 1 Comment

Basic Pentesting 1 Walkthrough

June 25, 2018March 26, 2018 by Stefan

Today I want to try my first CTF walkthrough. I choose the relatively new Basic Pentesting 1 VM from Vulnhub. This CTF is aimed towards beginners and the goal is to get root privileges (boot2root) on the machine.

Read more

Categories Cyber Security Tags Basic Pentesting 1, CTF, walkthrough 2 Comments

Metasploit Workspaces - How to work with them

July 9, 2018March 15, 2018 by Stefan

Welcome back, fellow security enthusiasts! After covering the Basic Metasploit Commands in the last article, it's time to get familiar with Metasploit Workspaces. Workspaces are a great tool to keep everything organized within your Metasploit Framework.

Read more

Categories Cyber Security Tags how to use workspaces, metasploit, workspaces Leave a comment

Hacking with Metasploit: Basic Commands

July 9, 2018March 2, 2018 by Stefan

Welcome back fellow Hackers! Today you will learn the most Basic Metasploit Commands. Hacking with Metasploit is a new series dedicated to Metasploit. This is one of many Metasploit related articles coming in the near future.

Read more

Categories Cyber Security Tags commands, metasploit, syntax 2 Comments
Post navigation
Older posts
Newer posts
← Previous Page1 … Page5 Page6 Page7 Page8 Next →

Increase Website Earnings

Ezoic is generating higher Ad Revenue than any other platform. Proven Results.

Accept Offer!

Security

WSL 2

Python

JavaScript

WebDev

Linux

pfSense

SysAdmin

Reviews

DigitalOcean Referral Badge
© 2022 Ceos3c • Built with GeneratePress