HEX Journey - Pentesting - Reverse Engineering

A journey from bottom to top into cybersecurity research, pentesting and reverse engineering with a mix of Artificial Intelligence.

You’ll find this post in your _posts directory. Go ahead and edit it and re-build the site to see your changes. You can rebuild the site in many different ways, but the most common way is to run jekyll serve, which launches a web server and auto-regenerates your site when a file is updated.

Jekyll requires blog post files to be named according to the following format:

YEAR-MONTH-DAY-title.MARKUP

Where YEAR is a four-digit number, MONTH and DAY are both two-digit numbers, and MARKUP is the file extension representing the format used in the file. After that, include the necessary front matter. Take a look at the source for this post to get an idea about how it works.

Jekyll also offers powerful support for code snippets:

def print_hi(name)
  puts "Hi, #{name}"
end
print_hi('Tom')
#=> prints 'Hi, Tom' to STDOUT.

Check out the Jekyll docs for more info on how to get the most out of Jekyll. File all bugs/feature requests at Jekyll’s GitHub repo. If you have questions, you can ask them on Jekyll Talk.

HYPER-V and KALI

I like to work with VM’s when possible, and one of my favourites hypervisor to work with is Hyper-V. It’s just handy.. preinstalled with windows, it works out of the box, simple enough for me. One of the downsides is that it doesn’t work that smooth for Linux as it does for Windows.

Firt things first. Change the resolution.

sudo vim /etc/default/grub

Search and change the corresponding line to:

GRUB_CMDLINE_LINUX_DEFAULT=”quiet splash video=hyperv_fb:1920×1080″

Then in the terminal

sudo update-grub

And that’s it.

Now, that’s a fast solution. But if you’d like to go a little bit farther just follow the link from the Kali guys and install the Guest Tools. Doing that you will have clipboard sharing between host and VM as well as window resizing. (this last bit still doesn’t work for me)

Installing Hyper-V Enhanced Session Mode (Guest Tools)