Kali Linux 2018.2 Release – Pentesting Cloud

Kali Linux 2018.2

The latest addition to Offensive Security and their world renowned Kali Linux Pentesting distribution has arrived with Kali Linux 2018.2. As most of you know OneHost Cloud is the premier and possibly the number one Cloud Hosting Provider in the Pentesting Field or providing Cloud Pentesting Solutions to Cyber Security Professionals and other individuals in […]

Read More >

Cloud Pentesting with Kali Linux and OneHost Cloud

OneHost Cloud has been offering Kali Linux VPS Hosting for approximately 2 years and have created a platform that allow Cyber Security professionals, Hackers, IT Managers and various other professional in the Cyber Security Arena to create and utilize our cloud based pentesting virtual machine running the popular Kali Linux 2018.1 operating system. We have […]

Read More >

Latest Kali Linux 2018.1 Now Available

Kernel Updated to 4.14 Kali Linux 2018.1 has a shiny new 4.14.12 kernel. New kernels always have a lot of new features and the 4.14 kernel is no exception, although two new features really stand out. AMD Secure Memory Encryption Support – Secure Memory Encryption is a feature that will be in newer AMD processors that […]

Read More >

Why OneHost Cloud Values Privacy & Security

What do we mean when we say OneHost Cloud Values Privacy & Security ? When customers ask is my data safe and private most cloud hosting providers will almost always say an unequivocal yes without giving it a second thought however the reality is a little different. All one needs to do is peruse some of […]

Read More >

Tor Hidden Services & Hosting Improvements

Finally we have made some significant changes to our Tor Hidden Service Hosting. Initially we allowed customers to access our Tor Control Panel via the clearnet however this was not an ideal solution for the privacy conscience Tor user. We have now moved our Tor services and all our customers to a new and improved […]

Read More >

OneHost Cloud v Amazon AWS – Kali Linux

Kali Linux is the go-to Pentesting Distribution for seasoned professional pentesters and amateur hackers. Kali Linux has a broad user base and has been on top of the pentesting distributions for the past 10 years. For security and amateur pentesting the usual way to install and run Kali Linux is to boot the Kali Linux […]

Read More >

Metasploit and Meterpreter with NAT

[vc_row][vc_column][vc_column_text]Using Metasploit and Meterpreter with NAT requires a SRVHOST and SRVPORT. These 2 variables will be used by Metasploit to determine where the webserver needs to bind to and listen on.  The plan is to trick the target to connect to this webserver, using the public IP of our firewall/router, which will then forward the […]

Read More >

Introduction Into CyberSecurity Training by Bruce Williams

Hi, I have been often asked about cybersecurity training. Where do you start? Websites like these are a good https://resources.infosecinstitute.com/top-5-free-learning-resources-for-cyber-security-beginners/ https://www.hackercurriculum.org To train people in cybersecurity there are various approaches. The method which I teach is based on a risk/return which tries to defend a small to medium business against web attack. One size will […]

Read More >

WannaCry Ransomware 2.0

Wannacry Ransomware 2.0 So far, over 237,000 computers across 99 countries around the world have been infected, and the infection is still rising even hours after the kill switch was triggered by the 22-years-old British security researcher behind the twitter handle ‘MalwareTech.’ For those unaware, WannaCry is an insanely fast-spreading ransomware malware that leverages a […]

Read More >

Tor Hidden Service Review

Here is a quick overview of our latest product – Tor Hidden Service. More specifically let us host your Tor Hidden Websites using our Nginx, Mariadb, PhpMyadmin and Easy to use Control Panel for easy upload and management of your Tor Hidden Website. Our Tor Hidden Hosting is build on the fast and secure Nginx […]

Read More >