Ok guys it is my first review of a capture the flag pentest. If you have suggestions you can reach me out on twitter @marghost. I hope you will like it. This vulnerable VM has been created by Viper and can be found HERE. In this pentest i will use some basic pentest tools like nmap nikto dirtbuster and wpscan. I will exploit vulns with the classic metasploit.
After many test phonetisaurus and pocketsphinx are not quite good to use, full of bug and the debugging of them is a pain in the ass!
When i will go on and continue this project of Jasper/jarvis i will see what alternatives the internet haz to offer… probably wit.ai.
Keep you posted
First of all fresh install of the jasper img provided by matt curry.
After you should make an apt-get ‘update upgrade’…. and your good to go make a tea break and maybe do some lundry lawl.
….still updating go prepare a snack and put one episode of your favorite serie 😉
At the prompt, enter the following command:
sudo nano /etc/network/interfaces
This is a list of instructions usefull to program dspic.
Intro to dsPIC register:
In this post i will cover some basic commands that you can use with your dsPIC. First of all you need to understand the dspic RAM. Continue reading
First 0f all
We will create a project from scratch. To do that i will make a step by step guide.
- File->New Project. Choose ‘Standalone project’. NXT
- You need to select de device family : ’16-bit DSCs (dsPIC30)’ and the device : ‘dsPIC30F4013’. Those depend of your chip model. NXT Continue reading