-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Assigned readings:
Metasploit extended usage includes various capabilities, such as Mimikatz, a user friendly metepreter script composed of various tasks that attackers will want to perform on the initial […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Assigned readings:
Metasploit Unleashed allows various functions, such as the abilities to conduct MSF Post Exploitation,
Meterpreter Scripting, and Maintaining Access. MSF Post Exploitation allows the user to […] -
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Assigned readings:
The Metasploit Unleashed (MSFU) is an open source penetration tool. This ethical training course also has the objective to provide security awareness for the underprivileged children in East […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading Summary: Evasion
Organizations mostly use firewalls and Intrusion Prevention System (IPS) to protect its network infrastructure. IPS is as an evasion technique used to detect any security attacks. […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading Summary: Web Services
Web services is a tactic used to improve productivity in terms of increasing the speed and quality of information flow, as well as to make it easier for producers and consumers of […]
-
Joseph M. Allegra wrote a new post on the site Fox Computer Literacy Test 9 years ago
Freshmen students who entered the Fox School after 2008 must take the FOXCLT. Transfer students who are in the core-to-core curriculum or transferred with 45+ credit hours are strongly advised. If you are […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: SQL Injection
SQL injection is one of the most common vulnerabilities in web applications and that is why it is very crucial to test for vulnerabilities when one creates a website since it […]
-
Elvita Quinones and David Yastremsky are now friends 9 years ago
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Web Application Hacking
Web application hacking is very common through client-submission of unexpected inputs. Knowing how to leverage such vulnerabilities is very important and yet challenging […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Malware
Malware infection is becoming very popular nowadays, ranging from Trojans, Backdoors, Zero-Days, Virus, Worms, and Polymorphic malware. Each organization has its way of handling such an […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Social Engineering
Social Engineering has become a powerful hacker technique that most organizations still ignore, if not, underestimate its true impact. This technique takes into advantage the […]
-
Jeta Gjana's profile was updated 9 years, 1 month ago
-
Jeta Gjana changed their profile picture 9 years, 1 month ago
-
Jeta Gjana changed their profile picture 9 years, 1 month ago
-
Jeta Gjana changed their profile picture 9 years, 1 month ago
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary: NetCat
NetCat is a tool built by Hobbit and made available in a Windows platform by Weld Pond. It is recommended to test the firewall and router configurations in a test environment and not […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary:
Packet sniffing can exists in a switched or non-switched environment. Packet sniffing usually arises from an internal threat and it is shares the same concept as the man-in-the-middle attack […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary: Enumeration and Footprinting
The Enumeration process identifies valid user accounts or any weak component/resource. Some of the key areas of information include user and groups, network […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary:
The enterprise often contains firewalls and an intrusion detection system (IDS) to keep the organization secure. However, that is not enough to detect vulnerabilities or web attacks on an […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week 3 Reading Summary Takeaways:
In the world of hacking, attackers start with reconnaissance process which has the objective to collect intelligence about the target. This is often accomplished through port […]
- Load More