-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Reading: Aircrack-ng Tutorial: Getting Started, I followed this tutorial, and Tutorial: Is My Wireless Card Compatible referenced, did some additional research and confirmed that my old LINKSYS WUSB600N was c […]
-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Readings: Microsoft’s Technet Library: How 802.11 Wireless Works, March 28, 2003. Provides a detailed overview of the elements of the IEEE 802.11 protocol architecture and associated technologies. The art […]
-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
DROWN Vulnerability Still Unpatched by Most Cloud Services, SecurityWeek News – March 11, 2016
DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) enables man-in-the-middle attackers to intercept, c […]
-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
WireShark-Introduction: WireShark is an open source network packet capture, display and analysis tool that runs in many versions of Linux, UNIX, and Windows. It can be used to achieve many positive outcomes, i […]
-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
It looks like I may be confused about what’s expected this week…
Reading: Metasploit Unleashed – MSF Extended Usage and Metasploit GUIs. This weeks’ reading introduced us to a broad range of tools and t […]
-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Reading: MSF Post Exploitation, Meterpreter Scripting, Maintaining Access This week’s reading covered a broad array of penetration testing techniques, tools, and capabilities available within the Metasploit Fr […]
-
David Lanter wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Reading: Metasploit-Unleashed: The Ultimate guide to the Metasploit Framework, Offensive Security
The Metasploit Framework is a stable platform for executing information security exploits providing a base for […] -
David Lanter wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading: Dyrmose, M. (2013). Beating the IPS. SANS Institute InfoSec Reading Room. The paper: describes how to build an intrusion protection system research laboratory, introduces four evasion techniques, and […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Burns, S. (2001). “Web Services Security – An Overview”. SANS Institute, InfoSec Reading Room. Web services are software functions provided at a network address that enable machine to machine communication over t […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading: Marezzi@gmail.com (2008), “Full SQL Injection Tutorial”. The tutorial describes SQL injection as a code insertion technique for attacking poorly implemented data-driven client-server and n-tier appl […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Karthik, R. Burp Suite Guide: Part 1 – Basic Tools, Part 2 – Intruder and repeater tools, Part 3 – Sequencer, decode and composer. SearchSecurity.techtarget.in. Karthic’s terse three part guide provides a […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Zeltser, L. (2014). “Ouch! What Is Malware,” The Monthly Security Newsletter for Computer Users, The SANS Institute. This reading provides a short high-level overview of malware, its sources, and prote […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Allen, M. (2006). “Social Engineering: A Means To Violate A Computer System”, SANS Institute Reading Room. Allen’s article provides a good introduction and overview of social engineering. It covers defini […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Armstrong, T. (2003), “Netcat – The TCP/IP Swiss Army Knife”, Information Security Reading Room, SANS Institute. Based on Nmap’s optimized and tested passive and active scanning libraries, Ncat is a powerfu […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
King, T. (2007). “Packet Sniffing In a Switched Environment”, SANS Institute InforSec Reading Room. The article introduces packet sniffing as largely a within network (“internal”) threat to unencrypted and poorl […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
McGreevy, J.P. (2002). “Footprinting: What Is it, Who Should Do It, and Why?”, SANS Institute Information Security Reading Room, Sans Institute. In planning an attack, the author instructs that “Footprinting” […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week Four Reading: Mitchel, J. (2002). Proactive Vulnerability Assessments with Nessus, SANS Institute. Once setup and configured, Nessus is a powerful tool for applying signatures for detecting known […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment (Young, S., 2014) . This article began with a warning about the legal risks of assessing the vulnerabilities of websites and […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
My takeaway from Chapter 2 – Enterprise Data Center Topology: It seems that a good network architecture structurally decomposes incoming and outgoing traffic into n-tier functional service areas (i.e. client […]
-
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 10 years, 7 months ago
The Institute for Business and Information Technology (IBIT) report – Barbarians Inside the Gate: Dealing With Advanced Persistent Threats authored by Gregory Senko, discussed advanced persistent threats (AP […]
- Load More