-
Jose Gomez's profile was updated 3 years, 10 months ago
-
Jose Gomez changed their profile picture 6 years, 1 month ago
-
Jose Gomez's profile was updated 6 years, 1 month ago
-
Jose Gomez posted a new activity comment 7 years, 8 months ago
Anthony makes a good point as this is delicate balance which is becoming much more prevalent. The privacy lines are being blurred further and further as we get further connected and those new technologies becoming a form of forensic evidence. You look at the most current cases of the Amazon Echo and tool like that are capturing sound in the home…[Read more]
-
Jose Gomez wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
In the News: http://www.govinfosecurity.com/verizon-confirms-breach-affecting-business-customers-a-8991
Verizon Enterprise Solutions, which regularly assists clients in responding to data breaches, admits it’s […]
-
Jose Gomez wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Reading Summary:
The MSF Console is the most popular interface to the Metasploit Framework (MSF). The console provides an “all-in-one” centralized console and allows you efficient access to virtually all […]
-
Jose Gomez wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Summary: Metasploit Framework (MSF) provides all the necessary tools to exploit a system. The tool provides of over 900 different exploits for several operating systems. Metasploit also checks for the s […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Intrusion Prevention System (IPS) are network security appliances which inspect data and flow of network traffic. This appliances is configured to detect or prevent malicious activity targeting systems. The as […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Web Services Security – An Overview:
Web services allow complex applications to present their information in a simpler manner via common processes such as HTTP or HTTPS. The most common web service voc […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Web Application vulnerabilities are still rampant and companies continue to allow attackers to exploit weaknesses in their websites. XSS is the most prevalent attack method for the Web app type attack followed c […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Malware infection is a very common attack vector utilizing various types of malware with common examples being Trojans and Polymorphic malware. Every organization should have a plan in place to handle an […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Packet sniffing is largely an internal threat which must be mitigated. Packet sniffing is susceptible in both a non-switched and switched network. Many off the shelf tools today allow insider threats to easily c […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary: Enumeration is a powerful to which allows you to identify valid user accounts or any weak components at a target. One of the first activities while conducting a penetration test in Unix […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
The importance of vulnerability scanning cannot be minimized. The attack vectors routinely target systems which are vulnerable from an upgrade, patch or security perspective. Organizations which have […]
-
Jose Gomez wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
The key facts I got from the reading are that public information will always be available as the internet will always be instrumental in finding customers which in turn will always make you vulnerable or a […]
-
Jose Gomez's profile was updated 9 years, 2 months ago
-
Jose Gomez posted a new activity comment 9 years, 2 months ago
Lesson Learned from Chapter 2 – Enterprise Data Center Topology: It seems that a defense in depth strategy which provides many layers for data to traverse provides a great defense mechanism for external threats.
Question: What are the advantages and disadvantages of deploying Network IDS Capture Architecture?
In The N…[Read more]