-
Nicholas T. Nguyen wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
Department of Homeland Security looking for vendors to handle Cyber Security Operations Center.
-
Nicholas T. Nguyen wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
In the news
Cyber warriors are allowed to have long hair. (UK, not satire)
-
Nicholas T. Nguyen wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Virginia schools sponsor summer cyber camps to encourage students towards cyber security job fields.
-
Nicholas T. Nguyen wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
In my past use of WireShark, you can use the tool as a passive sniffing tool to detect packets coming in and out of your network. You can also tailor your syntax to search for specific ip addresses, ports, and […]
-
Nicholas T. Nguyen wrote a new post on the site Advanced Penetration Testing 8 years, 10 months ago
Reading Summary:
The reading focused on the functionality of the msf console. The console allows one to look thru plenty of payload options, exploits, and auxiliary scanners. Scanners can act as port scanners, […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Evasion Techniques
Here’s what I’ve used in the past for evasion techniques; very slow and steady scanning, scanning for only one or two ports at a time, spoofing an IP addresses, encryption to avoid IDS’s, […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
SQL injection is a SQL vulnerability in the database that allows certain queries to be typed in or exploited to reveal the contents of the database. One way of doing this is going into a user input page and typing […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Web Application vulnerabilities are a significant threat to websites and companies in which an attack can exploit a weakness on the website to gain access to sensitive information. XSS is the most common type of […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
What is Malware?
Malware is a software that makes your computer do undesirable things, but are desirable to malicious actors. Malware can provide a backdoor or reverse shell of your computer to the bad guys, […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Social Engineering
Social Engineering is bad, mm’kay? It takes advantage of the weakest link in security, which are the people. Th systems can be secure, but people have the need and desire to help others or […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
There are many uses for netcat. One of its primary uses can be for file transfers, but it can also be used for checking port connections on remote hosts, port scanning, firewall testing, address spoofing, as a […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Sniffing is when one uses tools to track the traffic going on in your network. There are two types of sniffing: active and passive.
Passive sniffing involves observing traffic across the network, such as […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 3 months ago
The War Is On:
Enumeration can help with discovering network resources, users, groups, banner grabbing, and operating system footprinting. There are different enumeration techniques depending on if your target is […] -
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 3 months ago
Vulnerability scanning is important one can find the weaknesses and avenues of approach an enemy can find. You are finding those weaknesses out first in order to fix them, before an enemy can find the weaknesses […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 3 months ago
Open Source Recon Tools:
Conducting active recon with permission from the company would be considered illegal. Only passive forms of recon, such as open source information or social engineering, are considered […]
-
Nicholas T. Nguyen wrote a new post on the site Introduction to Ethical Hacking 9 years, 3 months ago
Summary:
The enterprise Data Center Topology contains the intranet for the internal network, the extranet for supporting business to business functions, and the internet, which allows users to reach out and […]
-
Nicholas T. Nguyen wrote a new post on the site Nick Nguyen 10 years, 7 months ago
SQL injection involves the unauthorized access into a company’s database. The hacker would insert SQL queries into the database, and be able to view, edit, delete, or create new databases, tables, or information, […]