-
Rommel R. Miro commented on the post, Progress Report for Week Ending, September 22, on the site 8 years, 3 months ago
If changes are made within the OS VM itself, one can lock themselves out in an abrupt fashion.
Managing the settings through the portal provides a convenient, top level view of all the relevant settings depending on the tab that you are in. Other tools are also readily available if needed in the portal. -
Rommel R. Miro posted a new activity comment 8 years, 3 months ago
Note:
After creating a VM in Azure and establishing a remote session into the VM, one of the steps in the Tech Challenge 1 is to change the network settings (primary and secondary DNS server settings) on the VM. This will most likely drop the current Remote Desktop session and you may not be able to remote back in. Initially, I had to delete…[Read more]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Intrusion Prevention System examines data and flow of network traffic to detect or prevent vulnerabilities or exploits. The reading for this week discusses different ways and methods to bypass different flavors of […]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Web Services explanation:
Web services describes a standardized way of communication and data transfer between Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet […]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Reading: Full SQL Injection Tutorial
SQL injection is a technique that uses code injection via malicious statements and commands to attack applications with the goal to dump the database contents to the […]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Web-application hacking highlights the importance of sanitizing data. This is all made possible due to how the application can accept unexpected values as input. It is through this method that malicious code is […]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Malware today stands for malicous software. This encompasses viruses, trojans, root kits, worms, logic bombs,etc. The reading article defines and explains the differences between those examples above, including […]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 3 months ago
Netcat was originally designed to be a backend tool that can test, create, read & write to connections using TCP or UDP. It can be used directly or run by programs or scripts. It was originally designed for Unix […]
-
Rommel R. Miro wrote a new post on the site Introduction to Ethical Hacking 9 years, 3 months ago
1 Key Point:
The reading for this week discusses Packet Sniffing in both switched and non-switched environments. It explained ARP Spoofing that is done mainly through the main in the middle attach where the […]