-
Ruslan Yakush posted a new activity comment 8 years, 1 month ago
Part of CIA Triad compliance would be managing security of applications running in the organization. White List, Black List or Certificate/Trust based are some of available options along with other third-party solutions controlling restrictions of applications, including Symantec and Lumension Endpoint Management. All these can be used to create a…[Read more]
-
Ruslan Yakush posted a new activity comment 8 years, 1 month ago
Hello Everyone,
As I mentioned on the WebEx class, “Carbon Black” is endpoint security software that performs advanced memory analysis of abnormal activities. It helped our organization’s infrastructure to catch a Ransomware Cryptolocker and stop it from spreading in the network.
-
Ruslan Yakush posted a new activity comment 8 years, 1 month ago
I have been exposed to Windows and Linux environments and constantly using Mac and Windows to accomplish my everyday tasks at work and home. I am not choosing anything specific as I enjoy working with multiple OSs and different technologies to meet various business challenges. However, it seems like Linux is favorable OS by many large corporations…[Read more]
-
Ruslan Yakush posted a new activity comment 8 years, 2 months ago
Hello Classmates,
Also, I wanted to add a few tips regarding the lab PA2.1.
When importing basedomain.ldif, user1.ldif and user2.ldif, you may get the errors as follows:
“Protocol Error (2)”
“No such Object (32)“Root Cause:
Linux is very sensitive at interpreting the code. So, the ldif file containing the code must be clean in ter…[Read more] -
Ruslan Yakush posted a new activity comment 8 years, 2 months ago
In a SSO environment, users enter their credentials once and can access all resources in the network. Obviously, SSO has many benefits such as ability to login to all resources once authenticated, use single strong password. access resources much faster and efficiently, simplicity of passwords administration and management.
The benefits outweigh…[Read more] -
Ruslan Yakush posted a new activity comment 8 years, 4 months ago
Thank you for your suggestion. I will try it.
However, even though installation should be seamless, there are complications of making it work. -
Ruslan Yakush posted a new activity comment 8 years, 4 months ago
Hello,
In step 4, while in Terminal, execute commands that would extract archive and then navigate to folder where files are extracted. If you don’t know the command, just Google it. 😉
Then, follow step 5.Let me know if you still need my help
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Finally, FBI was able to UNLOCK the iPhone without help of Apple.
FBI has been so eager to unlock the iPhone by all means, and luckily they found a third-party company in Israel who was able to assist in […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Readings:
Aircrack-ng tool set is very powerful when it comes to wireless transmissions Monitoring, Attacking, Testing and Cracking. It is available in different suite options, such as: VM, Live CD and […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
Readings:
IEEE 802.11 family standard is a set of Layer 1 and Layer 2 specifications of OSI model for implementing WLANs. Developed by IEEE committee in 1997, 802.11 standard was the first wireless networking […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
ISPs Sell Your Data to Advertisers, But FCC has a Plan to Protect Privacy
The Federal Communication Commission (FCC) has put forward a proposal that aims to protect Internet user’s privacy.
The proposal […] -
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
Readings:
Wireshark was developed in 2006 (originally called Ethereal as was developed by Gerald Combs back in 1998) and so far is the best free Open Source tool that is used for deep network data packet […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Readings:
Web based attacks are most dangerous environments with numerous ways to compromise Confidentiality, Integrity and Availability. Various methods exist to break into web services, servers and sites […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
*/ No Reading for this week.
In the News:
National Security Agency merging offensive, defensive hacking operations
The U.S. National Security Agency on Monday outlined a reorganization that will […] -
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Readings: MSF Extended Usage and Metasploit GUIs
In addition to general features of Metasploitable environment, MSF extended allows to go beyond of standard and include powerful tools such as Karmetasploit, […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 10 months ago
Readings Summary:
After reading materials about Metasploit Fundamentals, Information Gathering, Vulnerability Scanning, Exploit Development, Web App Exploit Development, Client Side Attacks and Auxiliary M […]
-
Ruslan Yakush wrote a new post on the site Advanced Penetration Testing 8 years, 10 months ago
Hello Everyone,
I would like to share with you some useful information so that you guys will not need to deal with setup difficulties and diving into google search trying to find answers.
Basically, I […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Evasion Techniques – Reading
Even though IPS systems provide means to prevent malicious attacks from entering the network systems beyond secured perimeter, it is still possible to evade detection through bypass […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Web Services
Web Services are components that proved web communications using major protocols, such as TCP/IP over HTTPS and others, thus replacing middleware protocols. Some components can request other […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years ago
SQL Injection reading
SQL injections techniques are one of the most popular code injection methods used by hackers to attack websites. An attacker finds vulnerabilities in the target website or SQL-based […]
- Load More