-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 6 months ago
Hey guys,
Some of you might already know this but for those who have not been notified yet, you can attend 4 online courses and become Splunk certified for free 🙂
Check it out!
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 6 months ago
“Ransomware, hospital hacking present growing cybersecurity threats”
Hackers crippled computer systems at a major hospital chain, MedStar Health Inc., one of the the largest health care providers in the Bal […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 6 months ago
Assigned Reading:
Aircrack-ng Suite should be used in a Linux environment and not in a Windows OS since there is not much support for it. For someone who has not been previously exposed to this tool, the […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Assigned Readings:
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a set of media access control and physical layer for providing connectivity between wireless technology and wired […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
“Hacker’s Typo Tipped Off Authorities on Billion-Dollar Heist”
A spelling mistake in an online bank transfer instruction helped prevent a nearly $1 billion heist last month involving the Bangladesh central bank […] -
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Since there’s no assigned readings (according to the syllabus), I thought I would share this interesting article: “Office puts chips under staff’s skin”.
Epicenter, a new hi-tech office block in Sweden, are tr […]
-
Amanda E. Krauth wrote a new post on the site HONEYDEW 8 years, 8 months ago
Honeydew’s Competition
Our direct competitors, Apple Maps and Google Maps are innovating their current technologies to have a leading-edge over one another. Despite their end goals, which is to generate a […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
Assigned readings:
Burp Suite is a tool that allows security testing of Web applications. This framework is very powerful for if it is used properly, it identifies vulnerabilities and exploits them. This tool […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
“Keybase Releases Encrypted File-Sharin iPhone App”
Keybase last week announced the alpha release of the Keybase app for the iPhone with a cryptographically secure file mount. Users can write data in an […]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
Assigned readings:
Metasploit extended usage includes various capabilities, such as Mimikatz, a user friendly metepreter script composed of various tasks that attackers will want to perform on the initial […]
-
Amanda E. Krauth posted an update in the group MIS4596-002 Spring 2016 – Messina 8 years, 8 months ago
Our group is as follows:
Arif HossainAmanda Krauth
Kevin Blankenship
Joe Henry
Our project proposal is:
Application Name: Honeydew — ( a play on words when married couples say a Honey Do list)
A route optimization and activity planning application. A cross between Yelp, Google Maps, Groupon and a to-do List
1.) Enter in the activities y…[Read more]
-
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Assigned readings:
Metasploit Unleashed allows various functions, such as the abilities to conduct MSF Post Exploitation,
Meterpreter Scripting, and Maintaining Access. MSF Post Exploitation allows the user to […] -
Jeta Gjana wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Assigned readings:
The Metasploit Unleashed (MSFU) is an open source penetration tool. This ethical training course also has the objective to provide security awareness for the underprivileged children in East […]
-
Amanda E. Krauth joined the group MIS4596-002 Spring 2016 – Messina 8 years, 9 months ago
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading Summary: Evasion
Organizations mostly use firewalls and Intrusion Prevention System (IPS) to protect its network infrastructure. IPS is as an evasion technique used to detect any security attacks. […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading Summary: Web Services
Web services is a tactic used to improve productivity in terms of increasing the speed and quality of information flow, as well as to make it easier for producers and consumers of […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading Summary: SQL Injection
SQL injection is one of the most common vulnerabilities in web applications and that is why it is very crucial to test for vulnerabilities when one creates a website since it […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 12 months ago
Reading Summary: Web Application Hacking
Web application hacking is very common through client-submission of unexpected inputs. Knowing how to leverage such vulnerabilities is very important and yet challenging […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Malware
Malware infection is becoming very popular nowadays, ranging from Trojans, Backdoors, Zero-Days, Virus, Worms, and Polymorphic malware. Each organization has its way of handling such an […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Social Engineering
Social Engineering has become a powerful hacker technique that most organizations still ignore, if not, underestimate its true impact. This technique takes into advantage the […]
- Load More