Abstract There is a fine line in securing a system and maintaining the usability of that system....
Contributor
Abstract The purpose of this exercise is to emulate a realistic attack/defense scenario in a virtual test...
Abstract Penetration testing has been the point of this course. Performing a live penetration test against a...
Abstract In anti-forensics attackers attempt to erase or disguise the traces of their intrusion and try to...
Abstract In this week’s lab we will analyze target hosts and choose exploit tools that will exploit...
Abstract When performing a penetration test on a system, after gathering all the information that you can,...
Abstract The purpose of this exercise is to compromise three virtual hosts using primarily passive reconnaissance and...
Abstract Making use of automated exploit tools to attack a system is not a new topic. It...
Abstract The purpose of lab 6 is to build upon the previous labs, and this week using...
Abstract Within this lab it continues to build upon the previous labs, and this week we discuss...
Abstract Securing a computer can be a daunting task. To aid in hardening a computer, there are...
Abstract The purpose of this exercise is to discover usable attack methods by reverse engineering security documents....
Abstract Based on all of the literature provided in previous labs, performing a penetration test is all...
Abstract This lab will allow us to gain an understanding of the reverse engineering process. In this...
Abstract The focus of this lab is security vulnerabilities. Specifically, how do system administrators know that there...