Abstract In lab four, this group is researching vulnerabilities and exploits. In this lab the group learns...
Contributor
Abstract The purpose of this exercise is to evaluate the concept of a security ‘exploit,’ both by...
Abstract In this lab we will be researching exploits and testing to see if they actually work...
ABSTRACT This lab will build on the research and findings from the previous labs. This lab will...
Abstract Unlike the last lab where we analyzed different means of actively retrieving information from a network,...
Abstract The purpose of this exercise was to examine the role, application, and concerns associated with the...
Abstract The act of performing network reconnaissance can mean the difference between a successful penetration test, and...
Abstract The first part of the lab is to research passive reconnaissance tools and how they operate. The...
Abstract Active reconnaissance is a method used by attackers to footprint a remote system by actively probing...
Abstract Laboratory two will require the student team to identify and tabulate active reconnaissance tools and tools...
Abstract The purpose of this exercise is essentially two-fold in areas of research: active reconnaissance methods and...
Abstract The exploration of network penetration does not stop with just an overview of penetration testing. Digging...
ABSTRACT The first part of the lab is to research active reconnaissance tools and their relationship with...
Abstract In this lab we review the pros and cons of penetration testing, methods and tools used...
Abstract This lab will require the student team to build or modify a virtual lab envrionment that...